Tag: malicious activities

  • Slashdot: How the World’s Vital Undersea Data Cables Are Being Targeted

    Source URL: https://tech.slashdot.org/story/24/11/22/1650214/how-the-worlds-vital-undersea-data-cables-are-being-targeted?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: How the World’s Vital Undersea Data Cables Are Being Targeted Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the growing vulnerability of critical submarine infrastructure, particularly undersea fiber-optic cables, which are essential for global telecommunications. The recent incident of damage in the Baltic Sea, suspected to…

  • Hacker News: Security researchers identify new malware targeting Linux

    Source URL: https://www.welivesecurity.com/en/eset-research/unveiling-wolfsbane-gelsemiums-linux-counterpart-to-gelsevirine/ Source: Hacker News Title: Security researchers identify new malware targeting Linux Feedly Summary: Comments AI Summary and Description: Yes Summary: ESET researchers have revealed the emergence of Linux malware associated with the Gelsemium APT group, marking a significant shift in their tactics as they move beyond Windows-targeted malware. The malware includes notable…

  • The Register: O2’s AI granny knits tall tales to waste scam callers’ time

    Source URL: https://www.theregister.com/2024/11/15/o2_ai_granny/ Source: The Register Title: O2’s AI granny knits tall tales to waste scam callers’ time Feedly Summary: Brit mobile network’s Daisy has time, patience, and plenty of yarns to spin Watch out, scammers. O2 has created a new weapon in the fight against fraud: an AI granny that will keep you talking…

  • Cloud Blog: Emerging Threats: Cybersecurity Forecast 2025

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/cybersecurity-forecast-2025/ Source: Cloud Blog Title: Emerging Threats: Cybersecurity Forecast 2025 Feedly Summary: Every November, we start sharing forward-looking insights on threats and other cybersecurity topics to help organizations and defenders prepare for the year ahead. The Cybersecurity Forecast 2025 report, available today, plays a big role in helping us accomplish this mission. This…

  • The Register: China’s Volt Typhoon crew and its botnet surge back with a vengeance

    Source URL: https://www.theregister.com/2024/11/13/china_volt_typhoon_back/ Source: The Register Title: China’s Volt Typhoon crew and its botnet surge back with a vengeance Feedly Summary: Ohm, for flux sake China’s Volt Typhoon crew and its botnet are back, compromising old Cisco routers once again to break into critical infrastructure networks and kick off cyberattacks, according to security researchers.… AI…

  • Hacker News: The ‘Invisibility Cloak’ – Slash-Proc Magic

    Source URL: https://dfir.ch/posts/slash-proc/ Source: Hacker News Title: The ‘Invisibility Cloak’ – Slash-Proc Magic Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides a technical exploration of a process-hiding technique using bind mounts in Linux, highlighting its implications for forensic investigations. It elucidates how malicious actors can utilize this approach to manipulate process…

  • The Register: Winos4.0 abuses gaming apps to infect, control Windows machines

    Source URL: https://www.theregister.com/2024/11/08/winos40_targets_windows/ Source: The Register Title: Winos4.0 abuses gaming apps to infect, control Windows machines Feedly Summary: ‘Multiple’ malware samples likely targeting education orgs Criminals are using game-related applications to infect Windows systems with a malicious software framework called Winos4.0 that gives the attackers full control over compromised machines.… AI Summary and Description: Yes…

  • Microsoft Security Blog: How Microsoft Defender for Office 365 innovated to address QR code phishing attacks

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/11/04/how-microsoft-defender-for-office-365-innovated-to-address-qr-code-phishing-attacks/ Source: Microsoft Security Blog Title: How Microsoft Defender for Office 365 innovated to address QR code phishing attacks Feedly Summary: This blog examines the impact of QR code phishing campaigns and the innovative features of Microsoft Defender for Office 365 that help combat evolving cyberthreats. The post How Microsoft Defender for Office…

  • Microsoft Security Blog: Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/10/31/chinese-threat-actor-storm-0940-uses-credentials-from-password-spray-attacks-from-a-covert-network/ Source: Microsoft Security Blog Title: Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network Feedly Summary: Since August 2023, Microsoft has observed intrusion activity targeting and successfully stealing credentials from multiple Microsoft customers that is enabled by highly evasive password spray attacks. Microsoft has linked the source…

  • Alerts: Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/31/foreign-threat-actor-conducting-large-scale-spear-phishing-campaign-rdp-attachments Source: Alerts Title: Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments Feedly Summary: CISA has received multiple reports of a large-scale spear-phishing campaign targeting organizations in several sectors, including government and information technology (IT). The foreign threat actor, often posing as a trusted entity, is sending spear-phishing emails containing malicious…