Mysterious Hackers Hid Their Swiss Army Spyware for 5 Years

Credit to Author: Andy Greenberg| Date: Wed, 10 Apr 2019 03:30:00 +0000
The TajMahal spyware includes more than 80 distinct spy tools, and went undetected for five years.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Andy Greenberg| Date: Wed, 10 Apr 2019 03:30:00 +0000
The TajMahal spyware includes more than 80 distinct spy tools, and went undetected for five years.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 10 Apr 2019 02:30:00 +0000
Innovations in digital payment system attack methods mean the rash of heists isn’t over.
Read MoreCredit to Author: Kacy Zurkus| Date: Wed, 10 Apr 2019 15:00:00 +0000
![]() | |
| Because medical records are such a lucrative data set, attackers often target the healthcare industry, seeking out and eventually finding the weakest link in the supply chain. That’s why it’s important for stakeholders to consider the broader implications of cybersecurity weaknesses in medical management apps. But who should be held responsible? Categories: Tags: Data privacyhealth appshealthcareHIPPAmedical appsmedical management appsvulnerabilities |
The post Who is managing the security of medical management apps? appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Todd VanderArk| Date: Wed, 10 Apr 2019 16:00:20 +0000
Learn about the four cyber hygiene best practices recommended in the 24th edition of the Microsoft Security Intelligence Report (SIR) to help reduce your risk of attack.
The post 4 tried-and-true prevention strategies for enterprise-level security appeared first on Microsoft Security.
Read MoreCredit to Author: Todd VanderArk| Date: Wed, 10 Apr 2019 16:00:06 +0000
Learn how compound detection can help you apply the law of data gravity and correlate insights across your security platforms.
The post Building the security operations center of tomorrow—better insights with compound detection appeared first on Microsoft Security.
Read MoreCredit to Author: Eric Avena| Date: Wed, 10 Apr 2019 15:00:58 +0000
A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.
The post Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability appeared first on Microsoft Security.
Read MoreCredit to Author: Jeffrey Esposito| Date: Wed, 10 Apr 2019 13:51:05 +0000
Jay Rosenberg of GReAT joins Jeff and Ahmed to recap the second day of the Security Analyst Summit in Singapore.
Read MoreCredit to Author: Kaspersky Team| Date: Wed, 10 Apr 2019 04:30:12 +0000
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
Read More