HackerOne
Cyber Espionage Campaign Possibly “MuddyWater” Targets Middle East and Central Asia https://gbhackers.com/muddywater-cyber-espionage-campaign/
#MuddyWater confirmed Iranian by FireEye - Temp.Zagros
https://www.fireeye.com/blog/threat-research/2018/03/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.html
https://www.fireeye.com/blog/threat-research/2018/03/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.html
Mandiant
Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign | Mandiant
[papers] Rootkit analysis - Use case on HideDRV
Rootkit analysis - Use case on HideDRV
http://www.exploit-db.com/docs/english/44287-rootkit-analysis---use-case-on-hidedrv.pdf?rss
Rootkit analysis - Use case on HideDRV
http://www.exploit-db.com/docs/english/44287-rootkit-analysis---use-case-on-hidedrv.pdf?rss
[remote] MikroTik RouterOS < 6.41.3/6.42rc27 - SMB Buffer Overflow
MikroTik RouterOS < 6.41.3/6.42rc27 - SMB Buffer Overflow
https://www.exploit-db.com/exploits/44290/?rss
MikroTik RouterOS < 6.41.3/6.42rc27 - SMB Buffer Overflow
https://www.exploit-db.com/exploits/44290/?rss
Russian APT Compromised Cisco Router in Energy Sector Attacks
https://www.darkreading.com/endpoint/privacy/russian-apt-compromised-cisco-router-in-energy-sector-attacks/d/d-id/1331306?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
DragonFly hacking team that targeted US critical infrastructure compromised a network router as part of its attack campaign against UK energy firms last year.
https://www.darkreading.com/endpoint/privacy/russian-apt-compromised-cisco-router-in-energy-sector-attacks/d/d-id/1331306?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
DragonFly hacking team that targeted US critical infrastructure compromised a network router as part of its attack campaign against UK energy firms last year.
Dark Reading
Russian APT Compromised Cisco Router in Energy Sector Attacks
DragonFly hacking team that targeted US critical infrastructure compromised a network router as part of its attack campaign against UK energy firms last year.
New Method Proposed for Secure Government Access to Encrypted Data
https://www.darkreading.com/attacks-breaches/new-method-proposed-for-secure-government-access-to-encrypted-data/d/d-id/1331309?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
'Crumple Zones' in crypto mechanisms can make it possible - but astronomically expensive - to access encrypted data, say researchers from Boston University and Portland State University.
https://www.darkreading.com/attacks-breaches/new-method-proposed-for-secure-government-access-to-encrypted-data/d/d-id/1331309?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
'Crumple Zones' in crypto mechanisms can make it possible - but astronomically expensive - to access encrypted data, say researchers from Boston University and Portland State University.
Dark Reading
New Method Proposed for Secure Government Access to Encrypted Data
'Crumple Zones' in crypto mechanisms can make it possible - but astronomically expensive - to access encrypted data, say researchers from Boston University and Portland State University.
Indian Army: Chinese Hackers Spying through WahtsApp - The Indian Army has released a video accusing Chinese hacker… https://t.co/hzHv0GDwbS
Twitter
E Hacking News
Indian Army: Chinese Hackers Spying through WahtsApp - The Indian Army has released a video accusing Chinese hackers of targeting Indians through an online https://t.co/O5YNfy2BBu
AMD Processor Flaws Real, But Limited
https://www.darkreading.com/cloud/amd-processor-flaws-real-but-limited/d/d-id/1331312?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
A vulnerability report threatened falling skies over AMD processor vulnerabilities that are real but limited in impact.
https://www.darkreading.com/cloud/amd-processor-flaws-real-but-limited/d/d-id/1331312?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
A vulnerability report threatened falling skies over AMD processor vulnerabilities that are real but limited in impact.
Dark Reading
AMD Processor Flaws Real, But Limited
A vulnerability report threatened falling skies over AMD processor vulnerabilities that are real but limited in impact.