News
-
"Advanced Phishing Attacks Surge 356% in 2022"Security researchers at Perception Point have observed a 356% growth in the number of advanced phishing attacks attempted by threat actors in 2022. The total number of cyberattacks increased by 87%. The researchers noted that among the…
-
"Group-IB: Qilin Affiliates Receive Up to 85% Of Each Ransomware Payout"In March 2023, Group-IB researchers infiltrated the Qilin ransomware group and discovered that affiliates received 80 to 85 percent of each ransomware payout. The researchers infiltrated Tox, an encrypted messaging app used by members of the Qilin…
-
"How the ILOVEYOU Worm Exposed Human Beings as the Achilles Heel of Cybersecurity"The CTO of CTERA, Aron Brand, discusses how the ILOVEYOU virus ushered in the era of social engineering in the digital world. The digital world experienced a cyberattack in 2000 that altered the approach to cybersecurity. The ILOVEYOU worm, also known as…
-
"Chip-Based QKD Achieves Higher Transmission Speeds"Researchers have developed a Quantum Key Distribution (QKD) system based on integrated photonics that is capable of transmitting secure keys at unprecedented speeds. The proof-of-principle experiments are a significant step toward implementing this…
-
"Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry"Dark Frost is a new botnet launching Distributed Denial-of-Service (DDoS) attacks against the gaming industry. According to a new technical analysis by Akamai security researcher Allen West, the Dark Frost botnet, modeled after Gafgyt, QBot, Mirai, and…
-
"Predator: Looking Under the Hood of Intellexa's Android Spyware"Security researchers at Cisco Talos and the Citizen Lab conducted a technical analysis of the commercial Android spyware named "Predator" and its loader called "Alien," detailing its data-theft capabilities and other operations. Predator is a commercial…
-
"Phishers Use Encrypted File Attachments to Steal Microsoft 365 Account Credentials"Attackers are using encrypted restricted-permission messages (.rpmsg) attached to phishing emails in order to steal Microsoft 365 account credentials. According to researchers from Trustwave, the campaigns are low-volume, targeted, and use trusted cloud…
-
"Lazarus Group Striking Vulnerable Windows IIS Web Servers"The North Korea-backed threat actor Lazarus Group has made changes to its ongoing espionage campaign by exploiting known vulnerabilities in unpatched Windows IIS Web servers to launch its reconnaissance malware. AhnLab Security Response Center (ASEC)…
-
"The Challenge of Adversarial Machine Learning"Researchers at Carnegie Mellon University's (CMU) Software Engineering Institute (SEI) have published a blog post explaining the concept of adversarial Machine Learning (ML) as well as examining the motivations of adversaries and what researchers are…
-
"Researchers Uncover Russia-Linked Malware That Could Immobilize Electric Grids"Researchers have discovered new malware for Industrial Control Systems (ICS), dubbed "CosmicEnergy," which could be used to disrupt critical infrastructure systems and electric grids. CosmicEnergy was discovered by researchers at Mandiant, who compared…
-
"More APTs Eye Managed Service Providers in Supply Chain Attacks"Sophisticated threat groups are increasingly compromising Managed Service Providers (MSPs) and launching supply chain attacks against their small and medium-sized downstream customers. The analysis of data from more than 200,000 small and medium-sized…
-
"Telegram Emerges as Criminals' Top Choice for Handling Stolen Information"In 2022, the cybersecurity firm Group-IB identified nearly 3,700 different phishing kits, a 25 percent increase from 2021. A phishing kit is a collection of tools used to execute widespread phishing campaigns. Typically, threat actors manage stolen data…