Remove DNS Remove Information Security Remove Malware Remove Security Intelligence
article thumbnail

Threat actor has been targeting the aviation industry since at least 2018

Security Affairs

The group is suspected to have been running successful malware campaigns for more than five years. The attackers have used off-the-shelf malware since the beginning of their operations and have never developed their own malware. — Microsoft Security Intelligence (@MsftSecIntel) May 11, 2021.

Malware 101
article thumbnail

Russia-linked IRIDIUM APT linked to Prestige ransomware attacks against Ukraine

Security Affairs

Get TTPs and protection info: [link] — Microsoft Security Intelligence (@MsftSecIntel) October 14, 2022. In April, Sandworm targeted energy facilities in Ukraine with a new strain of the Industroyer ICS malware (INDUSTROYER2) and a new version of the CaddyWiper wiper.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European firm DSIRF behind the attacks with Subzero surveillance malware

Security Affairs

Microsoft linked a private-sector offensive actor (PSOA) to attacks using multiple zero-day exploits for its Subzero malware. Microsoft states that multiple news reports have linked the company to the Subzero malware toolset used to hack a broad range of devices, phones, computers, and network and internet-connected devices.

article thumbnail

Black Hat Asia 2022 Continued: Cisco Secure Integrations

Cisco Security

Malware Threat Intelligence made easy and available, with Cisco Secure Malware Analytics and SecureX by Ben Greenbaum . SecureX: Bringing Threat Intelligence Together by Ian Redden . Secure Endpoint for iOS/Security Connector . Secure Malware Analytics (formerly Threat Grid) .

Malware 73
article thumbnail

Cybersecurity Checklist for Political Campaigns

Lenny Zeltser

Modern applications support features that attackers can abuse to install malware on your system. Enable as many OS and app security features as practical. Use modern, reputable anti-malware software. Enable security options according to your provider’s recommendations (e.g., the G Suite security checklist ).