Tag: threat actors
-
Cisco Talos Blog: Too salty to handle: Exposing cases of CSS abuse for hidden text salting
Source URL: https://blog.talosintelligence.com/too-salty-to-handle-exposing-cases-of-css-abuse-for-hidden-text-salting/ Source: Cisco Talos Blog Title: Too salty to handle: Exposing cases of CSS abuse for hidden text salting Feedly Summary: A simple yet effective tactic, known as hidden text salting, is increasingly used by cybercriminals over the past few months to evade even the most advanced email security solutions, including those powered…
-
Microsoft Security Blog: Inside Microsoft Threat Intelligence: Calm in the chaos
Source URL: https://www.microsoft.com/en-us/security/security-insider/threat-landscape/inside-microsoft-threat-intelligence-calm-in-chaos#overview-video Source: Microsoft Security Blog Title: Inside Microsoft Threat Intelligence: Calm in the chaos Feedly Summary: Incident response is never orderly. Threat actors don’t wait. Environments are compromised. Data is missing. Confidence is shaken. But for Microsoft’s Incident Response (IR) team, that chaos is exactly where the work begins. The post Inside Microsoft…
-
The Register: Clop crew hits Oracle E-Business Suite users with fresh zero-day
Source URL: https://www.theregister.com/2025/10/06/clop_oracle_ebs_zeroday/ Source: The Register Title: Clop crew hits Oracle E-Business Suite users with fresh zero-day Feedly Summary: Big Red rushes out patch for 9.8-rated flaw after crooks exploit it for data theft and extortion Oracle rushed out an emergency fix over the weekend for a zero-day vulnerability in its E-Business Suite (EBS) that…
-
The Register: Beijing-backed burglars master .NET to target government web servers
Source URL: https://www.theregister.com/2025/10/01/phantom_taurus_apt/ Source: The Register Title: Beijing-backed burglars master .NET to target government web servers Feedly Summary: ‘Phantom Taurus’ created custom malware to hunt secrets across Asia, Africa, and the Middle East Threat-hunters at Palo Alto Networks’ Unit 42 have decided a gang they spotted two years ago is backed by China, after seeing…
-
Cloud Blog: Cloud CISO Perspectives: Boards should be ‘bilingual’ in AI, security to gain advantage
Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-boards-should-be-bilingual-AI-security-gain-advantage/ Source: Cloud Blog Title: Cloud CISO Perspectives: Boards should be ‘bilingual’ in AI, security to gain advantage Feedly Summary: Welcome to the second Cloud CISO Perspectives for September 2025. Today, Google Cloud COO Francis deSouza offers his insights on how boards of directors and CISOs can thrive with a good working relationship,…
-
Unit 42: Threat Insights: Active Exploitation of Cisco ASA Zero Days
Source URL: https://unit42.paloaltonetworks.com/zero-day-vulnerabilities-affect-cisco-software/ Source: Unit 42 Title: Threat Insights: Active Exploitation of Cisco ASA Zero Days Feedly Summary: CVE-2025-20333, CVE-2025-20362 and CVE-2025-20363 affect multiple Cisco products, and are being exploited by a threat actor linked to the ArcaneDoor campaign. The post Threat Insights: Active Exploitation of Cisco ASA Zero Days appeared first on Unit 42.…