Tag: threat actors
-
The Register: As nation-state hacking becomes ‘more in your face,’ are supply chains secure?
Source URL: https://www.theregister.com/2025/03/24/nation_state_supply_chain_attack/ Source: The Register Title: As nation-state hacking becomes ‘more in your face,’ are supply chains secure? Feedly Summary: Ex-US Air Force officer says companies shouldn’t wait for govt mandates Interview Former US Air Force cyber officer Sarah Cleveland worries about the threat of a major supply-chain attack from China or another adversarial…
-
The Register: Mobsters now overlap with cybercrime gangs and use AI for evil, Europol warns
Source URL: https://www.theregister.com/2025/03/24/modern_mafiosos_wield_ai/ Source: The Register Title: Mobsters now overlap with cybercrime gangs and use AI for evil, Europol warns Feedly Summary: PLUS: Russian bug-buyers seeks Telegram flaws; Another WordPress security mess; NIST backlog grows; and more! Infosec In Brief Organized crime networks are now reliant on digital tech for most of their activities according…
-
Cisco Talos Blog: Tomorrow, and tomorrow, and tomorrow: Information security and the Baseball Hall of Fame
Source URL: https://blog.talosintelligence.com/tomorrow-and-tomorrow-and-tomorrow-information-security-and-the-baseball-hall-of-fame/ Source: Cisco Talos Blog Title: Tomorrow, and tomorrow, and tomorrow: Information security and the Baseball Hall of Fame Feedly Summary: In this week’s Threat Source newsletter, William pitches a fun comparison between baseball legend Ichiro Suzuki and the unsung heroes of information security, highlights newly released UAT-5918 research, and shares an exciting…
-
Cisco Talos Blog: UAT-5918 targets critical infrastructure entities in Taiwan
Source URL: https://blog.talosintelligence.com/uat-5918-targets-critical-infra-in-taiwan/ Source: Cisco Talos Blog Title: UAT-5918 targets critical infrastructure entities in Taiwan Feedly Summary: UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination of web shells and open-sourced tooling to conduct post-compromise activities to establish persistence in victim environments for information theft and…