Whitepaper

Operation In(ter)ception: Targeted attacks against European aerospace and military companies

ESET researchers have discovered an operation, with a possible link to the infamous Lazarus group, that used unconventional spearphishing and custom, multistage malware against aerospace and military companies. ESET researchers have discovered highly targeted cyberattacks that are notable for using LinkedIn-based spearphishing, employing effective tricks to stay under the radar and apparently having financial gain, […]

Operation In(ter)ception: Targeted attacks against European aerospace and military companies Read More »

Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia

Overview Chafer APT is a threat group with an apparent Iranian link. It is known to be active since 2014, focusing on cyber espionage campaigns. Bitdefender has spotted the group targeting critical infrastructure from the Middle East, presumably for intelligence gathering. Bitdefender researchers have found attacks conducted by this actor in the Middle East region,

Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia Read More »

The State of Ransomware 2020

Executive summary The survey provides fresh new insight into the experiences of organizations hit by ransomware, including: Almost three quarters of ransomware attacks result in the data being encrypted. 51% of organizations were hit by ransomware in the last year. The criminals succeeded in encrypting the data in 73% of these attacks. 26% of ransomware

The State of Ransomware 2020 Read More »

The Impact of COVID-19 on the Implementation of Digital Twins in the Global Building Industry: Perspectives from Expert Practitioners

The Digital Twin Phenomenon, A Surging Global Trend Recent market data depicting the impressive growth and maturation of the global Digital Twin industry over the last two years tells the whole story. In 2019, researchers at Markets & Markets reported that the Digital Twin industry generated USD $3.8 billion in revenue around the world, and

The Impact of COVID-19 on the Implementation of Digital Twins in the Global Building Industry: Perspectives from Expert Practitioners Read More »

Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases

Draft NIST Cybersecurity White Paper, Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases In today’s cloud data centers and edge computing, there are three main forces that impact security: (1) the introduction of billions of connected devices and increased adoption of the cloud have

Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases Read More »

Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF)

A software development life cycle (SDLC) is a formal or informal methodology for designing, creating, and maintaining software (which includes code built into hardware). There are many models for SDLCs, including waterfall, spiral, agile, and development and operations (DevOps). Few SDLC models explicitly address software security in detail, so secure software development practices usually need

Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF) Read More »

New Payment Products and Services – Potential anti-money laundering and counter-terrorist financing risks

New payment products and services (NPPSs) utilise innovations to initiate payments through, or to extend the reach of, traditional markets. They provide an alternative for clients to the products and services that are commonly offered by traditional regulated financial institutions, such as banks. Their development allows for increased access to financial services for a wider

New Payment Products and Services – Potential anti-money laundering and counter-terrorist financing risks Read More »