As cyber criminals grow ever more crafty with their tactics, enterprises are increasingly turning to threat intelligence, which — much like military threat intelligence — involves collecting, processing and analyzing data to determine behaviors, motives, and target areas. To help protect its enormous global network and secure the digital economy, payment giant Mastercard is increasingly […]
Author Archives: Onsite Computing, Inc.
In May 2020, Iranian attackers attempted to alter chlorine levels in drinking water in a cyber attack against an Israeli water utility, and in February 2021, a hacker actually accessed a Florida city’s water treatment plant monitoring software and changed the level of sodium hydroxide that would have gone into the drinking water system. Years […]
Threat actors have infected over 1.3 million TV streaming boxes running Android with a new Vo1d backdoor malware, allowing the attackers to take full control of the devices. […] Go to Source Author: Lawrence Abrams
Their findings highlight the frailty of some of the mechanisms for establishing trust on the Internet. Go to Source Author: Jai Vijayan, Contributing Writer
An attacker is using the tool to deploy a cryptominer and the Tsunami DDoS bot on compromised systems. Go to Source Author: Jai Vijayan, Contributing Writer
A technique to abuse Microsoft’s built-in source code editor has finally made it into the wild, thanks to China’s Mustang Panda APT. Go to Source Author: Nate Nelson, Contributing Writer
The dangerous ransomware group is targeting financial and insurance sectors using smishing and vishing against IT service desk administrators, cybersecurity teams, and other employees with top-level privileges. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Law enforcement seized electronics containing special hacking tools and software as well as a substantial amount of cash in the raids. Go to Source Author: Dark Reading Staff
