China-linked APT31 group was behind the attack on Finnish Parliament

China-linked APT31 group was behind the attack on Finnish Parliament

China-linked cyber espionage group APT31 is believed to be behind an attack on the Parliament of Finland that took place in 2020. China-linked cyber espionage group APT31 is believed to be behind an attack on the Parliament of Finland that took place in 2020. According to the government experts, the hackers breached some parliament email accounts in December 2020. “Last year, the Security Police has identified a state cyber espionage operation against Parliament, which tried…

Read More

PS5 phishing scam baits gamers with promise of free console

PS5 phishing scam baits gamers with promise of free console

Scammers are taking advantage of a shortage of Sony PlayStation 5 consoles to try to hoodwink people eager to snag one, says Kaspersky. Image: Sony Cybercriminals behind phishing campaigns have a knack for knowing which trends and topics will catch the eye of potential victims. Sony’s new PS5 is one topic ripe for exploitation, especially since the new console is in short supply due to a scarcity of semiconductor chips. A Friday report from security…

Read More

Threat Roundup for March 12 to March 19 – Cisco Blogs

Threat Roundup for March 12 to March 19 – Cisco Blogs

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between March 12 and March 19. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats. As a reminder, the information provided for the following threats in this post is non-exhaustive…

Read More

US Indicts Software Engineer

US Indicts Software Engineer

A Swiss software developer has been indicted by the US government for allegedly stealing source code and proprietary data and publishing it online. On March 18, a grand jury indicted 21-year-old Till Kottman for identity and data theft and computer-intrusion crimes spanning 2019 to the present.   Lucerne resident Kottman, also known as “deletescape” and “tillie crimew,” allegedly conspired with others to hack into multiple companies and government entities and publish the private data of more than 100 entities on…

Read More

Shaking up the SD-WAN Market and Propelling Partner Success – Cisco Blogs

Shaking up the SD-WAN Market and Propelling Partner Success – Cisco Blogs

Cisco is shaking up the market and doubling down on SD-WAN while doing all we can to help our partners propel to the next level. Why? Because the market is crazy dynamic, SD-WAN is the connective tissue for network digital transformation and customer demands change seemingly by the hour. I am thrilled about the hyper-focus that our partners have demonstrated not only around loyalty to Cisco but also showing true agility in the market being…

Read More

Are Your Organization’s Critical Assets Five Steps or Fewer from A Cyber Attacker?

Are Your Organization’s Critical Assets Five Steps or Fewer from A Cyber Attacker?

By Gus Evangelakos, Director Field Engineering, XM Cyber Cybersecurity is an asymmetric battle — and one in which attackers hold an unfair advantage. Adversaries maintain the initiative and can attack from novel and unexpected angles, while defenders are forced into a reactive role. The asymmetric nature of cybersecurity isn’t the sole reason data breaches continue to rise every year, of course. The popularity of cloud computing and constant expansion of the attack surface also present…

Read More

How to use semanage and avoid disabling SELinux

How to use semanage and avoid disabling SELinux

Jack Wallen introduces you to three semanage commands that will help make dealing with SELinux considerably easier. Image: iStock/iBrave I get it–SELinux is challenging, and when your applications or services are prevented by the security layer, your first inclination is to set it to either Disabled or Permissive. In a time when security is at a premium, you can’t afford to make that change, else you risk the security of your entire system or your…

Read More

APT31 Fingered for Cyber-Attack on Finnish Parliament

APT31 Fingered for Cyber-Attack on Finnish Parliament

An advanced persistent threat group (APT) with links to the Chinese government has been blamed for a cyber-espionage attack on Finland’s parliament.  The Finnish Security and Intelligence Service (Supo) announced on Thursday that APT31 was behind a cyber-espionage campaign that targeted the Finnish parliament last fall.  Security companies including Checkpoint and FireEye have linked APT31’s activities with the state cyber-operations of the People’s Republic of China.  “Supo identified a state-run cyber espionage operation targeted last year against the parliament with the…

Read More

Aligning Social Responsibilities with Business Goals – Cisco Blogs

Aligning Social Responsibilities with Business Goals – Cisco Blogs

Sounds Too Good to be True? Companies all over the world are consistently trying to make a positive impact on society by doing a variety of Corporate Social Responsibility activities. Such efforts become even more sustainable when CSR gets integrated with an organization’s key business goals resulting in a true Win-Win! At Cisco, “Giving back to society” has always been at the core of how we do business. This became even more relevant in our…

Read More

Business email compromise scams proved costly to victims in 2020

Business email compromise scams proved costly to victims in 2020

The FBI received more than 19,000 complaints of business email compromises last year, costing victims around $1.8 billion. Image: Getty Images/iStockphoto In 2020, cybercriminals amped up their attacks by taking advantage of a host of events, from the coronavirus pandemic to remote working and learning to the presidential election and more. Among the many types of cyber crimes affecting organizations and individuals last year, business email compromises  and email account compromises proved especially costly. Released…

Read More
1 3,467 3,468 3,469 3,470 3,471 3,523