Tag: indicators of compromise

  • Threat Research Archives – Unit 42: Fighting Ursa Luring Targets With Car for Sale

    Source URL: https://unit42.paloaltonetworks.com/fighting-ursa-car-for-sale-phishing-lure/ Source: Threat Research Archives – Unit 42 Title: Fighting Ursa Luring Targets With Car for Sale Feedly Summary: AI Summary and Description: Yes Summary: The text presents a detailed account of a sophisticated cybersecurity threat from the Russian group Fighting Ursa, which targeted diplomats using a phishing campaign disguised as a car…

  • Threat Research Archives – Unit 42: Accelerating Analysis When It Matters

    Source URL: https://unit42.paloaltonetworks.com/accelerating-malware-analysis/ Source: Threat Research Archives – Unit 42 Title: Accelerating Analysis When It Matters Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the efficient methods for malware analysis implemented by security professionals, particularly through the use of automated tools like Advanced WildFire’s Malware Configuration Extraction (MCE). This process significantly accelerates…

  • Microsoft Security Blog: Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/12/11/frequent-freeloader-part-ii-russian-actor-secret-blizzard-using-tools-of-other-groups-to-attack-ukraine/ Source: Microsoft Security Blog Title: Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine Feedly Summary: Since January 2024, Microsoft has observed Secret Blizzard using the tools or infrastructure of other threat groups to attack targets in Ukraine and download its custom backdoors Tavdig and…

  • Hacker News: Researchers discover first UEFI bootkit malware for Linux

    Source URL: https://www.bleepingcomputer.com/news/security/researchers-discover-bootkitty-first-uefi-bootkit-malware-for-linux/ Source: Hacker News Title: Researchers discover first UEFI bootkit malware for Linux Feedly Summary: Comments AI Summary and Description: Yes Summary: The discovery of ‘Bootkitty,’ the first UEFI bootkit targeting Linux systems, signifies a concerning evolution in malware threats that traditionally focused on Windows. The research uncovers how Bootkitty operates beneath the…

  • Hacker News: RomCom exploits Firefox and Windows zero days in the wild

    Source URL: https://www.welivesecurity.com/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild/ Source: Hacker News Title: RomCom exploits Firefox and Windows zero days in the wild Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides a detailed analysis of critical zero-day vulnerabilities discovered in Mozilla products, specifically Firefox, Thunderbird, and the Tor Browser, which are being exploited by a Russia-aligned cyber…

  • Cloud Blog: Cloud CISO Perspectives: Ending ransomware starts with more reporting

    Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-ransomware-cyber-insurance-reporting/ Source: Cloud Blog Title: Cloud CISO Perspectives: Ending ransomware starts with more reporting Feedly Summary: Welcome to the second Cloud CISO Perspectives for November 2024. Today, Monica Shokrai, head of business risk and insurance, Google Cloud, and Kimberly Goody, cybercrime analysis lead, Google Threat Intelligence Group, explore the role cyber-insurance can play…

  • Alerts: CISA and Partners Release Update to BianLian Ransomware Cybersecurity Advisory

    Source URL: https://www.cisa.gov/news-events/alerts/2024/11/20/cisa-and-partners-release-update-bianlian-ransomware-cybersecurity-advisory Source: Alerts Title: CISA and Partners Release Update to BianLian Ransomware Cybersecurity Advisory Feedly Summary: Today, CISA, the Federal Bureau of Investigation (FBI), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) released updates to #StopRansomware: BianLian Ransomware Group on observed tactics, techniques, and procedures (TTPs) and indicators of compromise…

  • Krebs on Security: Fintech Giant Finastra Investigating Data Breach

    Source URL: https://krebsonsecurity.com/2024/11/fintech-giant-finastra-investigating-data-breach/ Source: Krebs on Security Title: Fintech Giant Finastra Investigating Data Breach Feedly Summary: The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity has learned. Finastra, which provides software and services to 45 of the world’s top 50 banks, notified customers of…

  • The Register: China-linked group abuses Fortinet 0-day with post-exploit VPN-credential stealer

    Source URL: https://www.theregister.com/2024/11/19/china_brazenbamboo_fortinet_0day/ Source: The Register Title: China-linked group abuses Fortinet 0-day with post-exploit VPN-credential stealer Feedly Summary: No word on when or if the issue will be fixed Chinese government-linked snoops are exploiting a zero-day bug in Fortinet’s Windows VPN client to steal credentials and other information, according to memory forensics outfit Volexity.… AI…