article thumbnail

IT firms, telcos among dozens hacked in new info-stealing malware attack

CTOvision

A cyber espionage group is deploying a new type of trojan malware against telecommunications, information technology, and government organisations.

Malware 73
article thumbnail

Learning From the Past — Ten 2022 Cybersecurity Events to Know

Palo Alto Networks

23, a new variant of wiper malware, named HermeticWiper, was discovered in Ukraine. In January 2022, Unit 42 researchers were able to map out three large clusters of Gamaredon’s infrastructure used to support different phishing and malware purposes. Top Malware. Beginning on Feb. We will continue to provide updates as needed.

Malware 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: Curb Your Enthusiasm Over ChatGPT-type Tools at Work, Says U.K.’s NCSC 

Tenable

Plus, the QakBot botnet got torn down, but the malware threat remains – what CISA suggests you do. The disruption of QakBot infrastructure does not mitigate other previously installed malware or ransomware on victim computers. As OpenAI released ChatGPT Enterprise, the U.K.’s And much more!

ChatGPT 64
article thumbnail

Government Advisories Warn of APT Activity Resulting from Russian Invasion of Ukraine

Tenable

The alert highlights the following sectors as key targets for the APT groups: defense industrial base, healthcare and public health, energy, telecommunications and government facilities. Once they have domain level privileges, they will use Group Policy to distribute malware and ransomware. Description. Defending Active Directory.

article thumbnail

How Regulation Is Impacting 5G Security in Europe

Palo Alto Networks

We have completed numerous deployments around the world enabling our customers to detect and prevent mobile protocol-specific threats, malware and other vulnerabilities within mobile networks. As the world’s leading cybersecurity company, Palo Alto Networks works with service providers and enterprises globally that rely on mobile networks.

article thumbnail

What Is cloud security?

Lacework

Then, in the 1990s, telecommunications companies began experimenting with how they could use bandwidth more effectively through server management, optimizing infrastructure, and designing efficient applications that benefit end users. Despite the tremendous benefits of adopting cloud computing models, doing so comes with a cost.

Cloud 98
article thumbnail

Microsoft’s July 2023 Patch Tuesday Addresses 130 CVEs (CVE-2023-36884)

Tenable

Targeted regions include Ukraine, North America and Europe while targeted industries include telecommunications and finance. Additionally, the group also conducts intelligence gathering operations that rely on credential theft. Exploitation of CVE-2023-36884 began in June 2023. For more information, please refer to Microsoft’s blog post.

Windows 98