If you think that Flash, the once-popular web plugin, couldn’t die fast enough, even those annoying fake Flash installers riddled with malware aren’t going anywhere any time soon. In fact, they’re getting even sneakier.
A well-known hacking group remains highly active with new incursions against Middle Eastern governments, according to a new report from U.S. cybersecurity firm Palo Alto Networks. Additionally, the group is employing evasion techniques meant to cut down on the risk of detection.
A hacking group apparently based in Pakistan has been straddling the fence between cybercriminal activity and nation-state espionage, leveraging the same malicious infrastructure to both launch email spam campaigns and target government agencies in U.S., UK, Russia and Spain
A 21-year-old Kentucky man has pleaded guilty to authoring and distributing a popular hacking tool called “LuminosityLink,” a malware strain that security experts say was used by thousands of customers to gain unauthorized access to tens of thousands of computers across 78 countries worldwide.
Palo Alto Networks (NYSE: PANW) has added Richard Ledgett, former deputy director at the National Security Agency, and Christopher Painter, former top cybersecurity official at the State Department, to its public sector advisory council to help shape the company’s cyber strategy and offer advice on security and technological needs of government clients.
Palo Alto Networks said Thursday it has brought onboard three former top federal cybersecurity officials to advise the company on security and technology trends in both the U.S. and international government sectors.
Security researchers at Palo Alto Networks Inc. have published a new report stating that there has been a massive surge in cryptomining malware, having discovered 629,126 cryptomining malware samples recently, with the vast majority mining for Monero.
Researchers from Palo Alto Networks have analyzed around 630,000 samples of cryptocurrency mining malware captured by the company’s systems over the past few years and extracted the wallet IDs and mining pools used by attackers.