Security News

Implementing Defense in Depth to Prevent and Mitigate Cyber Attacks
2022-10-28 10:43

For organizations to thrive in this era of technology, they must develop robust security strategies to detect and mitigate attacks. Defense in depth is a strategy in which companies use multiple layers of security measures to safeguard assets.

Why Crypto Winter is No Excuse to Let Your Cyber Defenses Falter
2022-10-17 10:20

Even as cryptocurrencies lose value - and some crypto companies file for bankruptcy - cryptojacking still poses an urgent threat to enterprises across industries, from financial services to healthcare to industry 4.0 and beyond. Broadly speaking, cryptojacking is defined as the unauthorized and illegitimate use of an unwitting party's compute and/or server power by a malicious actor to mine cryptocurrencies.

Educational institutions must reverse their backward approach to cyber defense
2022-10-14 04:30

As schools have become more digital, they've taken a somewhat backward approach to cybersecurity, historically moving slowly, and have weak cybersecurity controls and protocols. In this Help Net Security video, Raj Dodhiawala, CEO at Remediant, talks about how this situation is due to longer cycles for IT budgetary and staffing processes, a higher turnover rate, and lower continuity in IT security projects and skills.

FBI, CISA, and NSA Reveal How Hackers Targeted a Defense Industrial Base Organization
2022-10-05 08:12

U.S. cybersecurity and intelligence agencies on Tuesday disclosed that multiple nation-state hacking groups potentially targeted a "Defense Industrial Base Sector organization's enterprise network" as part of a cyber espionage campaign. " actors used an open-source toolkit called Impacket to gain their foothold within the environment and further compromise the network, and also used a custom data exfiltration tool, CovalentStealer, to steal the victim's sensitive data," the authorities said.

Hackers stole data from US defense org using Impacket, CovalentStealer
2022-10-04 23:08

The U.S. Government today released an alert about state-backed hackers using a custom CovalentStealer malware and the Impacket framework to steal sensitive data from a U.S. organization in the Defense Industrial Base sector. The hackers combined custom malware called CovalentStealer, the open-source Impacket collection of Python classes, the HyperBro remote access trojan, and well over a dozen ChinaChopper webshell samples.

US Govt: Hackers stole data from US defense org using new malware
2022-10-04 23:08

The U.S. Government today released an alert about state-backed hackers using a custom 'CovalentStealer' malware and the Impacket framework to steal sensitive data from a U.S. organization in the Defense Industrial Base sector. The hackers combined custom malware called CovalentStealer, the open-source Impacket collection of Python classes, the HyperBro remote access trojan, and well over a dozen ChinaChopper webshell samples.

BlackCat malware lashes out at US defense IT contractor
2022-10-02 08:47

The BlackCat ransomware gang, also known as ALPHV, has allegedly broken into IT firm NJVC, a provider of services to civilian US government agencies and the Department of Defense. DarkFeed, which monitors the dark web for ransomware intelligence, tweeted this week that BlackCat had added NJVC to its victims' list, along with sharing a screenshot allegedly of ALPHV's blog notifying NJVC that it had stolen data during its intrusion.

New PsExec spinoff lets hackers bypass network security defenses
2022-09-13 13:37

Security researchers have developed an implementation of the Sysinternals PsExec utility that allows moving laterally in a network using a single, less monitored port, Windows TCP port 135. While the original PsExec is available in the Sysinternals utility suite, there is also an implementation in the Impacket collection of Python classes for working with network protocols, which has support for SMB and other protocols like IP, UDP, TCP that enable connections for HTTP, LDAP, and Microsoft SQL Server.

Cyberthreats Racing Ahead of Your Defenses? Security-Driven Networking Can Put a Stop to That
2022-08-26 00:00

"Enterprises of all shapes and sizes were deep into the process called digital transformation before the COVID-19 virus hit the world. Digital transformation is"a catchall term for describing the implementation of new technologies, talent, and processes to improve business operations. Now, on the other side of the pandemic, most organizations are accelerating their digital business initiatives2 to meet the demands of the hybrid, work from-anywhere workforce.

China-linked spies used six backdoors to steal info from defense, industrial enterprise orgs
2022-08-09 00:23

Beijing-backed cyberspies used specially crafted phishing emails and six different backdoors to break into and then steal confidential data from military and industrial groups, government agencies and other public institutions, according to Kaspersky researchers. "The attackers were able to penetrate dozens of enterprises and even hijack the IT infrastructure of some, taking control of systems used to manage security solutions," the team wrote in a report published on Monday.