Feature | SC Media

Feature

'Havex' malware strikes industrial sector via watering hole attacks

Second Triton/Trisis critical infrastructure attack spotted

A second attack against a critical infrastructure target has been launched using the Triton/Trisis custom attack framework. FireEye researchers were able to attribute a second attack to the Russian group it fingered as being behind the initial 2017 attack that hit a petrochemical plant in Saudi Arabia through its industrial control system. Although details such…

Bullish on cybercrime

As the U.S. economy takes investors on a wild ride, turning all the usual indicators topsy-turvy and sparking concern that the bear will usurp the bull, one market seems to be on a perpetual upswing — cybercrime. Threat intelligence researchers agree that adversaries are well connected in the sophisticated virtual labyrinths of the dark web,…

With AI, promises still outpace reality

AI’s value on the endpoint still a work in progress, but it’s improving AI is great for solving yesterday’s endpoint attacks, but the jury is still out on solving tomorrow’s. Esther Shein explains. Today it is almost impossible to talk about cybersecurity without someone turning the discussion to artificial intelligence (AI). Sometimes it is appropriate,…

Hacking for the holidays: Healthcare Ransomware Edition

Here’s how the healthcare industry can protect itself during the busy holiday hacking season The healthcare ransomware conundrum When ransomware hits a hospital, lives are on the line. Ed Tittel looks at how to deal with cyberattacks when lives are at stake The medical services industry is in a uniquely vulnerable position when it comes…

Forging an email security plan – The dark side of The Octopus’ garden

Before the phish gets its way, it is essential to have email security down pat. Lee Sustar looks at how tech and face-to-face education improve your defenses. Users in large organizations are firewalled, proxied, scanned, logged and analyzed, around the clock and worldwide. Companies find all kinds of ways to protect their email, but still,…

Securing Middle America: small towns more at risk of ransomware, phishing and more

Cybersecurity firms may be leaving money on the table chasing big fish in the form of large enterprise deals, while smaller local government entities go unprotected. While cyberattacks target entities of all sizes in both the public and private sector, small towns can find themselves especially vulnerable as the result of a lack of funds…

ChinaSpy

Yes or No. Did China physically hack Super Micro computers?

A bevy of Congressional members are starting to dig deeper into the Bloomberg Businessweek report that the Chinese People’s Liberation Army actually committed a supply chain attack by placing malicious processors in computers used by top U.S. companies and the federal government. Sens. Marco Rubio, R-Fla., and Richard Blumenthal, D-Conn., John Thune R-S.D., House Oversight…

US Air Force, Raptor

GAO report slams Department of Defense cybersecurity practices

Securing the upcoming election against cyberattack or influence is rightfully garnering a great deal of attention, but a recent General Accounting Office (GAO) report indicates the United States is doing a poor job building weapon systems resistant to cyberattack. The report noted that the very aspects that make some of the nation’s most dangerous weapons…

FireEye outs APT38 as North Korean cyber bank heist gang

A team of FireEye researchers has detailed the cyber machinations of APT38, a group of North Korea-linked hackers focusing on financial crime and responsible for stealing millions of dollars using highly destructive malware. The team of Nalani Fraser, Jaqueline O’Leary, Vincent Cannon and Frederick Plan said they were able to identify and separate APT38 from…

Next post in APTs/cyberespionage