WikiLeaks on Thursday dumped more leaked CIA documents with its latest Vault 7 disclosures, this time publishing materials from a tool suite called Brutal Kangaroo that allows attackers to indirectly infiltrate a closed network or air-gapped computer using a compromised flash drive.
Julia Bishop discusses a recent report on the risk posed by APT10 and actions companies should take to respond to such threats if they use managed IT service providers.
Russian hackers reportedly breached the electoral systems of at least 39 states during the summer and fall of 2016 accessing software designed to be used by poll workers on Election Day.
The grim success of the China-based APT10 hackers in stealing huge volumes of confidential data from organisations around the globe has revealed a sickening reality says Greg Sim.
Mark Loman discusses how nation-state attackers with access to the right tools, time and cash can tailor-make their attack code to bypass security products completely.
Multiple hacker groups may be collaborating on behalf of a nation-state actor, according to a new report.
The group behind the attacks, APT10, has targeted Canada, Brazil, France, Norway, Finland, Switzerland, South Africa, Australia, Japan, and India.
Airports and nuclear power plants in the US and UK are on alert for cyber-attacks after governments in both countries issued alerts.
Spear-phishing attacks aimed at placing cyber-espionage malware on government computers using an infected Word document are being blamed on about a dozen Saudi Arabian agencies.
A group of cyber mercenaries targeted Baidu's driverless car technology prompting the tech company to beef up security.
A recent Trend Micro study found 20 percent of IT leaders believe cyber-espionage will be the top threat of 2017.
One report suggests a possible computer server connection between the Trump organisation and a Russian bank, while another alleges that a Trump advisor was in contact with Russian hackers during the presidential election.
Proponents of the campaign point to a number of missile launches that have failed—either missing their mark or exploding in midair—as the program's success.
Russia has a cyber army. The announcement was made by defence minister Sergey Shoygu.
The administration has hinted at cyber-security policy, but no definitive strategy has emerged.
Sir Mark Lyall Grant and Wang Yongqing focused on cooperation on cyber-security, counter-terrorism and countering violent extremism, and organised crime.
To combat alert fatigue among its security analysts, transportation service Uber applies specially customised data sets to flagged incidents to help distinguish between genuine threats and non-malicious activities.
An unknown actor whose targets and tactics resemble those of a Russian APT group has been compromising the websites of foreign embassies, ministries and organisations, in an attempt to infect certain site visitors with malware.
Following the arrests of four cyber experts in Russia on treason charges, conflicting theories have emerged, as observers speculate if the case is connected to the hacking of US political institutions in the run-up to the 2016 election.
Researchers may have found a tenuous link between a cyber-espionage organisation's credentials-stealing Trojan and the Shamoon hacking group that's been targeting Saudi energy companies with Disttrack disk-wiping malware.
A newly discovered Mac malware with some very old coding has likely been targeting biomedical research facilities for at least two years without detection.
Amidst a number of shocking revelations in relation to the Trump presidency, FireEye has released a report detailing some of the tools and tactics used by Russian hackers who are believed to be part of APT28 - a group of Russian state-back hackers - who are believed to be behind some of the year's headline grabbing hacks including the John Podesta emails, the WADA hack and the breach of the DNC during the election period.
A Russian APT began attacking the computer networks of the US Democratic National Committee with a series of spear-phishing emails in the summer of 2015, according to a US intelligence agency report.
According to the German Federal Office for Information Security (BSI), the group is well known to them, and the BSI says several other businesses are under attack.
It is essential that you can tell the difference between a government hacker and an individual hacktivist, or how can you react appropriately?
ThyssenKrupp, a major supplier of steel to Germany's automotive sector, has announced today that some of its trade secrets were stolen in a cyber-attack earlier in the year.
President-elect Trump has tapped Rep. Mike Pompeo (R-Kan.) as CIA director, and retired Army Lt. Gen. Michael Flynn as national security advisor, and Sen. Jeff Sessions (R-Ala.) as attorney general.
The Swiss intelligence service received permission to begin tapping phones and monitoring emails following a vote in the nation's parliament and approval by a public referendum.
Director of national intelligence James Clapper said there have been previous instances of Russian attempts to influence US elections going back to the 1960s.