article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

made electronics on behalf of the Russian government and military. The Estonian man is accused of having helped the Russian government and military to purchase US-made electronics and hacking tools. “Shevlyakov also attempted to acquire computer hacking tools.” ” reads a press release published by DoJ.

article thumbnail

Experts Agree This is the Best Way to Protect Your IT Devices

Approachable Cyber Threats

Remember, vulnerabilities are holes in your electronic devices’ code that when left unpatched, can allow hackers to use them to their advantage; like an open back door on your house. Penetration testing ” or “pen testing,” is a method of attempting to break into an IT device.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analyzing the APT34’s Jason project

Security Affairs

Jason is a graphic tool implemented to perform Microsoft exchange account brute-force in order to “harvest” the highest possible emails and accounts information. I am a computer security scientist with an intensive hacking background. Michael Lortz. About the author: Marco Ramilli, Founder of Yoroi.

article thumbnail

OilRig APT group: the evolution of attack techniques over time

Security Affairs

Indeed during the group_a, the main observed delivery techniques where about Phishing (rif.T1193) and Valid Accounts (rif.T1078). A Valid Account in this era (group_a) could be defined as the super-set of default credentials to exposed infrastructures or real user accounts found through alternative channels (such as: darknets, humint, etc.).

article thumbnail

How to Protect New Remote Workers Against Cybercrime

SecureWorld News

Putting strong systems, processes, and cybersecurity products in place is a good start, but the next step is testing your system for any underlying weaknesses and vulnerabilities. This should begin with penetration testing, which is the assessment of computer networks, systems, and applications to identify and address security weaknesses.

article thumbnail

Crimeware and financial cyberthreats in 2023

SecureList

Unlike common stealers, this malware gathered data that can be used to identify the victims, such as browsing histories, social networking account IDs and Wi-Fi networks. Remote workers using corporate computers for entertainment purposes, such as online games, continue to pose financial threats organizations.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Kennedy founded cybersecurity-focused TrustedSec and Binary Defense Systems and co-authored Metasploit: The Penetration Tester’s Guide. October is now BGP Awareness Month.