The ITU Arab Regional Cyber security Centre (ARCC)
The 7th Regional Cyber security Summit to be held from 21st to 22nd October 2018 under the theme “Cyber security Readiness in the Fourth Industrial Revoluation” that aims to address the best preventive strategies to counteract cyber threats.
The 6th Regional Cyber Drill ALERT (Applied Learning for Emergency Response Teams) sixth edition for Arab Region from 23rd to 25th October 2018. The drill seeks to enhance communication and capacity building and boost emergency readiness and response... Read More
Workshop for AU Member States on Cyber-Strategy, C
Addis Ababa, Ethiopia, 23 July 2018: The workshop on Cyber strategies, Cyber legislation and Setting up National CERTs started today 23rd July 2018. It brings together one hundred thirty (130) Experts and government officials from forty (40) African Countries including policy makers, Legislators and technical experts involved in Cyber security policy and strategies, Cyber legislation and building CERTs as well as representatives from Regionals Economic Communities (RECs) and international... Read More
Malicious Windows executable
Malicious Windows executable files hidden in Google Play Apps
Palo Alto Unit 42 researchers identified 145 Google Play apps infected with malicious Window's Executable Files.
Researchers noted the infected APK files do not pose any threat to Android devices as they can only run on Windows devices but said the files are a threat to the software supply chain and can ultimately be used to carry out widespread attacks similar to KeRanger, XcodeGhost and NotPetya, according to the blog post.
“Most of the infected apps were released to Google Play between October 2017 and November 2017, which means these apps have been in Google Play for more than half a year,” researchers said in the report. “Among these infected apps, several have more than 1,000 installations and 4-star ratings.”
RAT MnuBot leverages Microsoft SQL Server database
A newly discovered banking malware that's been actively targeting Brazilians behaves as a remote access trojan (RAT) and uses a Microsoft SQL Server database server as an unconventional command-and-control infrastructure.
Dubbed MnuBot, the Delphi-based malware produces web form overlays that either trick victims into entering key bank account information or stall them while cybercriminals hijack the user endpoint and perform illegal transactions. But its capabilities also include creating browser and desktop screenshots, keylogging, simulating user clicks and keystrokes, restarting machines, and uninstalling certain antivirus software, according to a May 29 blog post published by IBM's X-Force research unit.