Monday, August 14, 2017
  It was probably a ‘third party app’ that was used by hackers to compromise PTI's twitter account and it was simply posted to their feed.   2. The hackers did not have access to PTI Twitter login credentials and only used ‘OAuth’...
In 2016, we witnessed hackers using a ‘watering hole’ cyber-attack to compromise computers operated by serving Indian military personnel and bureaucrats, some of whom were mailed infected documents as email attachments. Others were lured by news posts, with topics...
  Malware analysis/ anti-virus firms Forcepoint and Trustwave recently investigated malicious documents sent as email attachments (malicious Microsoft Word document attachments; RTFs) tied to the Carbank criminal gang, infamous for stealing billions of dollars from banks by infecting anything from...

RECENT POSTS

error: © Delhi Defence Review. Reproducing this content in full without permission is prohibited