Cybersecurity Tools

Transparent Tribe APT actively lures Indian Army amidst increased targeting of Educational Institutions

Overview APT Transparent Tribe (APT36) is luring the Indian Army into opening the malicious file themed ‘Revision of Officers posting policy.’ Quick Heal’s APT Team has been constantly tracking this persistent threat group and has encountered a new attack campaign targeting India. At the same time, we have also observed increased targeting of the education […]

The post Transparent Tribe APT actively lures Indian Army amidst increased targeting of Educational Institutions appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

Cybersecurity Tools

Microsoft’s next-level nomenclature, naming hacking groups

EXECUTIVE SUMMARY: Last week, Microsoft’s cyber security division announced that it is changing its taxonomy for naming hacking groups. Previously, Microsoft assigned cyber criminal organizations the names of chemical elements, as listed in the periodic table. In the new system, Microsoft will assign hacker groups two-word names, including a weather-based descriptor. The new names The […]

The post Microsoft’s next-level nomenclature, naming hacking groups appeared first on CyberTalk.

Cybersecurity Tools

Ransomware: Current state or already too late?

Patrik Honegger has worked in the IT sector since the 1990’s and has specialized in the IT security field since 2000. He joined Check Point in 2001. Since joining Check Point, he has been involved with the full array of company solutions and customer sectors and maintains a deep technological understanding of products and customers’ […]

The post Ransomware: Current state or already too late? appeared first on CyberTalk.

Cybersecurity Tools

SECURITY ALERT: Heimdal® Identifies Active Phishing Campaign Singleing Out Romanian Telecom Users

On the 28th of April, acting on a tip received from an anonymous source, Heimdal®’s SOC team has come across an active phishing campaign that appears to specifically target Romanian telecom customers. The preliminary analysis of all of the evidence presented so far has indicated that the threat actor(s) involved in this operation exhibit the […]

The post SECURITY ALERT: Heimdal® Identifies Active Phishing Campaign Singleing Out Romanian Telecom Users appeared first on Heimdal Security Blog.

Cybersecurity Tools

Managed Threat Hunting: The Next Step from Traditional Cybersecurity

As the world becomes increasingly digital, cybersecurity threats continue to evolve and become more sophisticated. Traditional cybersecurity measures are no longer enough to protect organizations from malicious attacks. That’s where managed threat hunting comes in – a proactive approach that involves actively searching for potential threats before they can do any damage. But is it […]

The post Managed Threat Hunting: The Next Step from Traditional Cybersecurity appeared first on Heimdal Security Blog.

Cybersecurity Tools

RTM Locker Ransomware Gang Targets VMware ESXi Servers

RTM Locker is now the most recent enterprise-targeting ransomware operation found to be using a Linux encryptor to target virtual machines on VMware ESXi systems. The RTM (Read The Manual) cybercrime group, which is well-known for disseminating a unique banking virus designed to steal money from victims, has been engaged in financial fraud since at […]

The post RTM Locker Ransomware Gang Targets VMware ESXi Servers appeared first on Heimdal Security Blog.

Cybersecurity Tools

The age of giant AI models, already over?

EXECUTIVE SUMMARY: If you expected OpenAI to further develop ChatGPT’s ‘neural network’ in order to enhance the bot’s performance, allowing it to perform an even wider range of tasks with unprecedented accuracy and efficiency, you might find yourself disappointed. OpenAI’s CEO, Sam Altman, warns that the research strategy used to create the bot has already […]

The post The age of giant AI models, already over? appeared first on CyberTalk.

Scroll to Top