Cyber Security News

Proof-Of-Concept Code for Curveball Released
Date

Proof-Of-Concept Code for Curveball Released

It seems like the start of the year is not complete without a new and dangerous vulnerability been disclosed to the public. Last year it was the Spectre and Meltdown CPU vulnerabilities. This year the new threat is posed by CVE-2020-0601, better known as Curveball. The vulnerability is described as

Iranian Data Wiper Strikes at Bahrain’s National Oil Company
Date

Iranian Data Wiper Strikes at Bahrain’s National Oil Company

With tensions near the boiling point between Iran and the US, news feeds across the globe have been dominated by headlines. The InfoSec community was also stirring with opinion pieces relating to Iran capabilities in carrying out cyberattacks. However, Iranian state-sponsored hackers are now in the

RDP Brute-Force Attacks Last between 2 and 3 Days
Date

RDP Brute-Force Attacks Last between 2 and 3 Days

In a recent blog article published by the Microsoft Defender, ATP Research Team reveals some interesting numbers regarding RDP brute-force attacks. The key findings of the research team include that brute-force attacks on RDP ports last an average of two to three days and only approximately 0.08% of

US Coast Guard announces it suffered a Ryuk Infection
Date

US Coast Guard announces it suffered a Ryuk Infection

The US Coast Guard announced that it had suffered a ransomware infection which resulted in the shutdown of a maritime facility for more than 30 hours. The security bulletin, published just before Christmas, also stated that the ransomware was Ryuk. The bulletin, however, makes no mention of the name

RuNet Disconnection Tests Successful According to Moscow
Date

RuNet Disconnection Tests Successful According to Moscow

On December 23, Russian news agencies began reporting that the government had concluded a series of tests designed to disconnect Russia from the Internet. The tests involved Russian government agencies, local internet service providers, and local Russian internet companies with the main aim of the t

Chinese APT Group Seen Bypassing 2FA
Date

Chinese APT Group Seen Bypassing 2FA

In a recent report security researchers have found evidence showing that a Chinese state-sponsored hacking group, APT20, has been able to bypass two-factor authentication (2FA) in a recent campaign. Advanced persistent threat (APT) groups are typically defined as groups, more often than not state-sp

Legion Loader Drops a Hornet’s Nest of Malware
Date

Legion Loader Drops a Hornet’s Nest of Malware

What could be worse than being infected by one piece of malware? The answer is painfully obvious, in that more than one infection is worse. What started as a lame joke may be a reality for organizations infected with Legion Loader. In a recent campaign discovered by researchers, a threat actor is at

Microsoft Reveals Fiendish Phishing Tactics
Date

Microsoft Reveals Fiendish Phishing Tactics

Phishing, namely the fraudulent attempt to gain an individual's personal information or credit card information via the use of emails and fake websites, continues to be a favored tactic employed by hackers to part users with money and information that can be used for identity theft. In a recent blog