blog_hero_02

Blog

Massive Data Hack Becomes Personal for German Politicians
Eyal Aharoni, January 13, 2019
Read More >
  Targeting politicians with cyber-attacks is not new, cybercriminals, hacktivists and rival nations have been doing this for many years. In 2016, Russian hackers allegedly tried to interfere in the 2016 US presidential election. The British parliament was targeted in mid-2017 in an attempt to access the accounts of hundreds of MPs, Lords, aides and staff by the suspected Russia and North Korea. During July 2018, hackers stole 1.5 million accounts patient data in Singapore including those of.
Read More >
Cyber Slingshot Away!
Eyal Aharoni, March 13, 2018
Read More >
Coming to a router near you - beware of Slingshot malware! Cybercrooks and cyberspooks never sleep, and their new “creations” keep popping up. One of the recent trends is targeting routers to cyberattack. Recently, the routers of Latvian manufacturer MikroTik were attacked in a highly sophisticated manner. The malware dubbed “Slingshot”, infected at least 100 computers worldwide. Using a multi-layered attack, the malware spies on PCs. Similar to the advanced backdoor Trojan Regin (which.
Read More >
Another Fake Invoice Phishing Scam to the Bin
Eyal Aharoni, February 8, 2018
Read More >
The fake invoice phishing scam has been around for quite some time and it pops in the wild every once in a while, in a different form. Overall, the nature of all those scams are in the end the same - a clever con to defraud victims. In January 2018, we saw a new version of fake invoice phishing scam wreaking havoc; this time targeting a large number of Italian organizations. In itself, the modus operandi of this attack was quite simple and did not require much sophistication from the.
Read More >
Will 2018 be the year of critical infrastructure cyberattacks?
Eyal Aharoni, February 1, 2018
Read More >
For some time now, authorities have been worried that their critical infrastructure will be shut down or severely compromised. Some institutions experience thousands of attempted attacks on a daily basis by hackers, cyber criminals and rival nations. According to the US Department of HLS, especially the following critical infrastructure sectors are at risk:  Chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy,.
Read More >
Iran’s Growing Role in Cyber warfare
Eyal Aharoni, November 2, 2017
Read More >
On October 31, Major General Nadav Padan stated at the Reuters Cyber Security Summit that Iran has been launching an increasing number of attacks on Israel. Padan, who heads the IDF’s C4I and Cyber Defense Directorate, added: “Iran has been responsible for many of the thousands of daily cyberattacks on Israel”. It’s no secret that Iran has been a major villain in our neighborhood for the last couple of decades. Since Iran has a weak conventional.
Read More >
What CopyKittens Can Teach Us About Cyber-security
Eyal Aharoni, July 26, 2017
Read More >
Thanks to the experts at ClearSky Cyber Security and Trend Micro, a highly professional cyber spy ring, known as CopyKittens, was exposed in an operation with the codename “Wilted Tulip”. The detailed report published on July 25th 2017, paints an alarming picture. CopyKittens has been active since 2013, maybe even longer, causing havoc worldwide. The group has been targeting government institutions, academic institutions, defense companies, municipal authorities, and subcontractors of the.
Read More >
Petya, NotPetya call it the way you like, it is still Ransomware!
Eyal Aharoni, June 28, 2017
Read More >
Tuesday June 27th, just a little over than a month had past since the Wannacry ransomware campaign and in just a few hours multiple reports of a worldwide outbreak regarding a new ransomware campaign, some say it is a new variant of "Petya” others call it “NotPetya”. The new Petya ransomware variant infections broke out beginning at the Ukraine and spread from there to other countries. This proliferation of this Ransomware is believed to begin with a malicious email containing a ransomware.
Read More >
Show

Subscribe to Our Blog

Stay up to date with the latest cybersecurity news and tips

By Tag