Tag: custom malware
-
Cisco Talos Blog: UAT-7237 targets Taiwanese web hosting infrastructure
Source URL: https://blog.talosintelligence.com/uat-7237-targets-web-hosting-infra/ Source: Cisco Talos Blog Title: UAT-7237 targets Taiwanese web hosting infrastructure Feedly Summary: Cisco Talos discovered UAT-7237, a Chinese-speaking advanced persistent threat (APT) group active since at least 2022, which has significant overlaps with UAT-5918. AI Summary and Description: Yes Summary: The text discusses the activities of UAT-7237, a Chinese-speaking advanced persistent…
-
The Register: Ransomware crews don’t care about your endpoint security – they’ve already killed it
Source URL: https://www.theregister.com/2025/08/14/edr_killers_ransomware/ Source: The Register Title: Ransomware crews don’t care about your endpoint security – they’ve already killed it Feedly Summary: Some custom malware, some legit software tools At least a dozen ransomware gangs have incorporated kernel-level EDR killers into their malware arsenal, allowing them to bypass almost every major endpoint security tool on…
-
Cloud Blog: Mandiant M-Trends 2025: 3 key insights for public sector agencies
Source URL: https://cloud.google.com/blog/topics/public-sector/mandiant-m-trends-2025-3-key-insights-for-public-sector-agencies/ Source: Cloud Blog Title: Mandiant M-Trends 2025: 3 key insights for public sector agencies Feedly Summary: The cyber defense and threat landscape demands continuous adaptation, as threat actors continue to refine their tactics to breach defenses. While some adversaries are using increasingly sophisticated approaches with custom malware, zero-day exploits, and advanced evasion…
-
The Register: One of Salt Typhoon’s favorite flaws still wide open on 91% of at-risk Exchange Servers
Source URL: https://www.theregister.com/2025/01/23/proxylogon_flaw_salt_typhoons_open/ Source: The Register Title: One of Salt Typhoon’s favorite flaws still wide open on 91% of at-risk Exchange Servers Feedly Summary: But we mean, you’ve had nearly four years to patch One of the critical security flaws exploited by China’s Salt Typhoon to breach US telecom and government networks has had a…
-
The Register: Iran-linked crew used custom ‘cyberweapon’ in US critical infrastructure attacks
Source URL: https://www.theregister.com/2024/12/13/iran_cyberweapon_us_attacks/ Source: The Register Title: Iran-linked crew used custom ‘cyberweapon’ in US critical infrastructure attacks Feedly Summary: IOCONTROL targets IoT and OT devices from a ton of makers, apparently An Iranian government-linked cybercriminal crew used custom malware called IOCONTROL to attack and remotely control US and Israel-based water and fuel management systems, according…