Remove tag italy
article thumbnail

Exclusive: Pro-Russia group ‘Cyber Spetsnaz’ is attacking government agencies

Security Affairs

Following the attacks of the Killnet Collective, the group responsible for the attacks against major government resources and law enforcement, a new group has been identified called “Cyber Spetsnaz”.

article thumbnail

Analyzing the APT34’s Jason project

Security Affairs

Today I want to share a quick analysis on a new leaked APT34 Tool in order to track similarities between APT34 public available toolsets. The attacker used an old version of Microsoft.Exchange.WebService.dll tagged as 15.0.0.0 This time is the APT34 Jason – Exchange Mail BF project to be leaked by Lab Dookhtegan on June 3 2019.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

For this reason I believe it would be interesting to understand how MBR works and how is it possible to write a boot loader program, this skill will help you during the analysis of your next Boot Loader Malware. How the PC boot process works ? Actually the boot process is super easy. The first two lines: 1] .code16 code16 2] .global

article thumbnail

TA505 Cybercrime targets system integrator companies

Security Affairs

The analysis of a malicious email revealed a possible raising interest of the TA505 cybercrime gang in system integrator companies. The domain was protected by a Panama company to hide its real registrant and this condition rang a warning bell on the suspected email so that it required a manual analysis in order to investigate its attachment.

article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

For this reason I believe it would be interesting to understand how MBR works and how is it possible to write a boot loader program, this skill will help you during the analysis of your next Boot Loader Malware. How the PC boot process works ? Actually the boot process is super easy. The first two lines: 1].code16 The last two lines: 112].fill

article thumbnail

Security Affairs newsletter Round 413 by Pierluigi Paganini – International edition

Security Affairs

LockBit leaks data stolen from the South Korean National Tax Service Italy’s Data Protection Authority temporarily blocks ChatGPT over privacy concerns CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog Hackers are actively exploiting a flaw in the Elementor Pro WordPress plugin Cyber Police of Ukraine (..)

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. of Cybersecurity Framework The US National Institute of Standards and Technology has updated its CSF (Cybersecurity Framework). Other news NIST releases version 2.0 NIST CSF 2.0