Remove Accountability Remove Malware Remove Penetration Testing Remove Telecommunications
article thumbnail

Lyceum APT made the headlines with attacks in Middle East

Security Affairs

reported that Hexane is targeting organizations in the oil and gas industry and telecommunication providers. Lyceum was observed using password spraying and brute-force attacks to compromise email accounts of targeted individuals. The malware uses DNS and HTTP-based communication mechanisms. Security experts at Dragos Inc.

DNS 83
article thumbnail

OilRig APT group: the evolution of attack techniques over time

Security Affairs

The group has targeted a variety of industries, including financial, government, energy, chemical, and telecommunications, and has largely focused its operations within the Middle East. Indeed during the group_a, the main observed delivery techniques where about Phishing (rif.T1193) and Valid Accounts (rif.T1078).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guarding Against Solorigate TTPs

eSecurity Planet

This update touches on the newly detected malware , attack vectors to guard against, and why the targeting of security vendors is a critical development in cybersecurity. Before jumping into the technical details regarding each new malware detected and proper safeguards, here is a brief look at the events to date: Sep 2019.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

The IT landscape’s complexity requires the deployment of Privileged Identity Management technologies, given the increasing sophistication of modern attacks via malware and ungated entries. You will create cyber awareness among your staff, as well as users, partners, customers.

article thumbnail

The Importance of a Proactive Cyber Defense Solution To Protect Your Critical Data

Security Affairs

On the basis that they are a Cybersecurity company, the most plausible explanation is that a legitimate user account or an automated source code commit user (non-human user, system or application user) account was compromised. Potential user account compromise.

article thumbnail

Iran-linked APT34: Analyzing the webmask project

Security Affairs

The group conducts operations primarily in the Middle East, targeting financial, government, energy, chemical, telecommunications and other industries. I do have experience on security testing since I have been performing penetration testing on several US electronic voting systems.

DNS 78