Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 129

Mar 8, 2021

Researchers Find 3 New Malware Strains Used by SolarWinds Hackers

Posted by in category: cybercrime/malcode

FireEye and Microsoft on Thursday said they discovered three more malware strains in connection with the SolarWinds supply-chain attack, including a “sophisticated second-stage backdoor,” as the investigation into the sprawling espionage campaign continues to yield fresh clues about the threat actor’s tactics and techniques.

Dubbed GoldMax (aka SUNSHUTTLE), GoldFinder, and Sibot, the new set of malware adds to a growing list of malicious tools such as Sunspot, Sunburst (or Solorigate), Teardrop, and Raindrop that were stealthily delivered to enterprise networks by alleged Russian operatives.

Mar 7, 2021

Thousands of Microsoft Customers May Have Been Victims of Hack Tied to China

Posted by in categories: business, cybercrime/malcode, government

The hackers started their attack in January but escalated their efforts in recent weeks, security experts say. Business and government agencies were affected.

Mar 4, 2021

U.S. issues warning after Microsoft says China hacked its mail server program

Posted by in categories: cybercrime/malcode, government

All federal government agencies have until noon Friday to download the latest software update to block the perpetrator.


The U.S. has issued an emergency warning after Microsoft said it caught China hacking into its mail and calendar server program, called Exchange.

Mar 2, 2021

Technologies to Rapidly Restore the Electrical Grid after Cyberattack Come Online

Posted by in categories: cybercrime/malcode, energy

Under our RADICS program, researchers developed tools to aid in the rapid recovery of our power grids amidst a cyberattack. Today we’re spotlighting the program’s many accomplishments: https://www.darpa.mil/news-events/2021-02-23

/photo/1

Feb 26, 2021

Red Canary researchers find evidence of malware on 30,000 infected Apple computers

Posted by in category: cybercrime/malcode

A team of researchers at security firm Red Canary has found evidence of a new kind of malware infecting Apple brand computers. They claim on their website that they have found evidence of the malware, which they have named Silver Sparrow, infecting up to 30000 Mac computers.

Feb 22, 2021

30,000 Macs infected with new Silver Sparrow malware

Posted by in category: cybercrime/malcode

Silver Sparrow can even run on systems with Apple’s new M1 chip.

Feb 22, 2021

Deepfake Voice Technology Iterates on Old Phishing Strategies

Posted by in categories: cybercrime/malcode, robotics/AI

As the world of AI and deepfake technology grows more complex, the risk that deepfakes pose to firms and individuals grows increasingly potent.

Feb 21, 2021

Cybersecurity, Emerging Tech, Risk Management — Winter 2021 Writings & Media

Posted by in categories: cybercrime/malcode, energy

These three pillars of cybersecurity risk management need not stand alone. In fact, they all should be incorporated together in cybersecurity framework strategy to identify gaps, mitigate threats, and build resilience in the case of an inevitable cyberattack. Of course, there are many other elements and protocols associated with utilization of these cyber risk management pillars. Combining them creates a more holistic mindset that also makes it easier to plan and adapt. With the growing sophistication of global cyber-threats and the expanding digital attack surface, a vigilant three pillar approach makes good sense.

Chuck Brooks, President of Brooks Consulting International, is a globally recognized thought leader and evangelist for Cybersecurity and Emerging Technologies. LinkedIn named Chuck as one of “The Top 5 Tech Experts to Follow on LinkedIn.” Chuck was named as a 2020 top leader and influencer in “Who’s Who in Cybersecurity” by Onalytica. He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance,” and by IFSEC as the “#2 Global Cybersecurity Influencer.” He was named by The Potomac Officers Club and Executive Mosaic and GovCon as at “One of The Top Five Executives to Watch in GovCon Cybersecurity. Chuck is a two-time Presidential appointee who was an original member of the Department of Homeland Security. Chuck has been a featured speaker at numerous conferences and events including presenting before the G20 country meeting on energy cybersecurity.

Feb 13, 2021

A Billion-Dollar Dark Web Crime Lord Calls It Quits

Posted by in category: cybercrime/malcode

The “big hack” redux, riot planning on Facebook, and more of the week’s top security news.

Feb 13, 2021

Researchers hack Xbox console to develop nanoscale medical 3D printer

Posted by in categories: biotech/medical, cybercrime/malcode, nanotechnology

Researchers from the Technical University of Denmark (DTU) have repurposed a component from a Microsoft Xbox 360 to develop a high-resolution large-volume nanoscale 3D printer with various applications in the medical sector.

The team took an optical pick-up unit (OPU) component from an Xbox 360 console to replace a conventional Stereolithography (SLA) optical system, in order to drastically simplify the SLA 3D printing system. With the OPU costing less than $5, the researcher’s solution could potentially increase the affordability of such equipment by thousands of pounds.

“With our 3D printer that can print micro and nanoscale 3D objects, we are able to go from tens of micrometers in printing resolution down to hundreds of nanometers without expensive specialized components,” said DTU PhD Student Tien-Jen Chang and research team member.