Tag: indicators of compromise
-
Microsoft Security Blog: Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
Source URL: https://www.microsoft.com/en-us/security/blog/2025/10/06/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-file-transfer-vulnerability/ Source: Microsoft Security Blog Title: Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability Feedly Summary: Storm-1175, a financially motivated actor known for deploying Medusa ransomware and exploiting public-facing applications for initial access, was observed exploiting the deserialization vulnerability in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035. We are publishing this…
-
Cisco Talos Blog: Family group chats: Your (very last) line of cyber defense
Source URL: https://blog.talosintelligence.com/family-group-chats-your-very-last-line-of-cyber-defense/ Source: Cisco Talos Blog Title: Family group chats: Your (very last) line of cyber defense Feedly Summary: Amy gives an homage to parents in family group chats everywhere who want their children to stay safe in this wild world. AI Summary and Description: Yes Summary: This text provides insights into current cybersecurity…
-
Cisco Talos Blog: UAT-8099: Chinese-speaking cybercrime group targets high-value IIS for SEO fraud
Source URL: https://blog.talosintelligence.com/uat-8099-chinese-speaking-cybercrime-group-seo-fraud/ Source: Cisco Talos Blog Title: UAT-8099: Chinese-speaking cybercrime group targets high-value IIS for SEO fraud Feedly Summary: Cisco Talos is disclosing details on UAT-8099, a Chinese-speaking cybercrime group mainly involved in SEO fraud and theft of high-value credentials, configuration files, and certificate data. AI Summary and Description: Yes **Summary:** The provided text…