About onexte_new_user

This author has not yet filled in any details.
So far onexte_new_user has created 5 blog entries.

TeamSpy a 10 year long cyber-espionage operation has resurfaced

The malware, designed to provide its operators with full access to the compromised machines, was used in an information gathering operation that focused mainly on ordinary people, though some victims were found to be high profile industrial, research, or diplomatic targets. The malware was abusing the legitimate TeamViewer remote access tool for its nefarious operations, [...]

By |Ransomware, Uncategorized|Comments Off on TeamSpy a 10 year long cyber-espionage operation has resurfaced

2017: More Apple Security Flaws, Cyberattacks, Hacktivisim

More security vulnerabilities will appear in the software of Adobe and Apple than in Microsoft's, more attacks on the Internet's infrastructure will occur, and cybersecurity events will stoke international tensions. Users of Apple desktops and laptops for years have been relatively insulated from the kinds of malicious activity that has besieged those in the Windows [...]

By |General|Comments Off on 2017: More Apple Security Flaws, Cyberattacks, Hacktivisim

US Pushes Cybersecurity Acquisition Tools as Contracts Flow

Vendors of cybersecurity offerings are finding that the U.S. government is serious about improving the protection of federal IT assets. A steady stream of data protection contracts has been flowing to providers, including some notable high-value transactions during the last half of 2016. One example is a Department of Homeland Security contract, with a potential [...]

By |Healthcare IT|Comments Off on US Pushes Cybersecurity Acquisition Tools as Contracts Flow

Watson Joins Cybersecurity Warriors’ Ranks

IBM announced Watson for Cyber Security, a powerful new ally for organizations that want to protect their data from Net marauders. The new offering bolsters the ability of information security pros to analyze the flood of information from the roughly 200,000 events that pour into their Security Operations Centers, or SOCs, every day. About 20 [...]

By |Ransomware|Comments Off on Watson Joins Cybersecurity Warriors’ Ranks

Doxware – The Next Generation in Ransomware Epidemics

In the latest spin on extortionware, is a malware product called doxware. Doxware has also been around for a while, however it’s the new approach in “spreading the infection” which is causing some concern; with opinions between those who think that new doxware attacks could lead to broader infections and those that do not. Doxware attacks [...]

By |Cloud|Comments Off on Doxware – The Next Generation in Ransomware Epidemics
Go to Top