article thumbnail

Security Affairs newsletter Round 460 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Iran Crisis Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign U.S. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

Military 106
article thumbnail

China-linked Moshen Dragon abuses security software to sideload malware

Security Affairs

RedFoxtrot has been active since at least 2014 and focused on gathering military intelligence from neighboring countries, it is suspected to work under the PLA China-linked Unit 69010. The cyperespionage group also uses additional tools, including an LSA notification package and the GUNTERS passive backdoor.

Security 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. We discussed why encrypted flash drives have become established as a must-have portable business tool in the digital age. LW: Makes sense.

article thumbnail

A Cyber Insurance Backstop

Schneier on Security

In the first week of January, the pharmaceutical giant Merck quietly settled its years-long lawsuit over whether or not its property and casualty insurers would cover a $700 million claim filed after the devastating NotPetya cyberattack in 2017. The 9/11 attacks cost insurers and reinsurers $47 billion. 11, 2001, terrorist attacks.

article thumbnail

Best Ransomware Removal and Recovery Services

eSecurity Planet

Zero trust is an important new tool to add to all that, essentially walling off your most important data. Ransomware removal tools. Kaspersky has a number of ransomware removal tools available on its site. Access to a range of ransomware tools tailored to remove specific strains of malware. Ontrack’s key services.

article thumbnail

CyberheistNews Vol 13 #13 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks

KnowBe4

CyberheistNews Vol 13 #13 | March 28th, 2023 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks Users need to adapt to an evolving threat landscape in which attackers can use AI tools like ChatGPT to craft extremely convincing phishing emails, according to Matthew Tyson at CSO. "A He covers it from all angles!

article thumbnail

Watch out! Malware Analysis Sandboxes could expose sensitive data of your organization

Security Affairs

In one case, the experts discovered that a company that provides a popular deployment tool for Windows admins was submitting all received purchase orders into the sandbox. CENTCOM requisition form for use of military aircraft. 200 benign files were invoices and purchase orders.