article thumbnail

InvisiMole group targets military sector and diplomatic missions in Eastern Europe

Security Affairs

Security researchers at ESET recently uncovered a campaign carried out by the InvisiMole group that has been targeting a small number of high-profile organizations in the military sector and diplomatic missions in Eastern Europe. This allows the InvisiMole group to devise creative ways to operate under the radar.” Pierluigi Paganini.

article thumbnail

Cellebrite ‘s forensics tool affected by arbitrary code execution issue

Security Affairs

Cellebrite mobile forensics tool Ufed contains multiple flaws that allow arbitrary code execution on the device, SIGNAL creator warns. Cellebrite develops forensics tools for law enforcement and intelligence agencies that allow automating physically extracting and indexing data from mobile devices. ” concludes the expert.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

France agency ANSSI warns of Russia-linked APT28 attacks on French entities

Security Affairs

The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , BlueDelta, and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide. This information contains, for example, the list of installed security patches.” ” reads the report.

Military 109
article thumbnail

Catches of the Month: Phishing Scams for March 2022

IT Governance

The Ukrainian government and its military were targeted by DDoS (distributed denial-of-service) attacks, while a pro-Ukrainian group attacked the Belarusian railway system with ransomware after discovering that it was being used by Russia to transport tanks and weapons. Beware of remote access takeover scams. Get started.

Phishing 144
article thumbnail

GUEST ESSAY: Rising cyber risks make business intelligence gathering more vital than ever

The Last Watchdog

Gathering intelligence has always been a key tool for organisational decision making – understanding the external operating environment is the ‘101’ for business. The Ukraine-Russia war is a grim example of geopolitical risk intersecting with cyber security risk. Related: We’re in the golden age of cyber espionage.

Risk 279
article thumbnail

When Your Smart ID Card Reader Comes With Malware

Krebs on Security

Here’s one example. ” The card reader Mark bought was sold by a company called Saicoo , whose sponsored Amazon listing advertises a “DOD Military USB Common Access Card (CAC) Reader” and has more than 11,700 mostly positive ratings. What could go wrong? A sample Common Access Card (CAC). Image: Cac.mil.

article thumbnail

UK emphasises cyber security in new foreign policy strategy

IT Governance

A central part of this review is the NCF (National Cyber Force), which uses “offensive cyber tools” to detect, disrupt and deter adversaries. This is in line with what little we know about the tools at the NCF’s disposal. National Cyber Force. Formed in 2020, the NCF is a partnership between the Ministry of Defence and GCHQ.

Security 124