article thumbnail

French Firms Rocked by Kasbah Hacker?

Krebs on Security

A large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker based in Morocco, KrebsOnSecurity has learned. com , an Arabic-language computer hacking forum. ‘FATAL’ ERROR. to for a user named “ fatal.001.”

DNS 262
article thumbnail

Russia-linked IRIDIUM APT linked to Prestige ransomware attacks against Ukraine

Security Affairs

Get TTPs and protection info: [link] — Microsoft Security Intelligence (@MsftSecIntel) October 14, 2022. The researchers observed C2 infrastructure relying on dynamic DNS domains masquerading as Ukrainian telecommunication service providers. SecurityAffairs – hacking, Prestige ransomware). Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat actor has been targeting the aviation industry since at least 2018

Security Affairs

Our researchers are closely monitoring the campaign and will share additional info and investigation guidance through Microsoft 365 security center and Microsoft Threat Experts. — Microsoft Security Intelligence (@MsftSecIntel) May 11, 2021. SecurityAffairs – hacking, malware). Pierluigi Paganini.

Malware 99
article thumbnail

European firm DSIRF behind the attacks with Subzero surveillance malware

Security Affairs

Microsoft states that multiple news reports have linked the company to the Subzero malware toolset used to hack a broad range of devices, phones, computers, and network and internet-connected devices. Confirm that Microsoft Defender Antivirus is updated to security intelligence update 1.371.503.0 Pierluigi Paganini.

article thumbnail

Black Hat Asia 2022 Continued: Cisco Secure Integrations

Cisco Security

Malware Threat Intelligence made easy and available, with Cisco Secure Malware Analytics and SecureX by Ben Greenbaum . SecureX: Bringing Threat Intelligence Together by Ian Redden . SecureX extended detection and response platform, with orchestration and device insights integration with Meraki and Secure Endpoint .

Malware 73
article thumbnail

Cybersecurity Checklist for Political Campaigns

Lenny Zeltser

Enable security options according to your provider’s recommendations (e.g., the G Suite security checklist ). Lock down domain registrar and DNS settings. Tighten your domain configuration. Place websites behind a reputable cloud or plugin-based web application firewall (WAF). government.