Watering Hole Attacks: Protecting Yourself from the Latest Craze in Cyber Attacks
Grazed from InfosecurityMag. Author: Harold Byun.
Cybercriminals are clever and know how to evolve – you’ve got to give them that. They’ve proven this once again with their latest cyber-attack strategy, the Watering Hole Attack, which leverages cloud services to help gain access to even the most secure and sophisticated enterprises and government agencies.
Attacks Used to be Humorously Simple
In earlier days, attackers operated more simply using emails entitled “ILOVEYOU” or poorly worded messages from Nigerian generals promising untold fortunes of wealth. Over the years, the attacks have evolved into complex spear phishing operations that target specific individuals who can help navigate an organization’s personnel hierarchy or identify digital certificate compromises that lead to command and control over the enterprise infrastructure. In either scenario, the success of the attacks has always been predicated on the fact that users are humans who will occasionally click on or open something that is suspect or compromised…


Linux developer Suse has released a new build of its cloud computing platform based on the OpenStack framework, adding new capabilities to make deployment easier. It is also the first OpenStack distribution to add full support for Microsoft’s Hyper-V, the firm claimed.