Generative Data Intelligence

Tag: APTs

DPRK Hackers Masquerade as Tech Recruiters, Job Seekers

North Korean threat actors are posing as both job recruiters and job seekers on the Web, deceiving companies and applicants for financial gain and,...

Amid Military Buildup, China Deploys Mustang Panda in the Philippines

During a dramatic military buildup in the South China Sea this summer, a Chinese state-linked advanced persistent threat (APT) managed to compromise an entity...

Shadowy Hack-for-Hire Group Behind Sprawling Web of Global Cyberattacks

A security vendor’s 11-month long review of non-public data obtained by investigative journalists at Reuters has corroborated previous reports tying an Indian hack-for-hire group...

Danish Energy Attacks Portend Targeting More Critical Infrastructure

In May, 22 Danish energy sector organizations were compromised in an onslaught of attacks partially linked with Russia's Sandworm APT.A new report from the...

‘KandyKorn’ macOS Malware Lures Crypto Engineers

The infamous North Korean advanced persistent threat (APT) group Lazarus has developed a form of macOS malware called "KandyKorn," which it is using to...

Cybersecurity at the Crossroads – Can it Keep Up with Threats?

The need of cybersecurity has become increasingly clear in a society dominated by digital communications. As technology advances, it creates new opportunities for creativity while also posing...

Patch Now: APTs Continue to Pummel WinRAR Bug

State-sponsored threat actors from Russia and China continue to throttle the remote code execution (RCE) WinRAR vulnerability in unpatched systems to deliver malware to...

EPA Turns Off Taps on Water Utility Cyber Regulations

TL;DR: Facing legal challenges from state AGs and water associations, the EPA decided to give up its fight to mandate cyber-risk assessments for water utilities...

Chinese ‘Stayin’ Alive’ Attacks Dance Onto Targets With Dumb Malware

Chinese advanced persistent threats (APTs) are known for being sophisticated, but the "ToddyCat" group is bucking the trend, compromising telecommunications organizations in Central and Southeast...

Top 5 Actionable Cybersecurity Tips for Financial Institutions

In a modern interconnected world, financial service providers face increasing challenges in safeguarding their sensitive data and maintaining the trust of their clients. The...

Stealth Falcon preying over Middle Eastern skies with Deadglyph

For years, the Middle East has maintained its reputation as a fertile ground for advanced persistent threats (APTs). In the midst of routine monitoring...

Welcome to the Resilience Revolution, Where Defenders Act More Like Attackers

Dark Reading News Desk interviewed Kelly Shortridge, senior principal at Fastly, at Black Hat USA 2023 about her research on fast-ever evolving defenders and...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?