Remove tag social-networking
article thumbnail

Coldriver threat group targets high-ranking officials to obtain credentials

Malwarebytes

Researchers at Google’s Threat Analysis Group (TAG) have published their findings about a group they have dubbed Coldriver. The group uses social engineering techniques to persuade their targets to open documents or download malware. TAG has created a YARA rule that cab help find the Spica backdoor.

article thumbnail

Facebook suspends Facial Recognition Program and deletes over 1bn face prints

CyberSecurity Insiders

The social media giant was found using the new tech to help tag people assisting blind and the visually impaired people in meeting their loved ones in near future. The social networking firm will no longer be storing any facial scans without the permission of its users.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mitigating Dynamic Application Risks with Secure Firewall Application Detectors

Cisco Security

Secure Firewall users are entitled with their base license to Application Visibility & Control for: Network traffic discovery with application-level insight. Implement fair-use policies and manage network congestion by optimizing application-level traffic. An application can have zero, one, or more tags.

Firewall 124
article thumbnail

North Korea-linked campaign targets security experts via social media

Security Affairs

Google TAG is warning that North Korea-linked hackers targeting security researchers through social media. Google Threat Analysis Group (TAG) is warning that North Korea-linked hackers targeting security researchers through social media. ” reads the TAG’s report. ” reads the TAG’s report.

Media 89
article thumbnail

Tracking the Trackers: For Better or Worse

SecureWorld News

These radios are being tracked and tagged by marketers, telecom companies and individuals in an effort to resell that data to parties willing to pay. Tiny BLE (Bluetooth Low Energy) tags are being placed in people’s vehicles, pockets, bags and other items on the move all the time.

article thumbnail

Top Telecom Companies in the world digitally compromised by China

CyberSecurity Insiders

Going deep into the details, Lior Div, the CEO of Cybereason confirmed the incident and tagged the espionage as a threat to national security and stated that such state sponsored espionage operations make customer lose trust on the telecom operators. And the compromised networks are among those belonging to companies from Southeast Asia.

Hacking 143
article thumbnail

Google TAG warns of Russia-linked APT groups targeting Ukraine

Security Affairs

The researchers from Google TAG are warning of Russia-linked threat actors targeting Ukraine with phishing campaigns. Russia-linked threat actors launched large-volume phishing campaigns against hundreds of users in Ukraine to gather intelligence and aimed at spreading disinformation, states Google’s Threat Analysis Group (TAG).