IT threat evolution Q1 2019
Targeted attacks and malware campaigns Go Zebrocy Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last […] more…DNS Manipulation in Venezuela in regards to the Humanitarian Aid Campaign
Venezuela is a country facing an uncertain moment in its history. Reports suggests it is in significant need of humanitarian aid. On February 10th, Mr. Juan Guaidó made a public call asking for volunteers to join a new movement called “Voluntarios por Venezuela” (Volunteers for Venezuela). According to the media, it already numbers thousands of […] more…More information
- How valid are the security concerns over Huawei and ZTE products?
- Microsoft Internet Explorer Scripting Engine CVE-2019-0920 Remote Memory Corruption Vulnerability
- China Is the World’s Biggest Face Recognition Dealer
- How can the NSA monitor computers that are offline?
- Eric Goldstein Leaving CISA for Private Sector Role
- Password Security & Password Managers
- US Government Taking Creative Steps to Counter Cyberthreats
- Apple posts record sales, says Watch to ship in April
- Britain’s Draft Internet Spying Law Threatens Key Rights: UN Experts
- Spring4Shell Exploitation Attempts Confirmed as Patches Are Released