A suspected Iran-based hacking group known for defacing websites has shown increased ambition over the past few months, targeting U.S. defence contractors and Iranian dissidents, according to a new report from security company FireEye. ...
Tags: Computer Products, IT
An Adobe Flash exploit has targeted three sites. Adobe Systems on Thursday announced knowledge of the exploit and what steps to take. The company assigned the CVE identifier CVE-2014-0502 to the vulnerability. Its security bulletin ...
Tags: zero-day exploit, Security updates, Adobe Flash Player
FireEye has announced the release of FireEye OS 7.1, the update to the FireEye OS. FireEye says OS 7.1 offers more scalable management capabilities to its CM series, IPv6 network security support to the NX series, and enhanced email ...
Tags: computer
We were already aware of the existence of illicit marketplaces teeming with tools for cybercriminals looking to subvert the security of online networks. But one of the latest revelations from the cache of documents stolen by NSA ...
Tags: cybercriminals, security of online networks, Edward Snowden, NSA
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in ...
Tags: IE, zero-day, hacker, watering hole
The website of a U.S. organisation specialising in national and international security policy was compromised with malware that targeted a previously unknown vulnerability in Internet Explorer. A nation-state looking to compromise the ...
Tags: Nation-state, attack, IE, flaw
A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye. Poison Ivy is a remote access trojan (RAT) that was released eight ...
Tags: Computer Products, software
Nearly 75 percent of government IT budgets are staying flat or increasing, according to a survey by analysts at Gartner. This comes in opposition to a continuing drive, especially in the UK, to lower the cost of government IT contracts by ...
Microsoft took a two-year-old contest and turned it on its head to come up with a new reward program that will pay security researchers up to $100,000 for demonstrating novel attack tactics against Windows 8.1. In a broad announcement ...
Tags: Microsoft, Windows 8.1, Bounty Program
Bit9?has teamed with FireEye and Palo Alto Networks, which each have?sandboxing?technologies, in order to share information related to zero-day attack code. FireEye and Palo Alto Networks, with its next-generation firewall, each have ...
Tags: Computer Products, software
Microsoft late Friday confirmed that a "zero-day," or unpatched, vulnerability exists in Internet Explorer 8 (IE8), the company's most popular browser. According to multiple security firms, the vulnerability has been used in active ...
Technology organisations are among the most frequently attacked by hackers, according to the latest ‘Advanced Cyber Attack Landscape’ report and interactive maps by FireEye. The report and maps provide detailed insight into ...
Tags: Tech Companies, Computer Products
Researchers following a cyber espionage campaign apparently bent on stealing drone-related technology secrets have found additional malware related to the targeted attacks. FireEye researchers have been tracking so-called "Operation ...
Tags: Malware, Cyber Attacks, Computer Products
Organizations face malware-related events that bypass traditional defense technologies on their networks every three minutes, according to a new report released Wednesday by security vendor FireEye. "This activity can include the receipt ...
Tags: Computer Products, software
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the ...
Tags: Computer Products, software