article thumbnail

Merck settles with insurers regarding a $1.4 billion claim over NotPetya damages

Security Affairs

It is one of the largest pharmaceutical companies globally, engaged in the research, development, manufacturing, and marketing of a wide range of healthcare products. billion insurance claim for the losses caused by the NotPetya attack that took place in 2017. Merck filed a $1.4

Insurance 116
article thumbnail

TinyNuke banking malware targets French organizations

Security Affairs

The TinyNuke malware is back and now was used in attacks aimed at French users working in manufacturing, technology, construction, and business services. The attackers used invoice-themed lures targeting entities in manufacturing, industry, technology, finance, and other verticals. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Vulnerability Recap – August 14, 2023 – Old or New, Vulnerabilities Need Management

eSecurity Planet

Cybersecurity and Infrastructure Security Agency (CISA) recently published an analysis of the top 12 vulnerabilities exploited in 2022. 2017 Zyxel Vulnerability Under Active Attack Fortinet issued an alert about thousands of daily attacks looking to perform a command injection attack on end-of-life Zyxel routers.

article thumbnail

APT40 cyberespionage group supporting growth of China’s naval sector

Security Affairs

“[In 2017] APT40 was observed masquerading as a UUV manufacturer, and targeting universities engaged in naval research. ” reads the analysis published by FireEye. ” continues the analysis. ” FireEye concludes. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

The Last Watchdog

Per a 2017 CNN source , nearly 100,000 agents from as many as 80 nations operate within the United States with the intention of targeting businesses to gain access to key U.S. In the same vein, businesses at large can use the intelligence cycle as a model to detect and deter any attacks coming from foreign intelligence services. Collection.

Security 149
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

” “At present, pre-installed partners cover the entire mobile phone industry chain, including mobile phone chip manufacturers, mobile phone design companies, mobile phone brand manufacturers, mobile phone agents, mobile terminal stores and major e-commerce platforms,” reads a descriptive blurb about the company.

Cloud 245
article thumbnail

QNAP urges users to update Malware Remover after QSnatch joint alert

Security Affairs

The first campaign likely began in early 2014 and continued until mid-2017, while the second started in late 2018 and was still active in late 2019. reads the alert. “Analysis shows a significant number of infected devices. The two campaigns are distinguished by the initial payload used as well as some differences in capabilities.

Passwords 100