Remove Government Remove Malware Remove Network Remove Nonprofit
article thumbnail

Cyberattack on Iranian Steel Industry Disrupts Operations

SecureWorld News

A hacking group by the name of Gonjeshke Darande (Farsi for Predatory Sparrow) hit the networks of three of Iran's largest steel companies: Khouzestan Steel, Hormozgan Steel, and Mobarakeh Steel. The sequel to Stuxnet? A cyberattack this week has put Iranian steel manufacturing in the crosshairs.

article thumbnail

Should You Have a Business Email Compromise Incident Response Plan?

SecureWorld News

Reconnaissance - BEC actors perform reconnaissance on potential victims, compiling lists of potential targets, visiting company websites, social media, and networking websites. Weaponization - While most BEC attacks don't involve malware, it isn't completely unheard of. Should you have a BEC Incident Response Plan?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The anatomy of a Facebook account heist

Vox

While many people might think of Russian state-sponsored hacking groups when it comes to infiltrating social media platforms, there’s actually a global network of hackers participating in an underground economy where things like Facebook and Instagram accounts are commodities. Exactly how hackers go after legitimate accounts varies.

Groups 141
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Anyway, what Chenxification does for example is frustrate computer malware's ability to locate and extract an application's decryption key. We sold the company to Palo Alto Networks, I think less than four years from its founding date, which is a very interesting growth story, obviously. Christian Colberg is credited with the term.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

They also had a piece of malware called killdisk position on the systems so that when the systems rebooted, it would kick off deleting all the files and deleting all the systems. It was a masterful piece of malware, carefully crafted to achieve a specific goal. They spent that time researching and understanding the environment.

System 52
article thumbnail

GeekWire Awards 2020 revealed: Big winners, celebrities and surprises power virtual event

GeekWire

Department of Energy’s broad network of government-funded research institutions across the country, PNNL’s research on national security and energy is worthy of recognition. PNNL’s VaporID project aims to advance detection of nuclear explosions and malware. Part of the U.S.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

You got into a network. But I was given a Class A network, and I deployed as many snort sensors on it all over. Let's analyze malware. It seems like it was just there to have a network of people to try to approach us. We just wanted to explore the phone networks. That doesn’t happen today. What would I do?