Domain 3 – Security Architecture and Engineering.pdf
Domain 4 – Communications and network Security.pdf
Amnesty International said it discovered iPhones belonging to journalists and human rights lawyers had been infected with NSO Group’s Pegasus malware that can provide the attacker access to messages, emails and the phone’s microphone and camera.
The revelation suggests governments using NSO Group software have been able to successfully hack iPhones to spy on user data using methods unknown to Apple, and that even keeping an iPhone up-to-date cannot stop a dedicated attacker who’s using expensive and secretive spy software.
The new aLTEr attack can be used against nearly all LTE connected endpoints by intercepting traffic and redirecting it to malicious websites. This article summarizes how the attack works, and suggests ways to protect yourself from it – including a specific approach for Apple iOS devices.
Most organizations have a firewall that acts as a filter between their sensitive internal networks and the threatening global Internet. DNS tunneling has been around for a while. But it continues to cost companies and has seen hackers invest more time and effort developing tools. A recent study[1] found that DNS attacks in the UK alone have risen 105% in the past year. DNS tunneling is attractive–hackers can get any data in and out of your internal network while bypassing most firewalls. Whether it’s used to command and control (C&C) compromised systems, leak sensitive data outside, or to tunnel inside your closed network, DNS Tunneling poses a substantial risk to your organization. Here’s everything you need to know about the attack, the tools and how to stop it.
How Hackers Use DNS Tunneling to Own Your Network (cynet.com)