IT threat evolution Q1 2019
Targeted attacks and malware campaigns Go Zebrocy Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last […] more…APT review of the year
What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them? Not an easy question to answer; everybody has partial visibility and it’s never possible to really understand the motivations of some attacks or the developments behind them. Still, with the benefit of hindsight, let’s […] more…More information
- Qatar Tracing App Flaw Exposed 1 Mn Users’ Data: Amnesty
- How to create documents (and more) with Gemini Canvas
- Samsung printers contain hardcoded backdoor account, US-CERT warns
- Vulnerability Impacts Web-Exposed SAP Systems
- CyberArk Expands Identity Security Play With $165M Acquisition of Zilla Security
- Update: Storm Update: CACTUS Changes Suspended
- Resolved: iTwo Version Upgrade to 12c
- Microsoft Internet Explorer CVE-2013-3845 Memory Corruption Vulnerability
- How SOPA protests were used to push CISPA
- Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers