Tag: stealthy
-
Cisco Talos Blog: Too salty to handle: Exposing cases of CSS abuse for hidden text salting
Source URL: https://blog.talosintelligence.com/too-salty-to-handle-exposing-cases-of-css-abuse-for-hidden-text-salting/ Source: Cisco Talos Blog Title: Too salty to handle: Exposing cases of CSS abuse for hidden text salting Feedly Summary: A simple yet effective tactic, known as hidden text salting, is increasingly used by cybercriminals over the past few months to evade even the most advanced email security solutions, including those powered…
-
The Register: Beijing went to ‘EggStreme’ lengths to attack Philippines military, researchers say
Source URL: https://www.theregister.com/2025/09/11/eggstreme_malware_china_philippines/ Source: The Register Title: Beijing went to ‘EggStreme’ lengths to attack Philippines military, researchers say Feedly Summary: Ovoid-themed in-memory malware offers a menu for mayhem ‘EggStreme’ framework looks like the sort of thing Beijing would find handy in its ongoing territorial beefs Infosec outfit Bitdefender says it’s spotted a strain of in-memory…
-
The Register: Salt Typhoon used dozens of domains, going back five years. Did you visit one?
Source URL: https://www.theregister.com/2025/09/08/salt_typhoon_domains/ Source: The Register Title: Salt Typhoon used dozens of domains, going back five years. Did you visit one? Feedly Summary: Plus ties to the Chinese spies who hacked Barracuda email gateways Security researchers have uncovered dozens of domains used by Chinese espionage crew Salt Typhoon to gain stealthy, long-term access to victim…
-
Cisco Talos Blog: Malvertising campaign leads to PS1Bot, a multi-stage malware framework
Source URL: https://blog.talosintelligence.com/ps1bot-malvertising-campaign/ Source: Cisco Talos Blog Title: Malvertising campaign leads to PS1Bot, a multi-stage malware framework Feedly Summary: Cisco Talos has observed an ongoing malware campaign that seeks to infect victims with a multi-stage malware framework, implemented in PowerShell and C#, which we are referring to as “PS1Bot.” AI Summary and Description: Yes **Summary:**…
-
Cisco Talos Blog: ReVault! When your SoC turns against you…
Source URL: https://blog.talosintelligence.com/revault-when-your-soc-turns-against-you/ Source: Cisco Talos Blog Title: ReVault! When your SoC turns against you… Feedly Summary: Talos reported 5 vulnerabilities to Broadcom and Dell affecting both the ControlVault3 Firmware and its associated Windows APIs that we are calling “ReVault”. AI Summary and Description: Yes **Summary:** The report details significant vulnerabilities discovered in Dell’s ControlVault3…
-
Cisco Talos Blog: The Booker Prize Longlist and Hacker Summer Camp
Source URL: https://blog.talosintelligence.com/the-booker-prize-longlist-and-hacker-summer-camp/ Source: Cisco Talos Blog Title: The Booker Prize Longlist and Hacker Summer Camp Feedly Summary: This week Bill connects the hype of literary awards to cybersecurity conference season. We highlight key insights from the Q2 2025 IR Trends report, including phishing trends, new ransomware strains, and top targeted sectors. Finally, check out…