Tag: attribution

  • Schneier on Security: Perfectl Malware

    Source URL: https://www.schneier.com/blog/archives/2024/10/perfectl-malware.html Source: Schneier on Security Title: Perfectl Malware Feedly Summary: Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the Internet potential targets, researchers from Aqua…

  • Hacker News: European govt air-gapped systems breached using custom malware

    Source URL: https://www.welivesecurity.com/en/eset-research/mind-air-gap-goldenjackal-gooses-government-guardrails/ Source: Hacker News Title: European govt air-gapped systems breached using custom malware Feedly Summary: Comments AI Summary and Description: Yes Summary: This text presents an extensive analysis of the GoldenJackal APT group’s cyberespionage activities, notably their attacks on air-gapped systems within governmental organizations in Europe. It introduces previously undocumented malware tools employed…

  • Cloud Blog: Introduction to Threat Intelligence and Attribution course, now available on-demand

    Source URL: https://cloud.google.com/blog/products/identity-security/introduction-to-intelligence-and-attribution-course-now-on-demand/ Source: Cloud Blog Title: Introduction to Threat Intelligence and Attribution course, now available on-demand Feedly Summary: Ask 10 cybersecurity experts to define “attribution” and they would likely provide as many different answers. The term has become an industry buzzword for the process by which evidence of a breach is converted into a…