It has been reported that the U.S. Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have issued a joint malware analysis report (MAR) on a new Trojan dubbed HOPLIGHT, used by the North-Korean APT group Lazarus. According to the MAR AR19-100A advisory published on the US-CERT website, the new Trojan was detected while tracking the malicious cyber activity of the North Korean-backed hacking group HIDDEN COBRA (also known as Lazarus, Guardians of Peace, ZINC, and NICKEL ACADEMY).
Hackers have been breaking into home routers to change DNS server settings and hijack the traffic to redirect it to malicious sites, according to Troy Mursch, security researcher for Bad Packets.
Critical infrastructure operates so much in the back of our minds that it often doesn’t seem that critical. But, yet another report on the cyber vulnerabilities of critical infrastructure suggests it ought to be a bit more up front.
Enterprises have a password problem, and it’s one that is making the work of hackers a lot easier. From credential stuffing to brute force and password spraying attacks, modern hackers don’t have to do much hacking in order to compromise internal corporate networks. Instead, they log in using weak, stolen, or otherwise compromised credentials.
Taking advantage of recent stolen credential dumps, attackers have been exploiting legacy protocols like IMAP to engage in high-volume password-spraying campaigns for the purpose of breaking into companies’ cloud accounts, researchers at Proofpoint are reporting.
Bob Noel had an opportunity to speak with Charlene O’Hanlon, with Digital Anarchist, during RSA 2019 about the future of security and the value of NetOps and SecOps collaboration.
Plixer wins Editor’s Choice Award for Network Security and Management at the RSA Conference 2019.
Following years of AI climbing the hype wheel at RSA Conference, the topic is no longer one of the most prevalent as supply chain and infrastructure fears take focus at RSAC 2019.
The Domain Name System (DNS), known as the phone book for the internet, was recently retuned to improve performance as well as include new security provisions to protect against Distributed Denial of Service (DDoS) attacks. DNS Flag Day drew a line in the sand for noncompliant authoritative DNS servers by removing accommodations. These new updates are welcome, but they do not solve the problem of DNS abuse by cybercriminals.
The numbers for Denial-of-Service attacks were down in the 4th quarter but the ones that got through were more stealth and persisted for a longer duration according to a report from Kaspersky.