• A long-running cyber espionage campaign called DarkHotel has been discovered using malware to target executives through Wi-Fi networks of hotels in the Asia-Pacific region.
  • Zero-day exploits aren't the only exploits used in the targeted attack landscape. In the first half of 2014, we also found out that attackers still heavily target older vulnerabilities.
  • We typically expect to see at least three to four zero-day vulnerabilities a year. October 2014 is proving to be an exception to the rule as three zero-day vulnerabilities have already been exploited within the month.
  • This Operation Pawn Storm attack scenario involves the use of phishing emails. See how one line of Javascript code could place millions of Outlook Web Access (OWA) users at risk of becoming victims of a simple, but clever phishing attack.
  • Despite the availability of fixes related to the Sandworm vulnerability (CVE-2014-4114), new attacks related to this flaw are still being spotted. These attacks contain a new routine that could prevent detection.
  • We've seen malware that takes advantage of cloud-based sharing sites such as DropBox, Sendspace, and Evernote. Add Google Drive to that list. We recently came across malware that uses Google Drive as one way of siphoning information from its victims.
  • A recent investigation revealed that the Sandworm zero day exploit could likely be used to target GE Intelligent Platform CIMPLICITY users. Find out what it does and how you can safeguard your systems against this emerging attack.
  • Microsoft has announced the discovery of a zero-day vulnerability affecting all supported versions of Microsoft Windows and Windows Server 2008 and 2012 that is being used in attacks against NATO and several European industries and sectors.
  • The backdoor malware MIRAS got an upgrade from just running in 32-bit Windows operating system versions to 64-bit ones, expanding its victim range to more users of the OS. MIRAS is the same malware family linked to attacks against a Europe-based IT company.