Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 11 to 20
Vietnamese Threat Actors APT32 Targeting Wuhan Government And Chinese Ministry Of Emergency Management In Latest Example Of COVID-19 Related...
22nd Apr 2020 [one month ago] from FireEye Research
From at least January to April 2020, suspected Vietnamese actorsAPT32 carried out intrusion campaigns against Chinese targets thatMandiant Threat Intelligence believes was designed to collectintelligence on the COVID-19 crisis. Spear phishing...
How Gamification Can Boost Your Cybersecurity Training
21st Apr 2020 [one month ago] from ESET Research
Security is not a game, but learning about it could be – here’s why adding the fun factor can help employees become more cyber-aware The post How gamification can boost your cybersecurity training appeared first on WeLiveSecurity
Exposed Redis Instances Abused For Remote Code Execution, Cryptocurrency Mining
21st Apr 2020 [one month ago] from TrendMicro
By David Fiser and Jaromir Horejsi (Threat Researchers) Recently, we wrote an article about more than 8,000 unsecured Redis instances found in the cloud. In this article, we expound on how these instances can be abused to perform remote...
Work From Home: Should Your Digital Assistant Be On Or Off?
20th Apr 2020 [one month ago] from ESET Research
Being at your beck and call is central to the "personality" of your digital friend, but there are situations when the device could use some time off The post Work from home: Should your digital assistant be on or off? appeared first on...
Hey There! Are You Using WhatsApp? Your Account May Be Hackable
20th Apr 2020 [one month ago] from ESET Research
Can someone take control of your WhatsApp account by just knowing your phone number? We ran a small test to find out. The post Hey there! Are you using WhatsApp? Your account may be hackable appeared first on WeLiveSecurity
Grouping Linux IoT Malware Samples With Trend Micro ELF Hash
20th Apr 2020 [one month ago] from TrendMicro
We created Trend Micro ELF Hash (telfhash), an open-source clustering algorithm that effectively clusters Linux IoT malware created using ELF files. The post Grouping Linux IoT Malware Samples With Trend Micro ELF Hash appeared first on...
Who’s Behind The “Reopen” Domain Surge?
20th Apr 2020 [one month ago] from Krebsonsecurity
The past few weeks have seen a large number of new domain registrations beginning with the word "reopen" and ending with U.S. city or state names. The largest number of them were created just hours after President Trump sent a series of...
Separating The Signal From The Noise: How Mandiant Intelligence Rates Vulnerabilities — Intelligence For Vulnerability Management, Part...
20th Apr 2020 [one month ago] from FireEye Research
One of the critical strategic and tactical roles that cyber threatintelligence (CTI) plays is in the tracking, analysis, andprioritization of software vulnerabilities that could potentiallyput an organization’s data, employees and customers...
Gamaredon APT Group Use Covid-19 Lure In Campaigns
17th Apr 2020 [one month ago] from TrendMicro
In March, we came across an email with a malware attachment that used the Gamaredon group’s tactics. Some of the emails used the coronavirus pandemic as a topic to lure victims into opening emails and attachments. The post Gamaredon APT...
Apple Releases Mobility Data To Help Combat COVID‑19
16th Apr 2020 [one month ago] from ESET Research
The tool, which comes after a similar effort by Google, looks at how people’s traveling behavior has changed since the start of the pandemic The post Apple releases mobility data to help combat COVID‑19 appeared first on...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »