Tag: advanced persistent threat

  • Hacker News: Undocumented backdoor found in Bluetooth chip used by a billion devices

    Source URL: https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/ Source: Hacker News Title: Undocumented backdoor found in Bluetooth chip used by a billion devices Feedly Summary: Comments AI Summary and Description: Yes Summary: The discovery of an undocumented backdoor in the widely used ESP32 microchip presents significant security risks, especially in IoT devices. This backdoor allows for device spoofing, unauthorized access,…

  • The Register: Feds name and charge alleged Silk Typhoon spies behind years of China-on-US attacks

    Source URL: https://www.theregister.com/2025/03/06/fbi_china_pays_75k_per/ Source: The Register Title: Feds name and charge alleged Silk Typhoon spies behind years of China-on-US attacks Feedly Summary: Xi’s freelance infosec warriors apparently paid up to $75K to crack a single American inbox US government agencies announced Wednesday criminal charges against alleged members of China’s Silk Typhoon gang, plus internet domain…

  • Slashdot: Microsoft Warns of Chinese Hackers Spying on Cloud Technology

    Source URL: https://slashdot.org/story/25/03/05/1743246/microsoft-warns-of-chinese-hackers-spying-on-cloud-technology?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Microsoft Warns of Chinese Hackers Spying on Cloud Technology Feedly Summary: AI Summary and Description: Yes Summary: Microsoft’s report on the Silk Typhoon hacking group emphasizes how advanced persistent threats (APTs) are increasingly targeting cloud applications and remote management tools to conduct supply-chain attacks. The activities of this group…

  • Cisco Talos Blog: Weathering the storm: In the midst of a Typhoon

    Source URL: https://blog.talosintelligence.com/salt-typhoon-analysis/ Source: Cisco Talos Blog Title: Weathering the storm: In the midst of a Typhoon Feedly Summary: Cisco Talos has been closely monitoring reports of widespread intrusion activity against several major U.S. telecommunications companies, by a threat actor dubbed Salt Typhoon. This blog highlights our observations on this campaign and identifies recommendations for…

  • Cloud Blog: Cloud CISO Perspectives: New AI, cybercrime reports underscore need for security best practices

    Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-new-ai-cybercrime-reports-underscore-need-security-best-practices/ Source: Cloud Blog Title: Cloud CISO Perspectives: New AI, cybercrime reports underscore need for security best practices Feedly Summary: Welcome to the first Cloud CISO Perspectives for February 2025. Stephanie Kiel, our head of cloud security policy, government affairs and public policy, discusses two parallel and important security conversations she had at…

  • Microsoft Security Blog: The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/02/12/the-badpilot-campaign-seashell-blizzard-subgroup-conducts-multiyear-global-access-operation/ Source: Microsoft Security Blog Title: The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation Feedly Summary: Microsoft is publishing for the first time our research into a subgroup within the Russian state actor Seashell Blizzard and its multiyear initial access operation, tracked by Microsoft Threat Intelligence as the “BadPilot campaign”.…

  • CSA: How Can Businesses Overcome Limited Cloud Visibility?

    Source URL: https://cloudsecurityalliance.org/blog/2025/02/03/top-threat-9-lost-in-the-cloud-enhancing-visibility-and-observability Source: CSA Title: How Can Businesses Overcome Limited Cloud Visibility? Feedly Summary: AI Summary and Description: Yes Summary: This text addresses critical challenges in cloud security, focusing specifically on the threat of limited cloud visibility and observability. It highlights the risks associated with shadow IT and sanctioned app misuse while outlining the…

  • Hacker News: ScatterBrain: Unmasking the Shadow of PoisonPlug’s Obfuscator

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/scatterbrain-unmasking-poisonplug-obfuscator Source: Hacker News Title: ScatterBrain: Unmasking the Shadow of PoisonPlug’s Obfuscator Feedly Summary: Comments AI Summary and Description: Yes **Summary**: The text provides a comprehensive analysis of the ScatterBrain obfuscating compiler, a sophisticated tool used in cyber espionage by China-nexus actors, particularly with the POISONPLUG.SHADOW malware. It highlights the advanced obfuscation techniques…