article thumbnail

North Korean APT Uses Fake Job Offers as Linux Malware Lure

SecureWorld News

ESET researchers have discovered a new Lazarus Group campaign targeting Linux users. To our knowledge, this is the first public mention of this major North Korea-aligned threat actor using Linux malware as part of this operation." Standard malware that requires user intervention can be prevented by avoiding risky clicks.

Malware 67
article thumbnail

4 Ways North Korea Is Targeting Security Researchers

SecureWorld News

Security researchers are some of the unsung heroes within the cybersecurity field. Google's Threat Analysis Group (TAG) has been working for several months to try to identify who is behind an ongoing campaign targeting security researchers, specifically those who work on vulnerability research and development at a variety of organizations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyberattacks Ramp Up in Arab Countries for World Cup

SecureWorld News

Just as cyber criminals use holidays as an avenue to catch shoppers and companies off guard, bad actors are using soccer's biggest every-four-year event as a time to catch enterprises too far off their back touch line to net harmful results. For more on each, see the report.

Malware 68
article thumbnail

Microsoft will let IT admins send Windows 11 desktop or taskbar messages

The Verge

These messages are certainly an improvement over the net send command from the Windows XP era, which allowed IT admins to send a pop-up message to PCs. As with any messages, these could be met with criticism from end users or security researchers if they’re overused by organizations.

Windows 98
article thumbnail

DOE’s secret weapon: Supercomputers, Developers Scramble to Build NSA-Proof Email and more

CTOvision

“Many of the department’s supercomputing resources are devoted only to the highest impact, breakthrough research.” Via Net Security, more here. The malware is now attacking a known Java vulnerability, CVE-2013-2465, and added water holing to its propagation strategy, according to new research from Kaspersky Lab.”

article thumbnail

Fed Tech Roundup July 31

CTOvision

Invincea Researchers to Present on Overcoming Security Data Science Challenges and Improving Malware Analysis with Graphical Images at Black Hat USA 2015 Conference. Consumers Rant to FCC about Net Neutrality - Nextgov. National lab trades in two MDM services for Citrix - GCN.com. NASA's Spitzer Confirms Closest Rocky Exoplanet.

article thumbnail

Bidding Open on DHS’ $6B Security Hub, House report stresses sharing

CTOvision

Oil, gas field sensors vulnerable to attack via radio waves - Researchers at IOActive have found a multitude of vulnerabilities in oil and gas field sensors. Via Net Security, more here. It could also increase the ability of the IC agencies to share data with each other. Via Defense News, more here.

Symantec 226