APT28, believed to consist of Russian hackers, has been spotted wielding two zero-day exploits in the latest targeted attack aimed at an "international government entity in an industry vertical that aligns with known APT28 targeting." According to FireEye researchers, the group, which seems to be the same one behind the "Pawn Storm" campaigns and which has been recently found targeting NATO members and the White House, has been exploiting the Adobe Flash CVE-2015-3043 vulnerability and a local privilege escalation vulnerability in Windows (CVE-2015-1701 - does not affect Windows 8 and later) since April 13, 2015.
Kaspersky Lab has recorded a rare and unusual example of one cybercriminal attacking another.
Security researchers working at OpenDNS' Security Labs have developed NLPRank, a new system that helps detect - quickly and relatively accurately - phishing and malware-download sites set up by APT threat actors.
Ordinary employees, privileged users and the supply chain – such as contractors and third party service providers – are all conduits for a traditional insider threat, according to Vormetric.
As more details about the Anthem data breach come to light, sources close to the investigation say that Chinese state-sponsored hackers might be behind the attack.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.