article thumbnail

Cyberattack on Iranian Steel Industry Disrupts Operations

SecureWorld News

Their analysis identified the malware as a variant of the Meteor data-wiping malware that targeted Iran's national railway system and government in 2021. Security researchers from Check Point documented their findings on the incident.

article thumbnail

ACC Foundation Releases Extensive State of Cybersecurity Report

CTOvision

Employee error was the most frequent cause of a breach (24%), followed by inside jobs (15%), phishing (12%), access through a third party (12%), lost laptop or device (9%), application vulnerability (7%), and malware (7%). PPL forms program for nonprofit groups (republicanherald.com). About Ballard Spahr. About the ACC Foundation.

Report 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Should You Have a Business Email Compromise Incident Response Plan?

SecureWorld News

Weaponization - While most BEC attacks don't involve malware, it isn't completely unheard of. Exploitation and Actions on the Objective – Typically, the exploited vulnerability is a human, someone who can be tricked through social engineering rather than malware. Should you have a BEC Incident Response Plan?

article thumbnail

The anatomy of a Facebook account heist

Vox

He now works as a threat hunter at the National Cyber Security Center (NCSC) in Vietnam, in addition to serving as the co-founder of Chống Lừa Đảo, an anti-scam nonprofit. A reverse image search led to a government database that revealed the hacker’s real name and place of residence in Cao Lãnh, a city in southern Vietnam.

Groups 142
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Anyway, what Chenxification does for example is frustrate computer malware's ability to locate and extract an application's decryption key. So I also have recently launched a nonprofit called the Forte group. It was around this time that she developed something called Chenxification, which she insists was not her term.

article thumbnail

GeekWire Awards 2020 revealed: Big winners, celebrities and surprises power virtual event

GeekWire

Department of Energy’s broad network of government-funded research institutions across the country, PNNL’s research on national security and energy is worthy of recognition. PNNL’s VaporID project aims to advance detection of nuclear explosions and malware. Part of the U.S.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

They also had a piece of malware called killdisk position on the systems so that when the systems rebooted, it would kick off deleting all the files and deleting all the systems. It was a masterful piece of malware, carefully crafted to achieve a specific goal. When they did that. The wireless Bill has been around for quite some time.

System 52