Slingshot APT: Riding On A Hardware Trojan Horse

Earlier this year, researchers from Kaspersky Security Analyst Summit (SAS) issued a report on a highly sophisticated cyberespionage campaign called Slingshot. What makes this initial attack vector unique is that many victims were attacked through compromised routers made by MikroTik. Routers download and run various DLL files in the normal course of business. Attackers found a way to […]

Smart Camera Critical Vulnerabilities Could Allow Criminals To Spy On Victims

Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP vulnerability

Earlier today, Kaspersky Lab researchers announced that they had discovered flaws in Hanwha’s SmartCam cameras. More than a dozen vulnerabilities were found including critical flaws that can be used to take control of devices remotely. IT security experts commented below. Amir Abramovitch, Security Researcher at Cy-OT: “According to this research, hackers can take over any Hanwha smart camera, and some […]

Has Theresa May Has Cleared The Way For A Cyberattack On Russia?

It has been reported this morning that Theresa May has cleared the way for a cyberattack on Russia as she challenged Vladimir Putin to explain how a powerful Russian nerve agent came to be used in an assassination attempt on British soil. Amber Rudd, the home secretary, hinted at covert retaliation last week, saying: “You may […]

Industrial Internet Consortium Releases The Endpoint Security Best Practices White Paper

The Industrial Internet Consortium, the world’s leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT), announced the publication of the Endpoint Security Best Practiceswhite paper. It is a concise document that equipment manufacturers, critical infrastructure operators, integrators and others can reference to implement the countermeasures and controls they need to ensure […]

Slingshot: The How, What And Who

How these routers have been hacked: “Domestic connections and users typically offer a low defence and as a result, criminals will target them at home. Dropping an APT onto users at home will give them a beeline into an organisation – having them innocently walk the compromised PC into the work environment, bypassing any perimeter […]

Gwent Police Investigated For Hiding Potential Hack

Gwent Police is being investigated after failing to inform hundreds of people that hackers may have accessed their confidential reports to the force. Sky News has learned that up to 450 people who filed reports through an online tool over a two-year period could have been put at risk by hackers due to security flaws. Although the […]

Five Essential Pillars Of Big Data GDPR Compliance

The Path to Compliance Through Data Governance On May 25, 2018, the General Data Protection Regulation (GDPR) will come into effect in the European Union. Chances are you’ve already seen quite a bit of buzz surrounding GDPR and for good reason – it represents a significant change in how data will be handled around the world. […]