Tag: Group

  • The Register: Don’t click on that Facebook ad for a text-to-AI-video tool

    Source URL: https://www.theregister.com/2025/05/27/fake_social_media_ads_ai_tool/ Source: The Register Title: Don’t click on that Facebook ad for a text-to-AI-video tool Feedly Summary: Millions may fall for it – and end up with malware instead A group of miscreants tracked as UNC6032 is exploiting interest in AI video generators by planting malicious ads on social media platforms to steal…

  • The Register: New Russian cyber-spy crew Laundry Bear joins the email-stealing pack

    Source URL: https://www.theregister.com/2025/05/27/new_russian_cyberspy_crew_laundry_bear/ Source: The Register Title: New Russian cyber-spy crew Laundry Bear joins the email-stealing pack Feedly Summary: Dutch intel services, Microsoft go big-game hunting A previously unknown Kremlin-linked group has conducted cyber-espionage operations against Dutch police, NATO member states, Western tech companies, and other organizations of interest to the Russian government since at…

  • ISC2 Think Tank: Using Zero Trust as a Cloud Security Strategy: Your Questions Answered

    Source URL: https://www.isc2.org/professional-development/webinars/thinktank?commid=642815 Source: ISC2 Think Tank Title: Using Zero Trust as a Cloud Security Strategy: Your Questions Answered Feedly Summary: Jason Garbis, Founder & CEO of Numberline Security and Co-Chair of the Zero Trust Working Group at the Cloud Security alliance, recently presented during the ISC2 Spotlight on Cloud Security, offering an in-depth exploration…

  • Microsoft Security Blog: New Russia-affiliated actor Void Blizzard targets critical sectors for espionage

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/05/27/new-russia-affiliated-actor-void-blizzard-targets-critical-sectors-for-espionage/ Source: Microsoft Security Blog Title: New Russia-affiliated actor Void Blizzard targets critical sectors for espionage Feedly Summary: Microsoft Threat Intelligence has discovered a cluster of worldwide cloud abuse activity conducted by a threat actor we track as Void Blizzard, who we assess with high confidence is Russia-affiliated and has been active since…

  • The Register: Chinese snoops tried to break into US city utilities, says Talos

    Source URL: https://www.theregister.com/2025/05/22/chinese_crew_us_city_utilities/ Source: The Register Title: Chinese snoops tried to break into US city utilities, says Talos Feedly Summary: Intrusions began weeks before Trimble patched the Cityworks hole A suspected Chinese crew has been exploiting a now-patched remote code execution (RCE) flaw in Trimble Cityworks to break into US local government networks and target…

  • Cisco Talos Blog: UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware

    Source URL: https://blog.talosintelligence.com/uat-6382-exploits-cityworks-vulnerability/ Source: Cisco Talos Blog Title: UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware Feedly Summary: Talos has observed exploitation of CVE-2025-0994 in the wild by UAT-6382, a Chinese-speaking threat actor, who then deployed malware payloads via TetraLoader. AI Summary and Description: Yes **Summary:** The text describes the exploitation of a significant remote-code-execution…