A custom malware used in a five-pronged APT espionage campaign was largely built from the defunct Comment Crew’s proprietary code.
Evidence shows that three of the most destructive incidents seen in modern cyber-history are the work of one APT.
This is the second local privilege-escalation zero-day this APT group has exploited.
This year’s Virus Bulletin conference featured top-tier research from some of the world’s best threat intelligence experts.
Russian-speaking Turla has also racked up more victims in its latest APT campaign.
The Iran-linked APT appears to be in a state of continuous tool development, analogous to the DevOps efforts seen in the legitimate software world.
An advanced threat actor has been associated with China’s Ministry of State Security via two individuals and a Chinese firm.
The highly sophisticated operation shares code with the Hermes malware, and may be linked to the Lazarus Group APT actor.
The recently-patched flaw could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Mike Murray, vice president of security intelligence at Lookout, discusses how mobile is redefining phishing, taking it out of the traditional inbox and into SMS and Facebook messages.