Leak Exposes OilRig APT Group's Tools

Data Breach Today

Group, Apparently Backed By Iran, Was Broadening Its Targets, Analysts Say A set of malicious tools, along with a list of potential targets and victims, belonging to an APT group dubbed OilRig has leaked online, exposing some of the organization's methods and goals, analysts say

IT 227

FIN7 Gang Returns With New Malicious Tools: Researchers

Data Breach Today

FireEye Says Financial Hacking Group Is Deploying New Dropper and Payload Despite a crackdown on some of its members in 2018, the FIN7 gang has returned with new malicious tools, including a revamped dropper and payload, according to analysts at FireEye.

Sales 163

xHunt Campaign Leverages New Tools Against Shipping Firms

Data Breach Today

Researchers: Malware Used in Attacks Against Kuwaiti Transportation, Shipping Companies A hacking group is using new backdoor tools in a campaign targeting shipping and transportation companies in Kuwait, according to researchers at Palo Alto Networks' Unit 42

170
170

Report: Chinese Hackers First to Use NSA Cyberattack Tools

Data Breach Today

Symantec Report Deepens Mystery Around Lost NSA Tools and Exploits A Chinese hacking group was using exploits and tools developed by the NSA months before the tools were released by another group, Symantec says in a new report.

219
219

Leaked NSA Hacking Tools

Schneier on Security

In 2016, a hacker group calling itself the Shadow Brokers released a trove of 2013 NSA hacking tools and related documents. Now we have learned that the Chinese used the tools fourteen months before the Shadow Brokers released them.

Choosing Security Tools for Your Business — the Right Way

InfoGoTo

For example: Identity and access management, single sign-on and multifactor tools are rolled out, but they don’t effectively govern authentication and access controls across the board, among all systems and accounts that are pertinent to the business.

MDM 56

Cybercrime Tool Prices Continue to Rise on Darknet Sites

Data Breach Today

Payment Card and Passport Data Are Most Sought-After Commodities, Report Finds The prices for specific types of cybercriminal tools on darknet sites continue to rise, according to a recent analysis by security firm Flashpoint.

A free Decryptor tool for GandCrab Ransomware released

Security Affairs

Good news for the victims of the latest variants of the GandCrab ransomware , NoMoreRansomware released a free decryption tool. Victims of the latest variants of the GandCrab ransomware can now decrypt their files for free using a free decryptor tool released on the the NoMoreRansom website.

VMware addressed flaws in its Workstation and Tools

Security Affairs

VMware has informed its users that it has patched two high-severity vulnerabilities that affect its Tools and Workstation software. VMware has patched two high-severity flaws that affect its Tools and Workstation software.

IT 112

Free Tool: Honey Feed

Security Affairs

Cybersecurity expert Marco Ramilli shared another tool of his arsenal that extracts suspicious IPs from undesired connections, his HoneyPots. Hi folks, today I’d like to point you out another tool of mine which extracts suspicious IPs from undesired connections.

HHS Updates Security Risk Assessment Tool

Data Breach Today

The Department of Health and Human Services has updated its HIPAA security risk assessment tool to better assist small and mid-sized healthcare entities and their vendors in performing a comprehensive risk analysis.

Risk 198

Iranian Cyberespionage Tools Leaked Online

Schneier on Security

The source code of a set of Iranian cyberespionage tools was leaked online. cyberespionage doxing hacking iran leaks

105
105

NSA Pitches Free Reverse-Engineering Tool Called Ghidra

Data Breach Today

So went the pitch from the NSA's Rob Joyce at this year's "Get Your Free NSA Reverse Engineering Tool" presentation at RSA Conference 2019

Enterprise Architecture Tools Are Key to Managing Ideation and Innovation

erwin

Organizations largely recognize the need for enterprise architecture tools, yet some still struggle to communicate their value and prioritize such initiatives. Enterprise Architecture Tools: The Fabric of Your Organization.

Cisco released 4CAN hardware tool to find flaws in automotive computers

Security Affairs

Cisco has released a hardware tool, called 4CAN , developed to help researchers to discover vulnerabilities in automotive systems. . Cisco has released a new hardware open-source tool called 4CAN that aims to help the automotive industry in security vehicles.

Elderly China Chopper Tool Still Going Strong in Multiple Campaigns

Threatpost

Hacks Malware Web Security analysis china chopper Cisco Talos Cyberattacks recent campaigns remote access tool web shellMultiple actors in multiple campaigns are using the web shell for remote access, even though it's almost a decade old and hasn't been updated.

IT 112

Top Vulnerability Scanning Tools

eSecurity Planet

Here are a dozen vulnerability scanning tools that can help Staying on top of vulnerabilities is a critical IT security practice.

Hackers Wield Commoditized Tools to Pop West African Banks

Data Breach Today

191
191

Intel Patches High-Severity Flaw in Processor Diagnostic Tool

Threatpost

Intel issued patches for a high-severity flaw in its processor diagnostic tool as well as a fix for a medium-severity vulnerability in its data center SSD lineup.

IT 114

Instagram’s New Security Tools are a Welcome Step, But Not Enough

Krebs on Security

Security Tools Authy Duo Facebook Google Authenticator Google Voice Instagram SIM swap T-Mobile two-factor authentication twofactorauth.orgInstagram users should soon have more secure options for protecting their accounts against Internet bad guys.

Ghidra: NSA's Reverse-Engineering Tool

Schneier on Security

Last month, the NSA released Ghidra , a software reverse-engineering tool. Early reactions are uniformly positive. Three news articles. cybersecurity nsa opensource reverseengineering

Experts released a free Decryption Tool for GandCrab ransomware

Security Affairs

Good news for the victims of the infamous GandCrab ransomware, security experts have created a decryption tool that allows them to decrypts files without paying the ransom. “This tool recovers files encrypted by GandCrab ransomware versions 1, 4 and 5.”

FIN8 Group Returns, Targeting POS Devices With New Tools

Data Breach Today

Retail 188

Gartner Emphasize the Need for Enterprise Architecture Tools

erwin

Organizations largely recognize the need for enterprise architecture tools, yet some still struggle to communicate their value and prioritize such initiatives. Enterprise Architecture Tools: The Fabric of Your Organization.

Data Mapping Tools: What Are the Key Differentiators

erwin

The need for data mapping tools in light of increasing volumes and varieties of data – as well as the velocity at which it must be processed – is growing. Data mapping tools have always been a key asset for any organization looking to leverage data for insights.

GDPR 81

Google Releases Basic Homomorphic Encryption Tool

Schneier on Security

Google has released an open-source cryptographic tool: Private Join and Compute.

Top Penetration Testing Tools

eSecurity Planet

Here are the best pen test tools for finding your vulnerabilities Penetration testing should be an ongoing practice for all IT security teams.

Security Tool Sprawl Reaches Tipping Point

Dark Reading

How a new open source initiative for interoperable security tools and a wave of consolidation could finally provide some relief for overwhelmed security analysts and SOCs

Massive CIA Hacking Tool Leak: Ex-Agency Employee Charged

Data Breach Today

Schulte, with providing 8,000 documents that describe the agency's offensive malware tools and practices to WikiLeaks, which published them in 2017 as the "Vault 7" archive Lead Suspect Joshua A. Schulte Already Detained on Child Pornography Charges The U.S.

RiskIQ: Ticketmaster Hackers Compromised Widely Used Tools

Data Breach Today

Bill Would Help Congress Track Offensive 'Cyber Tool' Sales

Data Breach Today

State Department Would Be Required to Provide Information on Approved Sales A House panel has approved a measure designed to make sure Congress is informed when U.S. companies sell offensive cyber technologies to other nations' governments. The measure was introduced after a U.S.

Sales 186

Free Tools: spotting APTs through Malware streams

Security Affairs

Cyber security expert and founder of Yoroi has published a new tool that could be used to spot APTs (A dvanced Persistent Threats) through Malware streams. Honey Feed , a tool that extracts suspicious IPs from undesired connections, his HoneyPots.

IBM BigFix and Licensing Metric Tool

Perficient Data & Analytics

A few months ago, I was assigned the task of installing BigFix*/IBM Licensing Metric Tool (ILMT) for a client. Also, I did mistakenly refer to the IBM Licensing Metric Tool as the IBM Licensing Management Tool.

Five Eyes Intelligence agencies warn of popular hacking tools

Security Affairs

Security agencies belonging to Five Eyes (United States, United Kingdom, Canada, Australia and New Zealand) have released a joint report that details some popular hacking tools. Experts from cybersecurity agencies from Five Eyes intelligence alliance have issued a report that provides technical details on most popular hacking tool families and the way to detect and neutralizes attacks involving them. The five tools are: Remote Access Trojan: JBiFrost.

What’s Business Process Modeling Got to Do with It? – Choosing A BPM Tool

erwin

With business process modeling (BPM) being a key component of data governance , choosing a BPM tool is part of a dilemma many businesses either have or will soon face. Choosing a BPM Tool: An Overview. Organizations that adopt a BPM tool also enjoy greater process efficiency.

Installing Siebel Tools To Be Read-Only

Perficient Data & Analytics

Recently, we had a requirement to create an installation of Siebel Tools that would run against the server database and be READ_ONLY with no ability to change the user that had WRITE privileges.

Sofacy APT group used a new tool in latest attacks, the Cannon

Security Affairs

The novelty in the last attacks is represented by the use of a tool that has not been seen before, attackers also used an uncommon technique to deliver the malware and to avoid running in a sandbox. Security Affairs – Sofacy APT, Cannot tool).