article thumbnail

Even North Korea has an antivirus program—but it’s used for spying

The Parallax

Researchers announced on May 1 that when they inspected the ingredients of the North Korean antivirus software for Windows computers, they found a mix of spyware and old code stolen from an antivirus vendor. Jaku is a known spyware-botnet combination, spread over BitTorrent.

Spyware 187
article thumbnail

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Tenable

came out in 2014. To gain initial access, cybercriminals associated with ALPHV Blackcat employ advanced social engineering techniques and publicly-available information about a company. After a years-long revision process, NIST this week rolled out version 2.0 It’s the first major update to the CSF since version 1.0

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Is It Necessary to Run Cybersecurity Evaluation Exercises?

Altexsoft

A security defense solution can be highly reliable, but it may crumble when complex social engineering enters the picture. In 2014, eBay encountered a major security failure that resulted in data theft involving over 145 million user accounts. As Accenture Managing Director Robert Kress puts it, “.

article thumbnail

Technology News and Hot Topics

CTOvision

Last week technology news site Re:Code announced that it would stop hosting comments on its own sites as the conversation around stories was already happening on social media. Regin, new computer spyware, discovered by Symantec. 2014’s top ten technology buzzwords to learn and to avoid.

article thumbnail

A Brief History of the Internet’s Biggest BGP Incidents

Kentik

During both the internet crackdown following the military coup in Myanmar in 2021 and the Russian crackdown of social media following its invasion of Ukraine in 2022, telecoms in each of these countries attempted to block access to Twitter using a BGP hijack to black hole traffic.

article thumbnail

Zero-Day: Vulnerabilities, Exploits, Attacks and How to Manage Them

Kaseya

Since Google’s Project Zero was founded in July 2014, it has compiled data on “in the wild” zero-day exploits, with 2021 being the biggest year on record. The infection can take the form of a virus, Trojan horse, worm, spyware, adware, rootkit or other malware like ransomware.