
Iranian APT Targets US With Spyware via GitHub
Iranian APT Targets US With Spyware via GitHub The custom malware used by the state-backed Iranian threat group Drokbk has so far flown under the radar by using GitHub as a "dead-drop resolver" to more easily evade detection. A subgroup of the state-backed Iranian...

The issue of lacking OT operators and security professionals
The issue of lacking OT operators and security professionals30 November is the computer security day. Computer security can only be ensured if one is aware of its mistakes and shortcomings. The purpose of this blogpost is to highlight the importance of lacking OT...

Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms
Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms Cyber threat intelligence largely involves the tracking and studying of the adversaries outside of your network. Gaining counterintelligence about your adversaries' capabilities and weaponry is...

“Hack Friday” 2022 Edition | InfoSec Black Friday Deals
"Hack Friday" 2022 Edition | InfoSec Black Friday Deals Newsletters Cybersecurity Weekly Newsletter https://letsdefend.io/cybersecurity-news.html 99% off ($1 instead of $100) with code: BLCKFRDY-NEWS Deal ends: December Tools Nessus (Professional or Expert)...

Threat hunting with MITRE ATT&CK and Wazuh
Threat hunting with MITRE ATT&CK and Wazuh Threat hunting is the process of looking for malicious activity and its artifacts in a computer system or network. Threat hunting is carried out intermittently in an environment regardless of whether or not threats have...

Android phone owner accidentally bypassed lock screen
Android phone owner accidentally bypassed lock screen Cybersecurity researcher David Schütz accidentally found a way to bypass the lock screen on his fully patched Google Pixel 6 and Pixel 5 smartphones, enabling anyone with physical access to the device to unlock it....

Seeed Studio Launches a Rugged Gadget Family for the Industrial Internet of Things
Seeed Studio Launches a Rugged Gadget Family Designed for the Industrial Internet of Things With passive cooling and isolated inputs and outputs, this DIN-rail mountable gadget can turn its hand to a range of tasks. Seeed Studio has announced the launch of a...

ALMA Astronomical Observatory Became a Target for a Cyberattack
ALMA Astronomical Observatory Became a Target for a Cyberattack Operations at the world's most expensive ground-based telescope, high in the Atacama Desert, remain disrupted. The Atacama Large Millimeter Array (ALMA) astronomical observatory in Chile became an...

Growth of Cybercrime Costs | Infographic
Cybercrime will cost companies worldwide an estimated $10.5 trillion annually by 2025, up from $3 trillion in 2015. At a growth rate of 15 percent year over year — cybercrime represents the greatest transfer of economic wealth in history. ...