22 Ott

'Lone Wolf' Hacker Group Targeting Afghanistan and India with Commodity RATsThe Hacker News

A new malware campaign targeting Afghanistan and India is exploiting a now-patched, 20-year-old flaw affecting Microsoft Office to deploy an array of commodity remote access trojans (RATs) that allow the adversary to gain complete control over the compromised endpoints. Cisco Talos...

By

,

Commenti disabilitati su ‘Lone Wolf’ Hacker Group Targeting Afghanistan and India with Commodity RATsThe Hacker News Read More
22 Ott

Hackers Set Up Fake Company to Get IT Experts to Launch Ransomware AttacksThe Hacker News

The financially motivated FIN7 cybercrime gang has masqueraded as yet another fictitious cybersecurity company called "Bastion Secure" to recruit unwitting software engineers under the guise of penetration testing in a likely lead-up to a ransomware scheme. "With FIN7's latest fake company,...

By

,

Commenti disabilitati su Hackers Set Up Fake Company to Get IT Experts to Launch Ransomware AttacksThe Hacker News Read More
22 Ott

Researchers Discover Microsoft-Signed FiveSys Rootkit in the WildThe Hacker News

A newly identified rootkit has been found with a valid digital signature issued by Microsoft that's used to proxy traffic to internet addresses of interest to the attackers for over a year targeting online gamers in China. Bucharest-headquartered cybersecurity technology company...

By

,

Commenti disabilitati su Researchers Discover Microsoft-Signed FiveSys Rootkit in the WildThe Hacker News Read More
22 Ott

P.A: linee guida, smart work ruoti, lavoro prevalente sia in presenza

Lo si legge nelle linee guida presentate oggi dal ministro della Pubblica amministrazione Renato Brunetta ai sindacati. Previste 11 ore di fascia di disconnessioneRead MoreRSS di - ANSA.it

By

,

Commenti disabilitati su P.A: linee guida, smart work ruoti, lavoro prevalente sia in presenza Read More
21 Ott

Before and After a Pen Test: Steps to Get Through ItThe Hacker News

An effective cybersecurity strategy can be challenging to implement correctly and often involves many layers of security. Part of a robust security strategy involves performing what is known as a penetration test (pen test). The penetration test helps to discover...

By

,

Commenti disabilitati su Before and After a Pen Test: Steps to Get Through ItThe Hacker News Read More