Thursday, March 4, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Report: Nation state hackers and cyber criminals are spoofing each other

October 6, 2019
in Internet Security
Tenable wants to see the end of the ‘nation-state attacked us’ excuse
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Nation-state hackers and cyber criminals are increasingly impersonating each other to try and hide their tracks as part of advanced attack techniques says Optiv Security in its 2019 Cyber Threat Intelligence Estimate report.

The top industries being targeted are retail, healthcare, government and financial institutions. Cryptojacking and  ransomware are new exploits that join the traditional list of computer threats from botnets, Denial-of-Service (DDoS), phishing, and malware.

You might also like

Google takes next steps towards ‘privacy-first’ web devoid of third-party cookies

Ursnif Trojan has targeted over 100 Italian banks

Microsoft account hijack vulnerability earns bug bounty hunter $50,000

Ransomware: 11 steps to help keep hackers at bay
Falling victim to ransomware could put your vital business or personal data at risk of being lost forever. These steps can help bolster your defences.

Optiv says that cyber criminals and nation-state hackers are learning from each other and becoming more successful. They also try to spoof each other by adopting similar techniques to try and confuse investigators.

Special feature


Cyberwar and the Future of Cybersecurity


Cyberwar and the Future of Cybersecurity

Today’s security threats have expanded in scope and seriousness. There can now be millions — or even billions — of dollars at risk when information security isn’t handled properly.

Read More

Earlier this week Check Point Software Technologies warned that US government agencies are vulnerable to a new collection of attack techniques that have been associated with a Chinese government backed hacking group. 

The Israel-based computer security company said it had monitored attacks on unnamed East Asian country in which hackers used spear-phishing that was highly targeted at specific government ministries. Over a seven-month period the hackers kept changing the method of their attacks to try and disguise their origin. 

Check Point researchers said the hackers had put a lot of effort into creating documents with useful information in formats that are associated with government documents. Users became infected when they viewed the documents. 

US government agencies are especially vulnerable to this novel attack warns Check Point. 

Crowdstrike issued a report this week that named Chinese nation-state hackers as the most active of any country, and they have attacked the largest number of industries: chemical, gaming, healthcare, hospitality, manufacturing, technology and telecom.

Foremski’s Take

The tools and techniques developed by nation-state backed hacking groups are helping cyber criminals loot hundreds of millions in cash and IP. As governments seek backdoors to security systems and their cyber-security teams develop advanced hacking tools it is the cyber criminals that benefit the most by exploiting weakened security systems and using the same tools. 

An example is the US National Security Agency’s EternalBlue hacking tool which is in the hands of cyber criminals and is being used in ransomware attacks on US cities and government agencies. 

The nation-state efforts to develop sophisticated attack software that then leaks into the wild is exacerbating an already dire cyber security threat landscape. The nation-state groups don’t appear to be developing any defensive technologies which means an ever growing arsenal of advanced attack technologies that cyber criminals can use,  adapt and improve.

When governments justify their rights to access secure systems in the name of protecting national interests they create the means to endanger the very things the they seek to protect. 

Credit: Zdnet

Previous Post

Gardner Minshew and the Jaguars Will Take Bite Out of the Panthers

Next Post

What Is Machine Learning? | Unite.AI

Related Posts

Google takes next steps towards ‘privacy-first’ web devoid of third-party cookies
Internet Security

Google takes next steps towards ‘privacy-first’ web devoid of third-party cookies

March 4, 2021
Ursnif Trojan has targeted over 100 Italian banks
Internet Security

Ursnif Trojan has targeted over 100 Italian banks

March 4, 2021
Microsoft account hijack vulnerability earns bug bounty hunter $50,000
Internet Security

Microsoft account hijack vulnerability earns bug bounty hunter $50,000

March 3, 2021
Malaysia Airlines suffers data security ‘incident’ spanning nine years
Internet Security

Malaysia Airlines suffers data security ‘incident’ spanning nine years

March 3, 2021
Remote work: 5 things every business needs to know
Internet Security

Remote work: 5 things every business needs to know

March 3, 2021
Next Post
What Is Machine Learning? | Unite.AI

What Is Machine Learning? | Unite.AI

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

A $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account
Internet Privacy

A $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account

March 4, 2021
Deno 1.8 preps for GPU-accelerated machine learning
Machine Learning

Deno 1.8 preps for GPU-accelerated machine learning

March 4, 2021
3 Types of Image Segmentation. If you are getting started with Machine… | by Doga Ozgon | Feb, 2021
Neural Networks

3 Types of Image Segmentation. If you are getting started with Machine… | by Doga Ozgon | Feb, 2021

March 4, 2021
How to Get More Marketing-Qualified Leads
Marketing Technology

How to Get More Marketing-Qualified Leads

March 4, 2021
Six courses to build your technology skills in 2021 – IBM Developer
Technology Companies

Why developers should centralize their security – IBM Developer

March 4, 2021
Google takes next steps towards ‘privacy-first’ web devoid of third-party cookies
Internet Security

Google takes next steps towards ‘privacy-first’ web devoid of third-party cookies

March 4, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • A $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account March 4, 2021
  • Deno 1.8 preps for GPU-accelerated machine learning March 4, 2021
  • 3 Types of Image Segmentation. If you are getting started with Machine… | by Doga Ozgon | Feb, 2021 March 4, 2021
  • How to Get More Marketing-Qualified Leads March 4, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates