APT33 has used botnets to infect targets in the U.S. and Middle East, researchers say

An Iranian government-linked hacking group has in the last year been using small clusters of hijacked computers to infect a handful of targets that include a U.S. national security firm and a university, researchers said Thursday. The Iranian group, dubbed APT33, is using the botnets — groups of computers commandeered by attackers — in “extremely targeted malware campaigns against organizations in the Middle East, the U.S., and Asia,” cybersecurity company Trend Micro said. Botnets are often comprised of a large number of machines. But in this case, the Iranian hackers are using just a dozen computers per botnet to deliver their malware and get persistence access on a network, according to the researchers. The Iranian hackers also set up their own virtual private network with “exit nodes” that change frequently, Trend Micro said. The researchers say they have been tracking those VPN nodes for over a year, but the group has […]

The post APT33 has used botnets to infect targets in the U.S. and Middle East, researchers say appeared first on CyberScoop.

Continue reading APT33 has used botnets to infect targets in the U.S. and Middle East, researchers say

10 Myths and Misconceptions About Industrial Espionage

Industrial espionage is real, it’s common, and it can be very costly for your organization. Don’t fall for the myths around this serious issue. Start preparing for the threat today.

The post 10 Myths and Misconceptions About Industrial Espionage appeared first on Security Intelligence.

Continue reading 10 Myths and Misconceptions About Industrial Espionage

NordVPN admits ‘isolated’ data breach was discovered last year

Virtual private network provider NordVPN, which operates in more than 60 countries, was breached last year after an outsider infiltrated a Finnish data center, the firm said Monday. In a statement on its website, NordVPN said it learned in March 2018 about the intrusion, which occurred on a server that NordVPN rents from another company. The hacker leveraged an unprotected remote management system left exposed by the data center. The VPN provider says usernames and passwords could not have been intercepted, and user activity logs likewise seem safe. It may have been possible, though, for the intruder to abuse website traffic and monitor some user activity, NordVPN says. The affected server was taken offline and “ceased to exist” on March 5, 2018, while NordVPN ended its contract with the data center provider as a result of the incident. “This was an isolated case, and no other data center providers we use have been […]

The post NordVPN admits ‘isolated’ data breach was discovered last year appeared first on CyberScoop.

Continue reading NordVPN admits ‘isolated’ data breach was discovered last year

APT groups are exploiting outdated VPNs to spy on international targets, U.K. and U.S. warn

International hacking groups are exploiting vulnerabilities in virtual private network technologies to steal user credentials and monitor sensitive traffic, the United Kingdom’s National Cyber Security Centre said, amid recent warnings that the Chinese government has used similar tactics to collect intelligence. The NCSC, an offshoot of Britain’s intelligence agency, the GCHQ, said on Oct. 2 hackers are leveraging outdated versions of Palo Alto Networks, Fortinet and Pulse Secure products. The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Agency published its own advisory on the vulnerabilities, which attackers could use to take over an affected system, on Oct. 4. Neither warning speculates on who may be behind the attack, though the alerts come after Microsoft in August said Manganese, a Chinese hacking collective also known as APT5, was focusing attacks on Pulse Secure and Fortinet products. Pulse Secure, Palo Alto and Fortinet have each released security updates for all of […]

The post APT groups are exploiting outdated VPNs to spy on international targets, U.K. and U.S. warn appeared first on CyberScoop.

Continue reading APT groups are exploiting outdated VPNs to spy on international targets, U.K. and U.S. warn

SOCKS Proxy Primer: What Is SOCKs5 and Why Should You Use It?

Organizations everywhere are using the SOCKs5 proxy to facilitate access to back-end services behind firewalls, eliminate third-party and free proxy servers, minimize errors and maximize performance.

The post SOCKS Proxy Primer: What Is SOCKs5 and Why Should You Use It? appeared first on Security Intelligence.

Continue reading SOCKS Proxy Primer: What Is SOCKs5 and Why Should You Use It?

How Cyber-Secure Are Business Travelers? New Report Says Not Very

I know that open Wi-Fi is sometimes better than no Wi-Fi, which is why I always use a VPN when connecting to public networks. But not all business travelers are so careful, according to a new report.

The post How Cyber-Secure Are Business Travelers? New Report Says Not Very appeared first on Security Intelligence.

Continue reading How Cyber-Secure Are Business Travelers? New Report Says Not Very

Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices

Spring is just around the corner, which means it’s time for CISOs to evaluate their security strategy, eliminate processes that aren’t working, and adopt new cybersecurity practices and technologies.

The post Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices appeared first on Security Intelligence.

Continue reading Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices

How to Boost Your Data Privacy With a Virtual Private Network

Using a virtual private network (VPN) to obfuscate your location and encrypt data is a powerful way to boost data privacy and prevent the tracking, stalking and theft of personal information.

The post How to Boost Your Data Privacy With a Virtual Private Network appeared first on Security Intelligence.

Continue reading How to Boost Your Data Privacy With a Virtual Private Network

Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home

As threat actors increasingly target IoT devices to spread malware and facilitate DDoS attacks, it’s crucial to establish network security policies for your home IT just as you would at work.

The post Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home appeared first on Security Intelligence.

Continue reading Bringing It All Back Home: Why You Should Apply Enterprise Network Security Policies to Your Smart Home

SMB Security Best Practices: Why Smaller Businesses Face Bigger Risks

While massive data breaches typically hog all the cybersecurity headlines, SMB security is also at risk as cybercriminals go after easy targets with low IT budgets.

The post SMB Security Best Practices: Why Smaller Businesses Face Bigger Risks appeared first on Security Intelligence.

Continue reading SMB Security Best Practices: Why Smaller Businesses Face Bigger Risks