The Latest in IT Security

Posts Tagged ‘perpetrators’

In today’s threat landscape, distributing malware and developing malware are two different worlds. Both require a different set of skills in order to work and in order to achieve their separate goals. For example, in my blog post Get gamed and rue the day…, I described a bot-controlled worm in which the code fragment suggested that […]

Read more ...

During our research on the Winnti group we discovered a considerable amount of Winnti samples targeting different gaming companies. Using this sophisticated malicious program cybercriminals gained remote access to infected workstations and then carried out further activity manually.Naturally, we were keen to find out how the malicious libraries spread across a local network. To do […]

Read more ...

Last week, when “wiper” malware hit South Korean companies, the website of LG Uplus was reportedly defaced as well. From The Register: Due to the proximity of the incidents, the “Whois Team” is being suspected as the perpetrators of the wiper attacks. However this is still being debated. From Ars Technica: We browsed through wiper […]

Read more ...


Categories

WEDNESDAY, NOVEMBER 13, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments