Sat.Jun 08, 2019

Recently a large chunk of European mobile traffic was rerouted through China Telecom

Security Affairs

On June 6, for more than two hours China Telecom re-routed through its infrastructure a large chunk of European mobile traffic. In November security researchers Chris C.

Groups 110

Cryptocurrency Company Hacks Itself Before Hackers Can Hack It

WIRED Threat Level

Microsoft deletes its facial recognition database, hackers hit health care, and more of the week's top security news. Security Security / Security News

IT 73

Hunting the ICEFOG APT group after years of silence

Security Affairs

A security researcher found new evidence of activities conducted by the ICEFOG APT group, also tracked by the experts as Fucobha. Chi-en (Ashley) Shen, a senior security researcher at FireEye, collected evidence that demonstrates that China-linked APT group ICEFOG (aka Fucobha ) is still active.

Groups 107

Security Affairs - Untitled Article

Security Affairs

German intelligence agencies could hack servers, smartphones and any other devices under a draft law drawn up by the German Interior Ministry. The German Interior Ministry would allow the German domestic and foreign intelligence services are to hack into computers and smartphones under a draft law.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Frankenstein campaign: threat actors put together open-source tools for highly-targeted attacks

Security Affairs

Cisco Talos experts uncovered a new wave of attacks tracked as Frankenstein campaign, attackers used tools built by combining four open-source techniques.