Tag: sophistication
- 
		
		
		The Register: Uncle Sam floats tracking tech to keep AI chips out of ChinaSource URL: https://www.theregister.com/2025/08/05/us_ai_chip_tracking/ Source: The Register Title: Uncle Sam floats tracking tech to keep AI chips out of China Feedly Summary: Plan would embed location verification in advanced semiconductors to combat black market exports The Trump administration wants better ways to track the location of chips, as part of attempts to prevent advanced AI accelerator… 
- 
		
		
		The Register: Rampant emoji use suggests crypto-stealing NPM package was written by AISource URL: https://www.theregister.com/2025/08/01/emoji_use_ai_malware/ Source: The Register Title: Rampant emoji use suggests crypto-stealing NPM package was written by AI Feedly Summary: Kodane code was either machine-generated or done by a teenager An NPM package packed with cryptocurrency-stealing malware appears to have been largely AI-generated, as evidenced by its liberal use of emojis and other telltale signs.…… 
- 
		
		
		The Register: No login? No problem: Cisco ISE flaw gave root access before fix arrived, say researchersSource URL: https://www.theregister.com/2025/07/24/no_login_no_problem_cisco_flaw/ Source: The Register Title: No login? No problem: Cisco ISE flaw gave root access before fix arrived, say researchers Feedly Summary: Shadowserver claims miscreants were already poking at a critical hole in early July, long before Switchzilla patched it Threat actors have actively exploited a newly patched vulnerability in Cisco’s Identity Services… 
- 
		
		
		Unit 42: Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 CommunicationSource URL: https://unit42.paloaltonetworks.com/windows-backdoor-for-novel-c2-communication/ Source: Unit 42 Title: Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication Feedly Summary: CL-STA-1020 targets Southeast Asian governments using a novel Microsoft backdoor we call HazyBeacon. It misuses AWS Lambda URLs for C2. The post Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement… 
- 
		
		
		The Register: CVSS 10 RCE in Wing FTP exploited within 24 hours, security researchers warnSource URL: https://www.theregister.com/2025/07/11/1010_wing_ftp_bug_exploited/ Source: The Register Title: CVSS 10 RCE in Wing FTP exploited within 24 hours, security researchers warn Feedly Summary: Intruders looked up how to use curl mid-attack – rookie errors kept damage minimal Huntress security researchers observed exploitation of the CVSS 10.0 remote code execution (RCE) flaw in Wing FTP Server on…