Dynamic Antivirus Testing (also called “Real-World Protection Test”) is conducted monthly by AV-Comparatives, an independent laboratory, throughout the year. Full reports (covering a period of 4 months) are published twice a year – in June and December, and include antivirus detection rate results and false positive rates for these periods.
“Dynamic testing is the most comprehensive comparison test available, conducted under conditions that are close to real-world use”, — researchers of the laboratory say.
AV-Comparatives uses a large [...]
According to the authorities, they “used the SolarWinds Orion platform and other IT infrastructures as part of a large-scale cyber-espionage campaign.”
“Compromise of the SolarWinds’ supply chain by Russian Foreign Intelligence Service has enabled them to spy on and potentially disrupt more than 16,000 computer systems [...]
In 2020, experts discovered 650 new hack groups, and also removed about 500 groups from their threat tracker due to duplication and overlap with previously known clusters.
Among FireEye’s 1,900 known hacker groups, there are both “government” hackers (APT) and financially motivated groups (FIN), as well as unclassified groups (UNC, when it is not enough information to place them in one of the first two categories.
Analysts [...]
Fortinet — is an American company that specializes in the development and promotion of software, solutions and services in the field of information security.
In the Joint Cybersecurity Advisory (CSA) published, the agencies warn admins and users that the state-sponsored hacking groups are “likely” exploiting Fortinet FortiOS vulnerabilities CVE-2018-13379, CVE-2020-12812, and CVE-2019-5591.
“APT groups can use these vulnerabilities and other [...]
Mailfence offers a free email service that complies with Belgian data privacy laws. In particular, the postal service supports OpenPGP encryption and digital signatures.
Thunderbird users can create new email addresses directly from the client immediately after installing the program or when adding email accounts. Although you can register for an account on the official website of the mail provider, creating an account in Thunderbird has advantages. The postal service is immediately configured correctly, and the project team receives a small financial reward from [...]
Researcher John Kindervag, in his 2010 article, recommended that administrators of sensitive computer networks not trust anyone, regardless of the employee’s position.
“Once an attacker gets past the shell, he has access to all the resources in our network. We’ve built strong perimeters, but well-organized cybercriminals have recruited insiders and developed new attack methods that easily pierce our current security protections. To [...]
Back in mid-January 2021, representatives of Mimecast warned that an unknown hacker had one of its digital certificates. The attacker then abused it to gain access to some Microsoft 365 customer accounts.
The compromised certificate was used by several of the company’s products (Mimecast Sync and Recover, Continuity Monitor, and IEP) to connect to Microsoft’s infrastructure.
At the same time, it was reported that only 10% of customers used the above products [...]
According to the indictment of the Justice Department, McAfee did not pay taxes on funds that he earned between 2014 and 2018. The government also said that McAfee has long avoided meeting with tax inspectors, and tried to hide his assets, including real estate and a yacht (usually by transferring ownership to other people).
Even then, it was known that the American authorities were going to bring separate charges against McAfee related to his activity on Twitter. The fact is that, according to the authorities, he [...]
Microsoft discovered a hacker group known as Hafnium that carried out attacks using zero-day vulnerabilities in Microsoft Exchange servers.
To carry out the attack, the cybercriminals needed access to the local Microsoft Exchange server through port 443. If access was obtained, the attackers exploited the following vulnerabilities to gain remote access:
CVE-2021-26855 is a Server Side Request Forgery (SSRF) vulnerability in Exchange that allows an attacker to [...]Last year, it became known that SolarWinds, which develops software for enterprises to help manage their networks, systems and infrastructure, has been compromised. This attack on the supply chain has been attributed to a supposedly Russian-speaking hack group that cybersecurity experts track under the names StellarParticle (CrowdStrike), UNC2452 (FireEye) and Dark Halo (Volexity).
After infiltrating the SolarWinds network, the attackers provided Orion’s centralized monitoring and control platform with a malicious [...]