Remove Architecture Remove Authentication Remove Hacking Remove Telecommunications
article thumbnail

China-linked LightBasin group accessed calling records from telcos worldwide

Security Affairs

China-linked cyberespionage group LightBasin hacked mobile telephone networks around the world and used specialized tools to access calling records. CrowdStrike researchers reported that at least 13 telecommunication companies were compromised by since 2019. ” reads the report published by Crowdstrike.

article thumbnail

Cuttlefish malware targets enterprise-grade SOHO routers

Security Affairs

A new malware named Cuttlefish targets enterprise-grade and small office/home office (SOHO) routers to harvest public cloud authentication data. Cuttlefish has a modular structure, it was designed to primarily steal authentication data from web requests passing through the router from the local area network (LAN).

Malware 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New GTPDOOR backdoor is designed to target telecom carrier networks

Security Affairs

LightBasin targeted and compromised mobile telephone networks around the globe and used specialized tools to access calling records and text messages from telecommunications companies. CrowdStrike researchers reported that at least 13 telecommunication companies were compromised by since 2019.

article thumbnail

DePriMon downloader uses a never seen installation technique

Security Affairs

According to a report published by Symantec in 2017, Longhorn is a North American hacking group that has been active since at least 2011. “ DePriMon is an unusually advanced downloader whose developers have put extra effort into setting up the architecture and crafting the critical components,” ESET concludes.

Malware 103
article thumbnail

China's 'Volt Typhoon' Targeting U.S. Infrastructure, Microsoft Warns

SecureWorld News

"The threat actor attempts to leverage any privileges afforded by the Fortinet device, extracts credentials to an Active Directory account used by the device, and then attempts to authenticate to other devices on the network with those credentials," the announcement said. Here is a CNBC report on the warning from Microsoft.

article thumbnail

A guide to OWASP’s secure coding

CyberSecurity Insiders

According to the Software Engineering Institute, software architecture or coding flaws are responsible for up to 90% of security problems. Although web applications and their accompanying architecture are the primary emphases, most recommendations apply to any software deployment environment. Authentication and password management.

article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

Additionally, expect to see more disclosures to regulators from hacking groups, like the one by ALPHV/BlackCat to the SEC in November 2023. To counter advancing cyber threats, organisations will implement more sophisticated security measures like multi-factor authentication, micro-segmentation, and continuous monitoring.