TEMP.Periscope cyber espionage group targets Engineering and Maritime Industries

A suspected Chinese-linked cyber espionage campaign dubbed Temp.Periscope has been targeting engineering and maritime industries. FireEye has observed a spike in the campaign activity since early 2018 and has tracked the activity since 2013.

Continue Reading TEMP.Periscope cyber espionage group targets Engineering and Maritime Industries

Russian cyber activity targets critical infrastructure and energy sectors

Russian government cyber activity has targeted U.S Government entities, energy and other critical infrastructure sectors. The activity has been active since at least March 2016, according to a US-CERT Technical Alert (TA).

Continue Reading Russian cyber activity targets critical infrastructure and energy sectors

Microsoft March 2018 patch updates

Microsoft issued March 2018 Security Updates that includes 75 vulnerability fixes, 15 of them rated critical. The updates address multiple Microsoft products to include Windows, Internet Explorer, Edge, Exchange, Office, Office Services and Web Apps, ChakraCore, PowerShell and Adobe Flash.

Continue Reading Microsoft March 2018 patch updates

Slingshot APT targets routers

A highly sophisticated cyberespionage campaign dubbed Slingshot has been uncovered by Kaspersky security researchers. The campaign targets MikroTik routers to compromise them and use as a springboard to attack victims' computers, as the company revealed in last week's Kaspersky Security Analyst Summit (SAS).

Continue Reading Slingshot APT targets routers

RedisWannaMine Unveiled

Security researchers at Imperva have spotted a new generation of cryptojacking attacks dubbed RedisWannaMine that targets Windows database and application servers. The campain also leverages the leaked NSA exploit EternalBlue to exploit vulnerable Windows systems.

Continue Reading RedisWannaMine Unveiled

Hackers exploit Apache Solr instances with cryptocurrency miner

Hackers have attacked over 1,400 Apache Solr servers late last month to install a cryptocurrency miner. Researchers say the attack resembles a similar campaign discovered back in January that targeted systems running unpatched Oracle WebLogic software. In that attack, hackers installed a mining rig used to mine Monero cryptocurrency.

Continue Reading Hackers exploit Apache Solr instances with cryptocurrency miner