Tag: phishing
-
Cisco Talos Blog: Abusing with style: Leveraging cascading style sheets for evasion and tracking
Source URL: https://blog.talosintelligence.com/css-abuse-for-evasion-and-tracking/ Source: Cisco Talos Blog Title: Abusing with style: Leveraging cascading style sheets for evasion and tracking Feedly Summary: Cascading Style Sheets (CSS) are ever present in modern day web browsing, however its far from their own use. This blog will detail the ways adversaries use CSS in email campaigns for evasion and…
-
The Register: Medusa ransomware affiliate tried triple extortion scam – up from the usual double demand
Source URL: https://www.theregister.com/2025/03/13/medusa_ransomware_infects_300_critical/ Source: The Register Title: Medusa ransomware affiliate tried triple extortion scam – up from the usual double demand Feedly Summary: Feds warn gang still rampant and now cracked 300+ victims around the world A crook who distributes the Medusa ransomware tried to make a victim cough up three payments instead of the…
-
NCSC Feed: Protect your management interfaces
Source URL: https://www.ncsc.gov.uk/blog-post/protect-your-management-interfaces Source: NCSC Feed Title: Protect your management interfaces Feedly Summary: Why it’s important to protect the interfaces used to manage your infrastructure, and some recommendations on how you might do this. AI Summary and Description: Yes Summary: The text addresses critical vulnerabilities associated with system management interfaces, highlighting the risks linked to…
-
The Register: This is the FBI, open up. China’s Volt Typhoon is on your network
Source URL: https://www.theregister.com/2025/03/12/volt_tyhoon_experience_interview_with_gm/ Source: The Register Title: This is the FBI, open up. China’s Volt Typhoon is on your network Feedly Summary: Power utility GM talks to El Reg about getting that call and what happened next Nick Lawler, general manager of the Littleton Electric Light and Water Departments (LELWD), was at home one Friday…
-
NCSC Feed: Systems administration architectures
Source URL: https://www.ncsc.gov.uk/guidance/systems-administration-architectures Source: NCSC Feed Title: Systems administration architectures Feedly Summary: There are a number of different architectural models that can be used to design the administration approach for IT systems. This section describes some common approaches and the risks associated with each. AI Summary and Description: Yes Summary: The text emphasizes the importance…
-
The Register: Microsoft admits GitHub used to store malware that infected almost a million devices
Source URL: https://www.theregister.com/2025/03/10/infosec_in_brief/ Source: The Register Title: Microsoft admits GitHub used to store malware that infected almost a million devices Feedly Summary: Also, phone cleaner apps are a data-sucking scam, Singapore considering the literal rod for scammers, and more Infosec in Brief Microsoft has spotted a malvertising campaign that downloaded nastyware hosted on GitHub and…