article thumbnail

Lazarus malware delivered to South Korean users via supply chain attacks

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. The activity of the Lazarus APT group surged in 2014 and 2015, its members used mostly custom-tailored malware in their attacks.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

You know you're seeing guy breaches in the news, aside from ransomware which you know is happening in a different way, but when you see your data breaches pure data exfiltrated out and you're seeing it happen on the API layer just simply because the security is not harder. And every time we do that, I swear.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

You know you're seeing guy breaches in the news, aside from ransomware which you know is happening in a different way, but when you see your data breaches pure data exfiltrated out and you're seeing it happen on the API layer just simply because the security is not harder. And every time we do that, I swear.

article thumbnail

Zero Trust: Can It Be Implemented Outside the Cloud?

eSecurity Planet

Yes, cloud service providers likely cost more than owning your own IT infrastructure, but with that cost comes much greater security than most organizations can afford or ever hope to achieve, so the cost difference may no longer be as great as it once was. Yes, but the last major breach was the 2009 Chinese hack of Google.

Cloud 108