Cybersecurity Tools

The role of blockchain in IoT security

By Zac Amos, Features Editor, Rehack.com. While many people are aware of blockchain technology on account of cryptocurrency, they are unfamiliar with the fact that it can serve as a valuable solution for securing IoT devices. Since blockchains rely on a decentralized system, they are essentially very difficult to compromise. This can make blockchains a strong choice […]

The post The role of blockchain in IoT security appeared first on CyberTalk.

Threats

Konni Group Attack Detection: North Korean Hackers Leverage russian-Language Weaponized Word Document to Spread RAT Malware

Konni Group Attack Detection

Defenders observe a new phishing attack, in which adversaries weaponize a russian-language Microsoft Word document to distribute malware that can extract sensitive data from targeted Windows instances. Hackers behind this offensive campaign belong to a North Korean group dubbed Konni, which shares similarities with a cyber-espionage cluster tracked as Kimsuky APT.  Detect Konni Group Attacks […]

The post Konni Group Attack Detection: North Korean Hackers Leverage russian-Language Weaponized Word Document to Spread RAT Malware appeared first on SOC Prime.

Scroll to Top