article thumbnail

Muddling Meerkat, a mysterious DNS Operation involving China’s Great Firewall

Security Affairs

The threat actors appear to have the capability to control China’s Great Firewall and were observed utilizing a novel technique involving fake DNS MX records. The DNS event data containing MX records from the GFW often occurs on separate dates from those where we see MX queries at open resolvers.” ” concludes the report.

DNS 113
article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Here are five notable historical events that influenced cybersecurity assessment and transformed it into what it is today: The Battle of Midway (1942). It’s clear that when technology develops, people find creative ways to cause mass disruption, increasing the need for antivirus protection and firewalls.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Are Now Exploiting Windows Event Logs

eSecurity Planet

Hackers have found a way to infect Windows Event Logs with fileless malware , security researchers have found. During a “very targeted” campaign, hackers used Windows Event Logs to inject shellcode payloads and operate stealthily. If it does not find one, the encrypted shell code is written in 8KB chunks in the event logs.

Malware 114
article thumbnail

GUEST ESSAY: NewsCorp hack shows cyber espionage, squelching of press freedom on the rise

The Last Watchdog

As the dust settles following the recently disclosed hack of NewsCorp , important lessons are emerging for the cybersecurity and journalism communities. China has enclosed its national internet servers within what is colloquially called ‘the Great Firewall.’ Related: How China challenged Google in Operation Aurora.

Hacking 243
article thumbnail

Sophos blocked attacks exploiting XG Firewall zero-day to deploy Ransomware

Security Affairs

Hackers attempted to exploit a zero-day flaw in the Sophos XG firewall to distribute ransomware to Windows machines, but the attack was blocked. It was designed to download payloads intended to exfiltrate XG Firewall-resident data. Sophos was informed of the attacks exploiting the zero-day issue by one of its customers on April 22.

Firewall 128
article thumbnail

Check Point released hotfix for actively exploited VPN zero-day

Security Affairs

Threat actors exploited the flaw to gain remote firewall access and breach corporate networks. In light of these events, we have been monitoring attempts to gain unauthorized access to VPNs of Check Point’s customers. The vulnerability CVE-2024-24919 is a Quantum Gateway information disclosure issue.

VPN 92
article thumbnail

China Says NSA Is Hacking Top Military Research University

SecureWorld News

China's National Computer Virus Emergency Response Center (CVERC) recently made a statement accusing the United States National Security Agency (NSA) of repeatedly hacking the Northwestern Polytechnical University, a key public military research university located in Xi'an, China. TAO is a tactical implementation unit of the U.S.

Hacking 86