Latest Entries »

two years of pawn storm

Pawn Storm—also known as Sednit, Fancy Bear, APT28, Sofacy, and STRONTIUM—is an active cyber espionage organization that has been very aggressive and ambitious in recent years.  Pawn Storm’s activities show that foreign and domestic espionage and influence on geopolitics are the group’s main motives, with targets that include armed forces, the defense industry, news media, and politicians. View full article »

Among all the Linux samples that we receive every day, we noticed one sample detected only by Dr.Web – their detection name was Linux.LuaBot. We deemed this to be suspicious as our detection rates for the Luabot family have generally been high. Upon analysis, it turned out that this was, indeed, a bot written in Lua, but it represents a new family, and is not related to previously seen Luabot malware.

https://www.welivesecurity.com/2017/04/25/linux-shishiga-malware-using-lua-scripts/

NASA’s Cassini spacecraft sped by the moon Titan on Saturday, using the hazy world’s gravity to slingshot the probe on a trailblazing trajectory to explore the region between Saturn’s hydrogen-helium atmosphere and the planet’s famous rings for the first time. View full article »

Unicode sleight of hand makes it hard for even savvy users to detect impostor sites.

View full article »

New botnet squadrons wage fiercer, more intense attacks on unsecured IoT devices.

View full article »

The future is open-source in this optimistic sci-fi disaster epic full of big ideas.

View full article »

Stealth_bomber

‘Stolen creds’ used to swipe data on aerospace giant’s staff

View full article »

Working on LHC photo copyright CERN

No downtime till 2018

View full article »

Is someone trying to build a botnet on Google Play? Check Point mobile threat researchers detected a new strain of malware on Google Play, Google’s official app store. The malware, dubbed “FalseGuide,” was hidden in more than 40 guide apps for games, the oldest of which was uploaded to Google Play on February 14, 2017. Several of the apps managed to reach more than 50,000 installs, and the total number of infected devices is estimated to reach up to 600,000 devices. View full article »

Overwarch

A recent survey by the Cloud Security Alliance found, among other things, that out of a sampling of 2,542 anomalous event alerts, only 23.2 percent were actual threats — the rest were false positives. This is one reason “alert fatigue” persists, plaguing security teams in many organizations and across industries. To fully understand the implications of alert fatigue and the role it plays in failing to prevent damaging breaches, it’s important to dig a little deeper into its causes. View full article »