APT43: An investigation into the North Korean group’s cybercrime operations
Introduction As recently reported by our Mandiant’s colleagues, APT43 is a threat actor believed to be associated with North Korea. APT43’s main targets include governmental institutions, research groups, think tanks, business services, and the manufacturing sector, with most victims located in the United States and South Korea. The group uses a variety of techniques and […] more…Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads
by Erika Mendoza, Anjali Patil and Jay Yaneza While most phishing campaigns are fairly simplistic in nature and easy to spot (they usually involve a legitimate-looking email, often with a malicious attachment or link embedded in the text), a spam campaign we observed in September indicates attackers are angling towards a more sophisticated form of phishing. […] more…More information
- Shell Logins as a Magento Reinfection Vector
- Doomsday malware: It’s only a matter of time
- S3 Ep130: Open the garage bay doors, HAL [Audio + Text]
- Unpatched Flaws Plague Sierra Wireless Industrial Gateways
- ‘Looney Tunables’ Glibc Vulnerability Exploited in Cloud Attacks
- Perl.com gets its domain back – normal service restored!
- NetApp’s Spot PC: a foundation for a new desktop paradigm?
- ScholarSphere service interruption, 05/16/2016
- Many Security Professionals Don’t Understand Modern Malware
- Heartland CEO On Why Retailers Keep Getting Breached