Remove tag twitter
article thumbnail

Analyzing attacks conducted by North Korea-linked ARCHIPELAGO APT group

Security Affairs

Google’s Threat Analysis Group (TAG) warns of a North Korea-linked cyberespionage group tracked as ARCHIPELAGO. TAG believes that the ARCHIPELAGO group is a subset of a threat actor tracked by Mandiant as APT43. ” reads the analysis published by Google TAG.

article thumbnail

China-linked APT41 group spotted using open-source red teaming tool GC2

Security Affairs

Google Threat Analysis Group (TAG) team reported that the China-linked APT41 group used the open-source red teaming tool Google Command and Control ( GC2 ) in an attack against an unnamed Taiwanese media organization. China-linked APT41 group used the open-source red teaming tool GC2 in an attack against a Taiwanese media organization.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

There's a little security tag they put to see if someone is tampered with it but they are not locked. You have to create a special environment and isolated network to do the analysis, when you turn it on. Because I've kind of felt like I've gone as far as I can with just a blackbox analysis of how it's working.