Zephyrnet Logo

Tag: APTs

Ransomware driving professionalisation of cyber crime collaborations, reports WithSecure | IoT Now News & Reports

Helsinki, Finland. 25 May 2023 – The success of ransomware gangs has spurred a significant trend of professionalisation amongst cyber criminals where different groups...

APTs target MSP access to customer networks – Week in security with Tony Anscombe

The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned...

How North Korean APT Overcomes Macro-Blocking Using LNK Switch-Up

North Korea has been known to be a hotbed of cybercrime, with the country's government-sponsored hacking groups, also known as Advanced Persistent Threats (APTs),...

APT groups muddying the waters for MSPs

A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers ESET...

North Korea’s Kimsuky APT Keeps Growing, Despite Public Outing

Globally, interest has surged around North Korea's Kimsuky advanced persistent threat group (a.k.a. APT43) and its hallmarks. Still, the group is showing no signs...

The Pope’s Security Gets a Boost With Vatican’s MDM Move

The world's smallest and most antiquated army is taking a step towards modernizing its cyber defenses.Just ahead of the pre-Easter Holy Week for Catholics,...

Vulkan Playbook Leak Exposes Russia’s Plans for Worldwide Cyberwar

The release of thousands of pages of confidential documents has exposed Russian military and intelligence agencies' grand plans for using their cyberwar capabilities in...

Cybersecurity in this era of polycrisis

Geopolitical tensions are increasing cyber risks while cyberattacks exacerbate geopolitical dynamics. Given the likelihood of a prolonged war in Ukraine and of a renewed...

ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022

And that’s just the tip of the iceberg when it comes to the trends that defined the cyberthreat landscape in the final four...

‘New Class of Bugs’ in Apple Devices Opens the Door to Complete Takeover

A new class of bugs in Apple's iOS, iPadOS, and macOS has been uncovered, researchers say, that could allow an attacker to escalate privileges...

The Evolution of Account Takeover Attacks: Initial Access Brokers for IoT

Account takeover attacks are like the widely told campfire story about a babysitter that receives a series of threatening phone calls that are traced...

Navigating the evolving landscape of cyber threats by utilizing advanced data analytics

Cybersecurity analytics tools are essential for organizations to protect against cyber attacks and breaches. Cybersecurity is a critical concern for organizations of all sizes...

Latest Intelligence

spot_img
spot_img