article thumbnail

Hidden inside Dark Caracal’s espionage apps: Old tech

The Parallax

Dark Caracal’s custom-developed mobile spyware, which the report’s authors call Pallas, is the first documented global advanced persistent threat , or APT, on a mobile device. However, Citizen Lab identified in a 2015 report the GDGS as one of two Lebanese government organizations using FinFisher surveillance software.

Malware 170
article thumbnail

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Tenable

places stronger emphasis on governance, features broader scope The much awaited revamping of the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF) is finally here. Initially, the CSF specifically focused on helping critical infrastructure organizations. And the most prevalent malware in Q4.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Radar trends to watch: August 2021

O'Reilly Media - Ideas

Checkov , a code analysis tool for detecting vulnerabilities in cloud infrastructure, can now can find these credentials in code. The attack apparently only affects on-premises infrastructure. Matthew Green’s perspective on “ security nihilism ” discusses the NSO’s activity; it is a must-read.

Trends 139
article thumbnail

A Look at the 5 Most Common Types of Cyberattacks

Tenable

There's also the interruption of business to consider, as well as damage to the network and IT infrastructure — both of which can seriously hurt your organization's financial bottom line. National Law Review, "State And Local Governments Continue To Be Favorite Targets Of Cyberattacks," September 2019 8.

Malware 101
article thumbnail

Cybersecurity Snapshot: Tips for cloud configs, MSP vetting, CISO board presentations

Tenable

Cybersecurity and Infrastructure Security Agency (CISA) released a set of recommended configuration baselines for the Microsoft 365 product suite. . federal government, CISA encourages all organizations to read, pilot and react to them. How to Choose a Modern CSPM Tool to Reduce Your Cloud Infrastructure Risk ” (Tenable blog). “

Cloud 52
article thumbnail

Radar Trends to Watch: December 2022

O'Reilly Media - Ideas

AI governance –including the ability to explain and audit results–is a necessity if AI is going to thrive in an era of declining public trust and increasing regulation. These companies are involved in activities like planting spyware on web sites to collect users’ personal data. Is it an application for a blockchain?

article thumbnail

Learn the Language of Vulnerability Assessment: Key Security Terms You Should Know

Tenable

Spyware: Programs that monitor activity of infected computers (e.g., Tools like Nessus Professional can conduct compliance scans to determine adherence to cybersecurity protocols with government regulations, as well as industry standards like PCI DSS. Trojans: Malware disguised as programs or files a user needs. February 2020 4.

Malware 89