article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Fifteen years after the launch of the microblogging social media platform, Twitter remains a dominant public forum for instant communication with individuals and organizations worldwide on a universe of topics, including #cybersecurity. Top Cybersecurity Experts to Follow on Twitter. Binni Shah | @binitamshah. Eva Galperi n | @evacide.

article thumbnail

Only now we known that International Civil Aviation Organization (ICAO) was hacked in 2016

Security Affairs

Canadian media revealed that in November 2016, the International Civil Aviation Organization (ICAO) was a hit by a large-scale cyberattack. “Mail server, domain administrator and system administrator accounts were all affected, giving cyberespions access to the past and current passwords of more than 2,000 ICAO system users.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet the Administrators of the RSOCKS Proxy Botnet

Krebs on Security

The user “RSOCKS” on the Russian crime forum Verified changed his name to RSOCKS from a previous handle: “ Stanx ,” whose very first sales thread on Verified in 2016 quickly ran afoul of the forum’s rules and prompted a public chastisement by the forum’s administrator. ” the post enthuses.

Sales 276
article thumbnail

Russia-linked APT28 uses fake Windows Update instructions to target Ukraine govt bodies

Security Affairs

The group was involved also in the string of attacks that targeted 2016 Presidential election. CERT-UA observed the campaign in April 2023, the malicious e-mails with the subject “Windows Update” were crafted to appear as sent by system administrators of departments of multiple government bodies.

article thumbnail

North Korea-linked Lazarus APT targets the IT supply chain

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. Cybersecurity and Infrastructure Security Agency (CISA) in August 2020. ” reads the report published by Kaspersky.

IT 93
article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

One of the promising cybersecurity trends that I’ve been keeping an eye on is this: SOAR continues to steadily mature. Security orchestration, automation and response, or SOAR, is a fledgling security technology stack that first entered the cybersecurity lexicon about six years ago. based LogicHub.

Security 159
article thumbnail

CIA elite hacking unit was not able to protect its tools and cyber weapons

Security Affairs

According to an internal report drown up after the 2016 data breach that led to the ‘ Vault 7 ‘ data leak, a specialized CIA unit involved in the development of hacking tools and cyber weapons failed in protecting its operations and was able to respond after the leak of its secrets. ” reported The Washington Post.

IT 110