What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in Cyberattacks

Microsoft, Apple versus China, spyware actors

Image: 2ragon/Adobe Stock Revelations this week from Microsoft and Apple speak to the COVID-like persistence of cyber threats and the ability of threat actors to adapt in the wild, steal credentials and sidestep patches. Microsoft explained this week how it had discovered and attempted to harden ramparts in the face . . . Read more

Cyberattacks surge to 61% of small and medium-sized businesses, says study

A poll of security software buyers shows 39% of small and medium-sized businesses lost customer data due to cyberattacks. Image: Song_about_summer/Adobe Stock More than half of small and medium-sized businesses in the U.S. and U.K. faced a successful cyberattack in the last year, according to a June 2023 study from . . . Read more

Chinese state-sponsored attack uses custom router implant to target European governments

Image: ArtemisDiana/Adobe Stock Check Point Research released a new report that exposes the activities of a Chinese state-sponsored APT threat actor the research team tracks as Camaro Dragon. The threat actor uses a custom implant to compromise a specific TP-Link router model and steal information from it, as well as . . . Read more

New DDoS attacks on Israel’s enterprises should be a wake-up call

Experts see the latest DDoS attacks against Israel as a case study in the effectiveness of simple, brute-force cybersecurity attacks, even against the most sophisticated targets. Image: Askha/Adobe Stock In recent days, Israel has faced cyberattacks reportedly involving Iran. Experts say the attacks demonstrate the risk that fairly unsophisticated attacks . . . Read more

Major Gaming Companies Hit with Ransomware Linked to APT27

Researchers say a recent attack targeting videogaming developers has ‘strong links’ to the infamous APT27 threat group. A recent slew of related ransomware attacks on top videogame companies has been associated with the notorious Chinese-linked APT27 threat group, suggesting that the advanced persistent threat (APT) is swapping up its historically . . . Read more

Defending Against State and State-Sponsored Threat Actors

Saryu Nayyar of Gurucul discusses state and state-sponsored threat actors, the apex predators of the cybersecurity world. Security threats from states and state-sponsored actors have been around since before the field of cybersecurity was defined. They have now evolved to cyberspace, and present unique challenges for defenders. While there are . . . Read more

SideWinder APT Targets Nepal, Afghanistan in Wide-Ranging Spy Campaign

Convincing email-credentials phishing, emailed backdoors and mobile apps are all part of the groups latest effort against military and government targets. The SideWinder advanced persistent threat (APT) group has mounted a fresh phishing and malware initiative, using recent territory disputes between China, India, Nepal and Pakistan as lures. The goal . . . Read more

As Modern Mobile Enables Remote Work, It Also Demands Security

Lookout’s Hank Schless discusses accelerated threats to mobile endpoints in the age of COVID-19-sparked remote working. Smartphones, tablets, collaboration apps and other modern framework tools are critical to maintaining productivity remotely, but they also demand an integrated security strategy purpose-built for mobile devices. The coronavirus pandemic has completely upended the . . . Read more