Remove 2011 Remove Architecture Remove Internet
article thumbnail

XDSpy APT remained undetected since at least 2011

Security Affairs

Researchers from ESET uncovered the activity of a new APT group, tracked as XDSpy, that has been active since at least 2011. XDSpy is the name used by ESET researchers to track a nation-state actor that has been active since at least 2011. The post XDSpy APT remained undetected since at least 2011 appeared first on Security Affairs.

Malware 143
article thumbnail

It’s Too Late for Threat Intelligence Vendors to Ignore IPv6

Webroot

Drafted by the Internet Engineering Task Force (ITEF) in 1998, it became an Internet Standard in 2017. IP addresses, those numbers assigned to every internet-connected device, or node, were designed to contain 32 bits. What continued IPv6 adoption means for internet security. IPv6 has been a long time coming.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It's End of Life for ASafaWeb

Troy Hunt

A lot has changed in the Microsoft technology world in the last 7 years since I launched ASafaWeb in September 2011. Internet Explorer is no longer the dominant browser ( Chrome was in 3rd place back then ). From development and architecture to security. Windows Server has gone from 2008 R2 to 2012 to 2012 R2 to 2016 to 2019.

article thumbnail

Chinese APT Tropic Trooper target air-gapped military Networks in Asia

Security Affairs

The Tropic Trooper APT that has been active at least since 2011, it was first spotted in 2015 by security experts at Trend Micro when it targeted government ministries and heavy industries in Taiwan and the military in the Philippines. “tracert -h 8 8.8.8.8”

article thumbnail

Top 9 Network Access Control (NAC) Solutions

eSecurity Planet

Adding to the complexity are bring your own device (BYOD) policies, the prevalence of smartphones and tablets, and the rise of the Internet of Things (IoT). Impluse SafeConnect offers automatic device discovery and can support anywhere from 250 to 25,000 endpoints and up with its scalable appliance architecture. Top NAC solutions.

Education 127
article thumbnail

China-linked APT40 used ScanBox Framework in a long-running espionage campaign

Security Affairs

Justice Department (DoJ) indicted four members of the China-linked cyber espionage group APT40 (aka TEMP.Periscope , TEMP.Jumper , and Leviathan ) for hacking tens of government organizations, private businesses and universities around the world between 2011 and 2018.

article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

SHA-1 was officially deprecated by NIST in 2011 and its usage for digital signatures was prohibited in 2013. Prepare a quantum-safe architecture now. Can the cybersecurity industry learn anything from the problems encountered with the move from the deprecated SHA-1 to the stronger and safer SHA-2 hashing algorithm?