article thumbnail

US Cyber Command warns of Iran-linked hackers exploiting CVE-2017-11774 Outlook flaw

Security Affairs

The APT33 group has been around since at least 2013, since mid-2016, the group targeted the aviation industry and energy companies with connections to petrochemical production. These executables are both downloaders that utilize powershell to load the PUPY RAT. Most of the targets were in the Middle East, others were in the U.S.,

article thumbnail

NIST Updates Cybersecurity Framework

Data Matters

As with the first version of NIST’s Cybersecurity Framework, all companies should review the new version, determine its potential utility, and consider adopting, adapting or comparing the new Framework for use within their own cyber ecosystems. Significantly, version 1.1 NIST’s fact sheet on the updated version is available here: [link].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SAA/CoSA/NAGARA 2018 recap: Session 204

The Schedule

A week before the 2016 election, Laura was brought in on a 6-month detail to the Secretary of Commerce’s office to help with the presidential transition, focusing on website and social media. This guidance utilizes principles that can be adopted by a variety of institutions, not just Federal agencies. Troubleshoot #1.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Before companies can effectively and safely use generative AI tools, employees must be educated on utilizing best practices: writing prompts that achieve desired outcomes, keeping data security and privacy in mind when inputting data, identifying the quality and security of AI, verifying AI output, and more,” elaborates Arti Raman, CEO Portal26.

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

Permissioned blockchains, or private blockchains,aren’t truly decentralized because they’re organized by a governance structure and authentication process for nodes. For advantages, private blockchains are more scalable and energy-efficient with suggested use cases of banking and supply chain management. Next-Generation Cryptography.

article thumbnail

Why Russian APT Fancy Bear hacked the Ukrainian energy firm Burisma?

Security Affairs

Russia-linked cyber-espionage group hacked the Ukrainian energy company Burisma at the center of the impeachment trial of US President Donald Trump. “Phishing for credentials allows cyber actors to gain control of an organization’s internal systems by utilizing trusted access methods (e.g.: ” continues the report.”Repeatedly,