Tag: proactive

  • Microsoft Security Blog: Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/ Source: Microsoft Security Blog Title: Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage Feedly Summary: Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indian Army targets. The post Frequent freeloader part…

  • Microsoft Security Blog: ​​Follow-up on Ignite with Ask Microsoft Anything: Microsoft Security edition​​

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/12/02/follow-up-on-ignite-with-ask-microsoft-anything-microsoft-security-edition/ Source: Microsoft Security Blog Title: ​​Follow-up on Ignite with Ask Microsoft Anything: Microsoft Security edition​​ Feedly Summary: AI transformation starts with security. This was a major theme across the majority of the big news and reveals from Microsoft Security at Microsoft Ignite 2024. The post ​​Follow-up on Ignite with Ask Microsoft Anything:…

  • The Register: BT Group confirms attackers tried to break into Conferencing division

    Source URL: https://www.theregister.com/2024/12/05/bt_group_confirms_attempted_attack/ Source: The Register Title: BT Group confirms attackers tried to break into Conferencing division Feedly Summary: Sensitive data allegedly stolen from US subsidiary following Black Basta post BT Group confirmed it is dealing with an attempted attack on one of its legacy business units after the Black Basta ransomware group claimed they…

  • The Register: T-Mobile US CSO: Spies jumped from one telco to another in a way ‘I’ve not seen in my career’

    Source URL: https://www.theregister.com/2024/12/05/tmobile_cso_telecom_attack/ Source: The Register Title: T-Mobile US CSO: Spies jumped from one telco to another in a way ‘I’ve not seen in my career’ Feedly Summary: Security chief talks to El Reg as Feds urge everyone to use encrypted chat interview While Chinese-government-backed spies maintained access to US telecommunications providers’ networks for months…

  • Hacker News: Meta built large-scale cryptographic monitoring

    Source URL: https://engineering.fb.com/2024/11/12/security/how-meta-built-large-scale-cryptographic-monitoring/ Source: Hacker News Title: Meta built large-scale cryptographic monitoring Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses Meta’s implementation and benefits of a large-scale cryptographic monitoring system. This system enhances cryptographic reliability, identifies vulnerabilities, and contributes to proactive security measures in the context of cryptography. It serves as…

  • Slashdot: Vodka Maker Stoli Says August Ransomware Attack Contributed To Bankruptcy Filing

    Source URL: https://it.slashdot.org/story/24/12/04/0037242/vodka-maker-stoli-says-august-ransomware-attack-contributed-to-bankruptcy-filing Source: Slashdot Title: Vodka Maker Stoli Says August Ransomware Attack Contributed To Bankruptcy Filing Feedly Summary: AI Summary and Description: Yes Summary: The text highlights a significant ransomware attack on the Stoli Group that has critically impacted its financial stability and operational functions, pushing two of its subsidiaries into bankruptcy. This incident…

  • Alerts: CISA Adds One Known Exploited Vulnerability to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/12/04/cisa-adds-one-known-exploited-vulnerability-catalog Source: Alerts Title: CISA Adds One Known Exploited Vulnerability to Catalog Feedly Summary: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-51378 CyberPanel Incorrect Default Permissions Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks…

  • Alerts: CISA and Partners Release Joint Guidance on PRC-Affiliated Threat Actor Compromising Networks of Global Telecommunications Providers

    Source URL: https://www.cisa.gov/news-events/alerts/2024/12/03/cisa-and-partners-release-joint-guidance-prc-affiliated-threat-actor-compromising-networks-global Source: Alerts Title: CISA and Partners Release Joint Guidance on PRC-Affiliated Threat Actor Compromising Networks of Global Telecommunications Providers Feedly Summary: Today, CISA—in partnership with the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and international partners—released joint guidance, Enhanced Visibility and Hardening Guidance for Communications Infrastructure. Partners of this…