Detailed Threat Analysis of Shamoon 2.0 Malware

DevOps. Machine learning. Faster decision making. The biggest trends in IT are helping us speed release cycles, get more insights, and improve operations like never before. But as IT begins adopting and optimizing these new strategies in their organization, there’s…

How Simulation Training is becoming an Integral part of Cyber Preparedness. (Recorded Webinar)

https://player.vimeo.com/video/428224232 Defining and testing a cyber incident response plan is a highly effective way of reducing the impact and duration of a real cyber incident. Detect and respond to cyber incidents in line with your organisation's response plan, based on…

COVID-19 | The Cybersecurity Effect of the Pandemic

By: Edem Glymin, Lead security and risk consultant for Global Secure Solutions Ghana Limited. How did we get here? Suddenly the world as we knew it came to a grinding halt and tottered on the brink of despair. In a…

Hackers Are Selling a Critical Zoom Zero-Day Exploit for $500,000

By Lorenzo Franceschi-Bicchierai , Source: Motherboad, Tech by VICE Hackers are selling two critical vulnerabilities for the video conferencing software Zoom that would allow someone to hack users and spy on their calls, Motherboard has learned. The two flaws are…

Vietnam-linked hackers targeted Chinese government over coronavirus response: researchers

By: Jack Stubbs, Raphael Satter Additional reporting by Muyu Xu in Beijing and James Pearson in Hanoi; Editing by Richard Chang  Source: Reuters LONDON/WASHINGTON (Reuters) - Hackers working in support of the Vietnamese government have attempted to break into Chinese…

Understanding SIM Card Forensics

By: Rohit Shaw Source: eforensicsmag References http://www.forensicmag.com/articles/2011/04/sim-forensics-part-1 http://www.infosecinstitute.com/courses/mobile-computer-forensics.html https://www.visualanalysis.com/ProductsVA_SIMpull.aspx http://csrc.nist.gov/groups/SNS/mobile_security/documents/mobile_forensics/Reference%20Mat-final-a.pdf The SIM (subscriber identity module) is a fundamental component of cellular phones. It’s also known as an integrated circuit card (ICC), which is a microcontroller-based access module. It is a…

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Source: krebsonsecurity The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly…