Triton malware joins Stuxnet, Havex / Dragonfly, Blackenergy2/3, and Industroyer / CrashOverridet specifically targeting industrial networks: Passive network monitoring with hybrid threat detection needs to be implemented now.
WikiLeaks on Thursday dumped more leaked CIA documents with its latest Vault 7 disclosures, this time publishing materials from a tool suite called Brutal Kangaroo that allows attackers to indirectly infiltrate a closed network or air-gapped computer using a compromised flash drive.
The grim success of the China-based APT10 hackers in stealing huge volumes of confidential data from organisations around the globe has revealed a sickening reality says Greg Sim.
The Russian President uttered some strangely forgiving remarks about Russian hackers. A case of getting their excuses in early?
Mark Loman discusses how nation-state attackers with access to the right tools, time and cash can tailor-make their attack code to bypass security products completely.
"Could've been China, could've been a lot of different groups," the US president said.
A parliamentary committee has proposed a monitoring unit in order to ward off the threat of foreign powers trying to influence UK election.
Chinese use spear-phishing attacks to extract military hardware secrets from Russians in a sign that APT attacks will continue to grow in 2017, says Proofpoint.
Saudi Arabian organisations are being warned that Shamoon is back and in a new form