Skip to content

Cybersecurity

Iron Tiger Compromises Chat Application MiMi, Targets Windows, Mac, and Linux Users

Iron Tiger Compromises Chat Application MiMi, Targets Windows, Mac, and Linux Users

CTI (Cyber Threat Intelligence) analysis by Trend Micro of a cyber espionage campaign of Iron Tiger APT (Advanced Persistent Threat) group. Iron Tiger (also known as Emissary Panda, APT27, Bronze Union, and Luckymouse) compromising chat application Mimi’s servers in a supply chain attack by HyperBro malware. MiMi is an

Members Public
Pro-Kremlin hackers target Latvia’s parliament after declaring Russia a sponsor of terrorism

Pro-Kremlin hackers target Latvia’s parliament after declaring Russia a sponsor of terrorism

The pro-Russian hacker gang known as Killnet took down the website of Latvia’s parliament on Thursday after lawmakers there designated Russia as a “state sponsor of terrorism.” The parliament’s website went down for several hours after being hit by a distributed denial-of-service (DDoS) attack, which floods websites with

Members Public
Cisco hacked by Yanluowang ransomware gang

Cisco hacked by Yanluowang ransomware gang

On May 24, 2022, Cisco became aware of a potential compromise. Since that point, Cisco Security Incident Response (CSIRT) and Cisco Talos have been working to remediate. Cisco has updated its security products with intelligence gained from observing the bad actor’s techniques, shared Indicators of Compromise (IOCs) with other

Members Public
Finland parliament website targeted in cyber attack

Finland parliament website targeted in cyber attack

Finland’s parliament said Tuesday its website came under cyber-attack, as the Nordic country applies for NATO membership following Moscow’s invasion of Ukraine. “A denial-of-service attack is taking place against the parliament’s external website,” parliament said in a statement. Finland parliament website targeted in cyber attackFinland’s parliament

Members Public
Targeted attack on industrial enterprises and public institutions

Targeted attack on industrial enterprises and public institutions

A new analysis by Kaspersky unveiled a wave of targeted attacks on military-industrial complex enterprises and public institutions in Belarus, Russia, Ukraine and Afghanistan. Microsoft Word documents attached to the phishing emails contain malicious code that exploits the CVE-2017-11882 vulnerability. The vulnerability enables an attacker to execute arbitrary code (in

Members Public
The Ministry of Digital Development of Russia proposed to collect biometric data of citizens without their consent

The Ministry of Digital Development of Russia proposed to collect biometric data of citizens without their consent

The Ministry of Digital Development of Russia proposed to abandon the need to obtain the consent of a citizen to transfer his biometric data to the “Unified Biometric System” (UBS) from various sources, writes “Kommersant with reference to the draft order of the Ministry of Digital Transformation on the procedure

Members Public
Vadászat a bálnavadászokra

Vadászat a bálnavadászokra

Egyre több magyar felhasználó kap olyan Facebook üzenetet, miszerint az általa üzemeltetett oldal sérti a platform házirendjét és ahhoz, hogy az oldalt ne zárolják, adategyeztetést kérnek. Csakhogy, nem a Facebook küldi az üzeneteket.

Members Public
New Traffic Light Protocol (TLP) standard released by FIRST

New Traffic Light Protocol (TLP) standard released by FIRST

The Forum of Incident Response and Security Teams (FIRST) has published version 2 of the TLP (Traffic Light Protocol) standard, five years after the first version was published. The Traffic Light Protocol (TLP) was created to facilitate greater sharing of potentially sensitive information and more effective collaboration. Traffic Light Protocol

Members Public
Anonymous Source Leaks 4TB of Cellebrite Data

Anonymous Source Leaks 4TB of Cellebrite Data

An anonymous source has leaked around 4TB of proprietary data from Israel-based digital intelligence company, Cellebrite, after it allegedly carried out a successful cyber attack. The leaked data are available via DDoSecrets's website (it is a a non-profit whistleblower organization), for now only on special request, for researchers

Members Public