More Hidden App Malware Found on Google Play with over 2.1 Million Downloads

Malicious apps hide themselves after installation and aggressively display full-screen advertisements. In recent times we’ve seen multiple malicious apps found in the Google Play Store by various cyber security firms, including Symantec, yet this problem doesn’t seem to be dissipating. Read More …

xHunt Campaign: Attacks on Kuwait Shipping and Transportation Organizations

The first known attack in this campaign targeted a Kuwait transportation and shipping company in which the actors installed a backdoor tool named Hisoka. Several custom tools were later downloaded to the system in order to carry out post-exploitation activities. Read More …

Modern cyber security bears great resemblance to the Titanic disaster, says Stena CISO

Magnus Carling, CISO of worldwide conglomerate Stena AB, likened modern cyber security practices to the oversights which led to the Titanic disaster in 1912. Speaking at Cloudsec 2019, Carling told attendees “the iceberg was innocent. It wasn’t the iceberg that Read More …

Universities a ‘huge target’ for nation-state attackers, warns NCSC

Universities are the gatekeepers and creators of highly valuable information, which makes them attractive targets of cyber crime and state-sponsored espionage, so it’s important that these institutions remain cyber secure. Ask key contributors to the economy, skills development and innovation Read More …

Milipol Paris 2019: Ali Soufan and Kumar Ramakrishna: Two international experts in the fight against terrorism to speak at the opening conference

Milipol Paris 2019, the international event for homeland security and safety, will take place from 19 to 22 November 2019, at the Paris-Nord Villepinte exhibition centre. More than 1,000 exhibitors and 30,000 visitors are expected at stands, workshops, demos and Read More …

Critical Vulnerability in Harbor Enables Privilege Escalation from Zero to Admin (CVE-2019-16097)

Aviv Sasson, a security researcher from the cloud division of Unit 42, has identified a critical vulnerability in a widespread cloud native registry called Harbor. The vulnerability allows attackers to take over Harbor registries by sending them a malicious request. Read More …