Read more about APT
Bookmark and Share
  • Reactions from the security community to the Adobe breach

    04.10.2013

    Hackers have breached Adobe's network and have made off with personal, account, and encrypted financial information of nearly 3 million Adobe customers, as well as the source code for Adobe Acrobat, ColdFusion, ColdFusion Builder and other Adobe products.

  • Icefog cyber espionage campaign exposed

    26.09.2013

    Kaspersky Lab’s security research team discovered Icefog, a small yet energetic Advanced Persistent Threat (APT) group that focuses on targets in South Korea and Japan, hitting the supply chain for Western companies.

  • LynuxWorks releases a rootkit detection system

    18.09.2013

    LynuxWorks announced the RDS5201, a new product to help detect the rootkit.

  • NetTraveler APT group is back, adds watering hole attacks to its arsenal

    03.09.2013

    The "Red Star" APT group employing the NetTraveler malware family is still active, but has changed its modus operandi.

  • The TAO of NSA

    02.09.2013

    In last week's reports, it has been pointed out that NSA has its own hacking unit called Tailored Access Operations (TAO), and that its capabilities have been tapped for hunting down Osama bin Laden.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //