Tag: backdoors

  • Cisco Talos Blog: The adventures of an extroverted cyber nerd and the people Talos helps to fight the good fight

    Source URL: https://blog.talosintelligence.com/the-adventures-of-an-extroverted-cyber-nerd-and-the-people-talos-helps-to-fight-the-good-fight/ Source: Cisco Talos Blog Title: The adventures of an extroverted cyber nerd and the people Talos helps to fight the good fight Feedly Summary: Ever wonder what an extroverted strategy security nerd does? Wonder no longer! This week, Joe pontificates on his journey at Talos, and then is inspired by the people…

  • Microsoft Security Blog: Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/ Source: Microsoft Security Blog Title: Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage Feedly Summary: Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indian Army targets. The post Frequent freeloader part…

  • The Register: Salt Typhoon’s surge extends far beyond US telcos

    Source URL: https://www.theregister.com/2024/11/27/salt_typhoons_us_telcos/ Source: The Register Title: Salt Typhoon’s surge extends far beyond US telcos Feedly Summary: Plus, a brand-new backdoor, GhostSpider, is linked to the cyber-spy crew’s operations The reach of the China-linked Salt Typhoon gang extends beyond American telecommunications giants, and its arsenal includes several backdoors, including a brand-new malware dubbed GhostSpider, according…

  • Slashdot: Thousands of Palo Alto Networks Firewalls Compromised This Week After Critical Security Hole

    Source URL: https://it.slashdot.org/story/24/11/25/063246/thousands-of-palo-alto-networks-firewalls-compromised-this-week-after-critical-security-hole?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Thousands of Palo Alto Networks Firewalls Compromised This Week After Critical Security Hole Feedly Summary: AI Summary and Description: Yes Summary: The text highlights a significant security breach involving Palo Alto Networks firewalls, where attackers exploited critical vulnerabilities to deploy malware and remotely control the devices. This incident serves…

  • The Register: 1000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole

    Source URL: https://www.theregister.com/2024/11/22/palo_alto_firewalls_under_exploit/ Source: The Register Title: 1000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole Feedly Summary: PAN-PAN! Intruders inject web shell backdoors, crypto-coin miners, more Thousands of Palo Alto Networks firewalls were compromised by attackers exploiting two recently patched security bugs. The intruders were able to deploy web-accessible backdoors to…

  • Hacker News: Security researchers identify new malware targeting Linux

    Source URL: https://www.welivesecurity.com/en/eset-research/unveiling-wolfsbane-gelsemiums-linux-counterpart-to-gelsevirine/ Source: Hacker News Title: Security researchers identify new malware targeting Linux Feedly Summary: Comments AI Summary and Description: Yes Summary: ESET researchers have revealed the emergence of Linux malware associated with the Gelsemium APT group, marking a significant shift in their tactics as they move beyond Windows-targeted malware. The malware includes notable…

  • Hacker News: Nothing-up-my-sleeve number

    Source URL: https://en.wikipedia.org/wiki/Nothing-up-my-sleeve_number Source: Hacker News Title: Nothing-up-my-sleeve number Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides an in-depth exploration of “nothing-up-my-sleeve” numbers in cryptography, examining their importance in ensuring the integrity and security of cryptographic algorithms. This analysis is particularly relevant for professionals in security and compliance, as it highlights…

  • Schneier on Security: Criminals Exploiting FBI Emergency Data Requests

    Source URL: https://www.schneier.com/blog/archives/2024/11/criminals-exploiting-fbi-emergency-data-requests.html Source: Schneier on Security Title: Criminals Exploiting FBI Emergency Data Requests Feedly Summary: I’ve been writing about the problem with lawful-access backdoors in encryption for decades now: that as soon as you create a mechanism for law enforcement to bypass encryption, the bad guys will use it too. Turns out the same…

  • Hacker News: RCE Vulnerability in QBittorrent

    Source URL: https://sharpsec.run/rce-vulnerability-in-qbittorrent/ Source: Hacker News Title: RCE Vulnerability in QBittorrent Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text details significant security vulnerabilities present in the qBittorrent application, particularly involving SSL certificate validation and potential for remote code execution (RCE) through intentionally manipulated update processes. This information is highly relevant for professionals…

  • Microsoft Security Blog: Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/10/31/chinese-threat-actor-storm-0940-uses-credentials-from-password-spray-attacks-from-a-covert-network/ Source: Microsoft Security Blog Title: Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network Feedly Summary: Since August 2023, Microsoft has observed intrusion activity targeting and successfully stealing credentials from multiple Microsoft customers that is enabled by highly evasive password spray attacks. Microsoft has linked the source…