Sat.Jun 08, 2019

Recently a large chunk of European mobile traffic was rerouted through China Telecom

Security Affairs

On June 6, for more than two hours China Telecom re-routed through its infrastructure a large chunk of European mobile traffic. In November security researchers Chris C.

Groups 102

Cryptocurrency Company Hacks Itself Before Hackers Can Hack It

WIRED Threat Level

Microsoft deletes its facial recognition database, hackers hit health care, and more of the week's top security news. Security Security / Security News

IT 85

Hunting the ICEFOG APT group after years of silence

Security Affairs

A security researcher found new evidence of activities conducted by the ICEFOG APT group, also tracked by the experts as Fucobha. Chi-en (Ashley) Shen, a senior security researcher at FireEye, collected evidence that demonstrates that China-linked APT group ICEFOG (aka Fucobha ) is still active.

Security Affairs - Untitled Article

Security Affairs

German intelligence agencies could hack servers, smartphones and any other devices under a draft law drawn up by the German Interior Ministry. The German Interior Ministry would allow the German domestic and foreign intelligence services are to hack into computers and smartphones under a draft law.

Contact Center Cloud Migration Done Right

Speaker: Sheila McGee-Smith, Founder and Principal Analyst, McGee-Smith Analytics

Many companies are in the midst of migrating their contact center to the cloud. Understanding how best to execute the transition of premises to cloud is part of that process. Join contact center industry analyst and No Jitter blogger Sheila McGee-Smith as she discussed tried and true best practices for avoiding the potential pitfalls of CX migration.

Frankenstein campaign: threat actors put together open-source tools for highly-targeted attacks

Security Affairs

Cisco Talos experts uncovered a new wave of attacks tracked as Frankenstein campaign, attackers used tools built by combining four open-source techniques.