article thumbnail

Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft

eSecurity Planet

The increasing mobility of data, as it ping-pongs between clouds, data centers and the edge, has made it an easier target of cybercrime groups, which has put a premium on the encryption of that data in recent years. Since then, interest in fully homomorphic encryption (FHE) has increased, largely paralleling the rise of cloud computing.

article thumbnail

Dacls RAT, the first Lazarus malware that targets Linux devices

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. ” reads the analysis published by Qihoo 360 Netlab. ” continues the analysis.

CMS 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Platinum APT and leverages steganography to hide C2 communications

Security Affairs

According to Microsoft, the Platinum has been active since at least 2009, it was responsible for spear phishing attacks on ISPs, government organizations, intelligence agencies, and defense institutes. ” reads the analysis published by the expert. ” continues the analysis. ” continues Kaspersky.

article thumbnail

Experts attribute NukeSped RAT to North Korea-Linked hackers

Security Affairs

On August 2019, the experts at Intezer and McAfee have conducted a joint investigation focused the analysis on the code reuse, past investigations revealed that some APT groups share portions of code and command and control infrastructure for their malware. The samples were importing a small number of common DLLs and functions.

article thumbnail

North Korea-linked group Lazarus targets Latin American banks

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. ” reads the analysis published by Trend Micro. n = number of characters in the loader dll’s filename.

article thumbnail

North Korea-linked Lazarus APT uses a Mac variant of the Dacls RAT

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. ” reads the analysis published by the researchers. The Mac RAT implements a C&C communication similar to the Linux variant.

article thumbnail

North Korea-linked Lazarus APT hides malicious code within BMP image to avoid detection

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. ” reads the analysis published by MalwareBytes. ” states the analysis. ” concludes the report.