RomCom malware cybersecurity espionage

RomCom Malware Group Targets EU Gender Equality Summit

A hacker group that continues to extend its reach from financially motivated attacks into cyber-espionage this summer targeted attendees of a gender equality conference with a pared-down version of the RomCom remote ...
Security Boulevard
cybersecurity APT espionage

APT Group Earth Estries Runs Espionage Campaigns Against US, Others

A newly discovered cyber-espionage threat group for at least three years has been using advanced and novel tools to steal information from governments and tech companies in half a dozen countries, including ...
Security Boulevard
Turla, Snake

Russia’s ‘Turla’ Group – A Formidable Cyberespionage Adversary

Russia's Turla cyberespionage group is now recognized as one of the world’s most dangerous cybersecurity threats ...
Security Boulevard
TechSpective Podcast 085 - Lisa Plaggemier

Lisa Plaggemier Discusses Cybersecurity at the Winter Olympics

TechSpective Podcast Episode 085 The Winter Olympics are taking place right now in Beijing, China. It puts the teams and athletes in a sensitive and precarious situation because China is an economic ...

Russia, China, Cyber War, and Letters of Marque and Reprisal

With the latest series of aggressive hacking on critical infrastructure and massive scale ransomware attacks on United States companies and institutions, it is clear that we are in a cyber war with ...
Chinese Hackers Target the Afghan Government

Chinese Hackers Target the Afghan Government

It has come to light that Chinese hackers are carrying out cyber attacks on the Afghan government as a part of an espionage campaign. Cyber security researchers believe that this campaign might ...
TechSpective Podcast 065 - Ron Gula

Ron Gula – Innovation and Emerging Trends in Cybersecurity

TechSpective Podcast Episode 065 Cybersecurity is constantly evolving. The threat landscape continues to expand and new technologies shift and extend the attack surface–both of which require new and innovative tools and practices ...

The Cybersecurity Executive Order: Why CMMC May Be the One Standard to Rule Them All

Security practitioners across the US spent most of Thursday, May 13, reading over, hashing, rehashing, and then re-rehashing the “Executive Order on Improving the Nation’s Cybersecurity” (the Executive Order). Between the mandate ...
cyber espionage

Verizon Report Finds Cyber Espionage Attacks Aimed Mostly at Endpoints

Verizon has published a 2020 Cyber Espionage Report that finds the bulk of these types of attacks are aimed at endpoints such as desktops and laptops. Based on data collected for a ...
Security Boulevard

Fortress Information Security Strives to Help Protect Critical Infrastructure

The agencies and businesses that make up the backbone of our critical infrastructure have a larger bullseye on their backs than an average company. When it comes to the electric utility providers ...