Remove Cybercrime Remove System Administration Remove Telecommunications
article thumbnail

Caketap, a new Unix rootkit used to siphon ATM banking data

Security Affairs

Mandiant researchers discovered a new Unix rootkit named Caketap, which is used to steal ATM banking data, while investigating the activity of the LightBasin cybercrime group (aka UNC1945 ). CrowdStrike researchers reported that at least 13 telecommunication companies were compromised by the group since 2019.

Banking 144
article thumbnail

Advanced threat predictions for 2023

SecureList

From a different angle, reporting from The Intercept revealed mobile surveillance capabilities available to Iran for the purposes of domestic investigations that leverage direct access to (and cooperation of) local telecommunication companies. 2023 will very likely be a year of 0-days for all major email software. The next WannaCry.

Firmware 127
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Get Started in Cybersecurity: Steps, Skills & Resources

eSecurity Planet

A few highlights include analysts, engineering roles in networking, IT system administration, pentesting, and leadership roles. Sysadmin roles can involve: Setting up networks and IT systems: These leaders manage setup processes for hardware, software, network connections, and user permissions.

article thumbnail

Canadian Police Raid ‘Orcus RAT’ Author

Krebs on Security

31, 2019, Rezvesz said his company recently was the subject of an international search warrant executed jointly by the Royal Canadian Mounted Police (RCMP) and the Canadian Radio-television and Telecommunications Commission (CRTC). “In In an “official press release” posted to pastebin.com on Mar.