Remove tag security-orchestration
article thumbnail

China-linked threat actors are targeting the government of Ukraine

Security Affairs

Google’s TAG team revealed that China-linked APT groups are targeting Ukraine’s government for intelligence purposes. Below is the tweet published by TAG chief, Shane Huntley, who cited the Google TAG Security Engineer Billy Leonard. ” wrote Leonard. China is working hard here too. Pierluigi Paganini.

article thumbnail

macOS Zero-Day exploited in watering hole attacks on users in Hong Kong

Security Affairs

Google TAG researchers discovered that threat actors leveraged a zero-day vulnerability in macOS in a watering hole campaign aimed at delivering malware to users in Hong Kong. The experts believe that the attack was orchestrated by a nation-state actor, but did not attribute the campaign to a specific APT group. Pierluigi Paganini.

Malware 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google sent over 50,000 warnings of state-sponsored attacks, +33% from same period in 2020

Security Affairs

The data were provided by Google’s Threat Analysis Group (TAG), which tracks government-backed hacking campaign, which warns of a significant increase in the number of the alert compared to the previous year. ” wrote Ajax Bash, a Google security engineer from the TAG. SecurityAffairs – hacking, cyber security).

article thumbnail

Sophisticated attackers used DazzleSpy macOS backdoor in watering hole attacks

Security Affairs

The investigation started in November after Google TAG published a blogpost about watering-hole attacks targeting macOS users in Hong Kong. Google TAG researchers discovered that threat actors leveraged a zero-day vulnerability in macOS in a watering hole campaign aimed at delivering malware to users in Hong Kong. Pierluigi Paganini.

Malware 86
article thumbnail

How to Implement Microsegmentation

eSecurity Planet

In an era where the network edge faces the highest traffic, organizations rush to add more robust security yet hesitate to take on the long-term endeavor known as microsegmentation. Instead, by enhancing visibility into how data flows, network administrators can work with business and security analysts to create application enabled policies.

article thumbnail

French Firms Rocked by Kasbah Hacker?

Krebs on Security

A large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker based in Morocco, KrebsOnSecurity has learned. 001 for his security research and bug hunting. But he denied ever participating in illegal hacking activities.

DNS 262
article thumbnail

HUMAN Orchestrates Unprecedented Private Takedown, VASTFLUX

CyberSecurity Insiders

NEW YORK–( BUSINESS WIRE )– HUMAN Security, Inc. , Orchestrating a private takedown of this magnitude and severity is no small feat, and I want to take a moment to thank all involved, including the HUMAN Satori Threat Intelligence and Research Team, the team at clean.io Protect your digital business with HUMAN.