• 28 de julio de 2014
    The targeted attack campaign Esile was found in the second half of 2013 trying to spread backdoor malware inside the networks of East Asian governments, electronic manufacturers, and telecommunications firms.
  • 28 de julio de 2014
    The PLEAD campaign is the second attack to target entities in Taiwan in the first half of 2014. Taiwanese agencies were also targeted in May using a Microsoft Word zero-day vulnerability.
  • 16 de julio de 2014
    In an ideal world, IT administrators go out of their way to protect the organization's information. However, even IT admins are prone to misconceptions that leave organizations vulnerable to attacks.
  • 12 de julio de 2014
    Ninety-six percent of enterprises think they know what targeted attack campaigns are. But studies show that more than half can't even differentiate between traditional threats and actual attacks. How far is enterprise perception on their targeted attack pr
  • 25 de junio de 2014
    Attackers have found a new use for Dropbox, apart from just hosting malware. This new tactic uses the PlugX remote access tool to download its C&C server settings using the free file storing service.
  • 26 de mayo de 2014
    Are all these large-scale Point-of-Sale (PoS) system attacks proof that attackers target payment cards more? While naming 2013 the "Year of the Retailer Breach", Verizon says POS-related cases have gone down in numbers since they peaked in 2010.
  • 26 de mayo de 2014
    Attackers are finding more and more ways to exploit weaknesses, and now, we see the BLYPT backdoor family using blobs in its routines. Who are the targets of this new targeted attack campaign and how can it get in?
  • 26 de mayo de 2014
    Ever heard of an attack that plays possum? The Siesta campaign gets in mostly via spear-phishing emails and then lies dormant for varied time periods before gathering information.
  • 26 de mayo de 2014
    A new targeted attack campaign is waking up large numbers of industries via spear phishing emails. Promptly named, Siesta, the campaign sets in by ¡°sleeping¡± first for varied time periods before moving on to eventually stealing valuable company data.