Remove tag cyber-attack
article thumbnail

Exclusive: Pro-Russia group ‘Cyber Spetsnaz’ is attacking government agencies

Security Affairs

(USA) has identified an increase in activity within hacktivist groups conducted by a new group called “Cyber Spetsnaz”. USA) has identified an increase in activity within hacktivist groups, they’re leveraging current geopolitical tensions between the Ukraine and Russia to perform cyber-attacks. Resecurity, Inc.

article thumbnail

Google TAG warns of Russia-linked APT groups targeting Ukraine

Security Affairs

The researchers from Google TAG are warning of Russia-linked threat actors targeting Ukraine with phishing campaigns. Russia-linked threat actors launched large-volume phishing campaigns against hundreds of users in Ukraine to gather intelligence and aimed at spreading disinformation, states Google’s Threat Analysis Group (TAG).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked Turla APT targets Austria, Estonia, and NATO platform

Security Affairs

Threat & Detection Research (TDR) team have uncovered a reconnaissance and espionage campaign conducted by Russia-linked Turla APT aimed at the Baltic Defense College, the Austrian Economic Chamber (involved in government decision-making such as economic sanctions) and NATO’s eLearning platform JDAL (Joint Advanced Distributed Learning).

article thumbnail

SEC Proposes Cybersecurity Rules for Public Companies

Hunton Privacy

On March 9, 2022, the Securities and Exchange Commission (“SEC”) held an open meeting and proposed new cybersecurity disclosure rules for public companies by a 3-1 vote. In proposing the rules, the SEC hopes to improve the consistency and comparability of cybersecurity disclosures among public companies. Key Definitions.

article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

Threat intelligence feeds are continually updated streams of data that inform users of different cybersecurity threats, their sources, and any infrastructure impacted or at risk of being impacted by those threats. As a bonus, many of these tools are free to access and have specialized feeds that focus on different industries and sectors.

article thumbnail

Analyzing the APT34’s Jason project

Security Affairs

Today I want to share a quick analysis on a new leaked APT34 Tool in order to track similarities between APT34 public available toolsets. This time is the APT34 Jason – Exchange Mail BF project to be leaked by Lab Dookhtegan on June 3 2019. “APT34 conducts cyber espionage on behalf of Iran. Michael Lortz. Jason Project GUI.

article thumbnail

Ransomware Protection in 2021

eSecurity Planet

A ransomware attack is about as bad as a cyber attack can get. It can shut down your business – in the case of healthcare organizations that can be life-threatening for patients – damage your reputation with customers and employees, and invite further attacks as cybercriminals view your organization as an easy mark.