article thumbnail

Cyberspies tap free tools to make powerful malware framework

Network World

Over the past year, a group of attackers has managed to infect hundreds of computers belonging to government agencies with a malware framework stitched together from JavaScript code and publicly available tools. To read this article in full or to leave a comment, please click here

Malware 90
article thumbnail

Lazarus APT Targeting Cryptocurrency, CISA Warns

SecureWorld News

The threat actors use social engineering to encourage individuals to download trojanized cryptocurrency applications on Windows or macOS operating systems. They use the apps to gain access to the victim's computer and install malware across the network environment, stealing private keys and exploiting other security gaps.

Malware 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

Spanning a wide range of malicious activities from destructive malware and denial of service attacks, to the theft of intellectual property and even espionage, cyber threats pose a significant risk to any business. In recent years, multiple high-profile, high-impact breaches have raised awareness of the cyber threat. The Insider Threat.

How To 150
article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

government agencies such as the FAA, the IRS, the Department of the Defense, Department of Homeland Security, Centers for Medicare and Medicaid and NIST. Perhaps more relevant to security, MITRE maintains the Common Vulnerabilities and Exposures (CVE) system and the Common Weakness Enumeration (CWE) project.

Tools 40