The MuddyWater campaign appears to be rising to the surface again with researchers finding similarities between this older cyber-espionage attack and a new one targeting Turkey, Pakistan and Tajikistan.
The internet is more than an infrastructure - it mediates human behaviour so it can have unprecedented impact - threatening our survival. It can be manipulated to constitute an insider threat on an unprecedented scale.
A newly discovered spyware that victimises Arabic-speakers has been potentially linked to the 2014-15 Sphinx cyber espionage campaign, which was launched by the threat group APT-C-15 to target PC users in the Middle East.
WikiLeaks, under its new Vault 8 series of released documents, has rolled out what it says is the source code to a previously noted CIA tool, called Hive, that is used to help hide espionage actions when the Agency implants malware.
The threat group APT28/Fancy Bear is now using a little used technique available in Microsoft Office that enables the cyber-gang to execute arbitrary code through a Word document, but without requiring macros to be enabled.
Ahead of today's UK attribution of WannaCry to North Korea, Bharat Mistry advises that the reclusive country's internet and computing infrastructure is not as locked-down as we might believe, thus open to outside interference.
After the consumer version of Kaspersky Lab's antivirus software picked up the source code for surveillance tools used by the Equation Group, the NSA''s elite hacking arm, the file was immediately deleted, according to Kaspersky.
BadRabbit ransomware has hit at least three Russian media companies including Russian business newswire Interfax which became unable to deliver some of its news services, and Ukrainian infrastructure has also been hit.
In a stroke of ironical genius, Russian hackers have targeted security conference attendees with a targeted phishing campaign.
Joep Gommers explains why focusing on the actor will help businesses to protect themselves from a potential cyber-attack, hence the need to understand indicators of attack, in addition to indicators of compromise.
30GB of data stolen from a small Australian military defence contractor which included technical information on jet fighters, transport aircraft, 'smart bomb kits.' Culprit, the lone IT technician.
North Korean hackers have stolen the joint South Korean-US plans for war with the north, including plans to assassinate North Korean leader Kim Jung Un according to an FT report quoting South Korea's Democratic party.
A webshell used to harvest credentials from an unnamed Middle Eastern organisation appears to be targeting Israeli institutions and may possibly be linked to the Iranian APT group OilRig.
21 states were told by the US Department of Homeland Security Friday that their election systems had been the targets of hackers representing the Russian government.
FireEye has laid out evidence that it believes connects the hacking of several US, Saudi Arabian and South Korean aerospace and petrochemical facilities to an Iranian cyber-group it has labeled APT33.
A catastrophic worldwide cyber-attack, the emergence of an IoT-enabled surveillance state, and the weakening of encryption were among the chief security and privacy fears expressed by experts.
Acting on concerns that Russian company Kaspersky Lab has connections to cyber-espionage activities, the US government has banned the use of Kaspersky Lab security software.
An APT group fixated on infiltrating energy facilities in North America and Europe has turned up the juice lately on its operations; IBM says attacks targeting industrial controls systems increased 110 percent in 2016
US Senator Jeanne Shaheen (D-N.H.) is pushing for a US federal government-wide ban of security software developed by Kaspersky Lab.
Security researchers have found a sophisticated malware framework, EHDevel, which started with more vulnerable individuals in bid to reach ultimate objective, targeting several Pakistani individuals.
Mobile users who substitute their damaged phone touchscreens or other hardware components with third-party replacements could be infecting their phones with malicious components.
Itay Glick: "The ship could have fallen victim to a GPS spoof or malware. Both USS McCain and USS Fitzgerald were part of the 7th Fleet;... there may be a connection. I don't believe in coincidence."
Yesterday members of the Scottish Parliament in Holyrood were notified that hackers were trying to crack their email passwords and they were advised to update their passwords.
Under an (NIS) directive being adopted by the UK, CNI providers will face fines of £17 million or up to four percent of annual turnover if they fail to protect critical infrastructure from loss of services due to cyber-attacks.
A cyber-espionage group dubbed APT32 is carrying out intrusions into private sector companies across multiple industries.
Advanced Persistent Threat group linked to China said to be attacking companies by targeting their suppliers - scale of operation said to be unprecedented.
Amidst a Russian war of intelligence and influence, the Canadian military considers what defines a cyber-attack under the Nato agreement and when it should call in help of other countries.
While states are likely to support the idea of a Geneva Convention for cyber-warfare and espionage, it is not likely to be observed when its so difficult to verify attribution.
ViperRat discovered by researchers, designed to exfiltrate data from Israeli Defence Force via Android phones using honey traps.
A recent court case demonstrates that with the ease of access to cyber-weapons, it's not just the big guys who need to worry about cyber espionage and sabotage, writes Chris Allen.