Fines for poor data security double in UK

Experts have warned that a number of UK companies could find themselves on the end of ever-increasing data privacy fines if they do not adequately prepare themselves for the upcoming General Data Protection Regulation (GDPR). A new report from PwC found that 23 enforcement notices were issued by the UK Information Commissioner’s Office (ICO) in … More Fines for poor data security double in UK

Industroyer: Biggest threat to industrial control systems since Stuxnet

The 2016 attack on Ukraine’s power grid that deprived part of its capital, Kiev, of power for an hour was caused by a cyberattack. ESET researchers have since analyzed samples of malware, detected by ESET as Win32/Industroyer, capable of performing exactly that type of attack. Whether the same malware was really involved in what cybersecurity … More Industroyer: Biggest threat to industrial control systems since Stuxnet

New Pirates of the Caribbean film ‘stolen by cybercriminals’

Cybercriminals have reportedly stolen Walt Disney’s upcoming Pirates of the Caribbean film, and are threatening to release it online if their ransom demands are not met. CEO Bob Iger reportedly broke the news to ABC employees, adding that chunks of the new film, Pirates of the Caribbean: Dead Men Tell No Tales, will be put … More New Pirates of the Caribbean film ‘stolen by cybercriminals’

Malicious registry keys: Reflective injection

Over the years, we have witnessed how cybercriminals have developed and implemented sophisticated new techniques to outwit users. That being said, one thing has not changed and remains a constant challenge: ensuring perseverance and avoiding detection both by security solutions and the human eye. In recent months, we have started to receive various reports about suspicious and … More Malicious registry keys: Reflective injection

Sednit adds two zero-day exploits using ‘Trump’s attack on Syria’ as a decoy

Introduction The Sednit group, also known as APT28, Fancy Bear and Sofacy, is a group of attackers operating since at least 2004 and whose main objective is to steal confidential information from specific targets. In October 2016, ESET published an extensive analysis of Sednit’s arsenal and tactics in a whitepaper titled En Route with Sednit. Last … More Sednit adds two zero-day exploits using ‘Trump’s attack on Syria’ as a decoy