APT34 targets Jordan Government using new Saitama backdoor

A deep dive into a sophisticated attack that used the Saitama backdoor.

Read more

Has your WordPress site been backdoored by a skimmer?

There are threat actors active that plant backdoors on websites so their malicious code does not get wiped with the next update.

Read more

Kimsuky APT continues to target South Korean government using AppleSeed backdoor

Kimsuky, the North Korean threat actor active since 2012, is still targeting the South Korean government. We take a look at the phishing infrastructure and command and control mechanisms of this APT.

Read more

Signal app insists it’s so private it can’t provide subpoenaed call data

Signal told investigators it could not comply with a legal request for user records and communications because the records do not exist.

Read more

SolarWinds advanced cyberattack: What happened and what to do now

Possibly the largest hacking operation of 2020 was just unveiled. In this blog we share what we know and what you should do right now.

Read more

Going dark: encryption and law enforcement

There’s been a lot of talk recently about encryption and how law enforcement can’t convict criminals without encryption keys. We beg to differ.

Read more

New version of IcedID Trojan uses steganographic payloads

We take a deep dive into the IcedID Trojan, describing the new payloads of this advanced malware.

Read more

Backdoors are a security vulnerability

Upset by their inability to access potentially vital evidence for criminal investigations, the federal government has, for years, pushed to convince tech companies to build backdoors that will, allegedly, only be used by law enforcement agencies. The problem, cybersecurity researchers say, is that those backdoors can easily be exploited by criminals.

Read more

A week in security (July 15 – 21)

A roundup of cybersecurity news from July 15–21, including the Zoom camera vulnerability, Extenbro, Sodinokibi, Magecart, and cybersecurity challenges facing the education sector.

Read more

Mac malware combines EmPyre backdoor and XMRig miner

New Mac malware is using the EmPyre backdoor and the XMRig cryptominer to drain processor power—and possibly worse.

Read more

Select your language