Remove listing tags
article thumbnail

Reinventing Asset Management for Cybersecurity Professionals

IT Security Guru

But security teams don’t just want a list of issues. Today, I’m excited to introduce Qualys CyberSecurity Asset Management (CSAM), which moves the needle further by adding security context to those capabilities and allowing organizations to detect the security gaps in their infrastructure and respond to the risk.

article thumbnail

4 Ways North Korea Is Targeting Security Researchers

SecureWorld News

Security researchers are some of the unsung heroes within the cybersecurity field. Google's Threat Analysis Group (TAG) has been working for several months to try to identify who is behind an ongoing campaign targeting security researchers, specifically those who work on vulnerability research and development at a variety of organizations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Android malicious library Goldoson found in 60 apps +100M downloads

Security Affairs

The Goldoson library was discovered by researchers from McAfee’s Mobile Research Team, it collects lists of applications installed on a device, and a history of Wi-Fi and Bluetooth devices information, including nearby GPS locations. The security firm reported its findings to Google, which notified the development teams.

article thumbnail

Russia-linked Turla APT targets Austria, Estonia, and NATO platform

Security Affairs

The list of previously known victims is long and also includes the Pentagon, the Swiss defense firm RUAG , US Department of State, European government entities and the US Central Command. The researchers investigated the TURLA’s infrastructures starting from the domains in the TAG report: wkoinfo.webredirect[.]org Pierluigi Paganini.

article thumbnail

North Korea-linked campaign targets security experts via social media

Security Affairs

Google TAG is warning that North Korea-linked hackers targeting security researchers through social media. Google Threat Analysis Group (TAG) is warning that North Korea-linked hackers targeting security researchers through social media. ” reads the TAG’s report. ” reads the TAG’s report.

Media 87
article thumbnail

Exclusive: Pro-Russia group ‘Cyber Spetsnaz’ is attacking government agencies

Security Affairs

The actor shared a list of NATO resources and a comprehensive Excel file. Cybersecurity specialists should be especially careful with attribution, as in some cases such activity leads to provocations and purposely generated operations. On June 2nd, the group created a new division called “Sparta”. Pierluigi Paganini.

article thumbnail

Meet Exotic Lily, access broker for ransomware and other malware peddlers

Malwarebytes

The Google Threat Analysis Group (TAG) has shared their observations about a group of cybercriminals called Exotic Lily. Among these interested parties TAG found the Conti and Diavol ransomware groups. From the TAG blog we can learn that Exotic Lily was very much specialized. Initial access broker. Exotic Lily.