article thumbnail

Nation-State Attacker of Telecommunications Networks

Schneier on Security

Someone has been hacking telecommunications networks around the world: LightBasin (aka UNC1945) is an activity cluster that has been consistently targeting the telecommunications sector at a global scale since at least 2016, leveraging custom tools and an in-depth knowledge of telecommunications network architectures.

article thumbnail

Chinese state-sponsored hackers breached TeamViewer in 2016

Security Affairs

The German newspaper Der Spiegel revealed that the software company behind TeamViewer was compromised in 2016 by Chinese hackers. China-linked hackers breached German software company behind TeamViewer in 2016, this news was reported by the German newspaper Der Spiegel. “In autumn 2016, TeamViewer was target of a cyber-attack.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian-speaking cybercrime evolution: What changed from 2016 to 2021

SecureList

Back in 2016, the primary focus of our expert was on major cybergangs that targeted financial institutions, banks in particular. Applications have become more complex, their architecture better. This browser attack chain, popular in 2016, is no longer possible. The year 2016 saw banks in Russia hacked one after another.

article thumbnail

HPE launches new data platform to increase security and visibility across enterprise IT

Tech Republic Security

At the HPE Protect 2016 conference, the company launched the HPE ArcSight Data Platform 2.0, with an open architecture and improved third-party integrations.

article thumbnail

Deloitte denied its systems were hacked by Brain Cipher ransomware group

Security Affairs

In addition to emails, hackers had potential access to IP addresses, architectural diagrams for businesses and health information. Deloitte discovered the hack in March 2017, and according to The Guardian, the attackers may have had access to the company systems since October or November 2016.

Hacking 121
article thumbnail

Evaluating the NSA's Telephony Metadata Program

Schneier on Security

The first concern was over high numbers: in both 2016 and 2017, the Foreign Intelligence Surveillance Court issued 40 orders for collection, but the NSA collected hundreds of millions of CDRs, and the agency provided little clarification for the high numbers. For a time, the new program seemed to be functioning well.

article thumbnail

NIST’s Post-Quantum Cryptography Standards

Schneier on Security

Cryptographers hate being rushed into things, which is why NIST began a competition to create a post-quantum cryptographic standard in 2016. It took a couple of decades to fully understand von Neumann computer architecture; expect the same learning curve with quantum computing. The second uncertainly is in the algorithms themselves.