Anatomy of an Attack on the Industrial IoT
How cyber vulnerabilities on sensors can lead to production outage and financial loss. Source: Vulnerabilitys & Threats
View ArticleA Timeline of APT28 Activity
APT28 (aka Fancy Bear, aka Pawn Storm, aka Sednit, aka Sofacy, aka Group 74, aka Sednit, aka Sofacy, aka Strontium, aka Threat Group-4127) finds its way into the news with some regularity. Most...
View ArticleWTB: OopsIE! OilRig Uses ThreeDollars to Deliver New Trojan
The intelligence in this week’s iteration discuss the following threats: APT37, ASMI Bypassing, Bank Account Breaches, Business Email Compromises, Cryptojacking, NetwiredRC, OilRig, OMG Botnet and...
View ArticleWe’re All Vulnerable in the Internet of Things
A short while ago, if you’d asked me which countries in the world were the least vulnerable to cyber security breaches, I would have said “the richest ones, of course! They can afford all the security...
View ArticleWhy Cryptocurrencies Are Dangerous for Enterprises
When employees mine coins with work computers, much can go wrong. But there are some ways to stay safe. Source: Vulnerabilitys & Threats
View ArticleMeasuring the Effectiveness of Threat Feeds
We do a lot of important and sometimes complicated things as we try to defend organizations from cyber attacks. One thing that often gets left behind, or at least isn’t done as effectively as it could...
View ArticleCERT.org Goes Away, Panic Ensues
Turns out the Carnegie Mellon CERT just moved to a newly revamped CMU Software Engineering Institute website. Source: Vulnerabilitys & Threats
View ArticleWTB: GitHub Survived the Biggest DDoS Attack Ever Recorded
The intelligence in this week’s iteration discuss the following threats: APT, Cyber espionage, Credit and debit card theft, Data breach, Data theft, DDoS attacks, Malicious applications, Misconfigured...
View ArticleResearch: Potential and Realized Threats to the United Kingdom
Anomali recently conducted research to assess the threat landscape of the United Kingdom and determine where adversaries may choose to focus their attention. The report examines various Critical...
View ArticleHacker Tactics – Part 4: Cryptominers
Adversaries are constantly changing and improving how they attack us. In this six-part series we’ll explore new or advanced tactics used by threat actors to circumvent even the most cutting-edge...
View Article