Tag: threat intel
-
Unit 42: Bookworm to Stately Taurus Using the Unit 42 Attribution Framework
Source URL: https://unit42.paloaltonetworks.com/bookworm-to-stately-taurus/ Source: Unit 42 Title: Bookworm to Stately Taurus Using the Unit 42 Attribution Framework Feedly Summary: We connect Bookworm malware to Chinese APT Stately Taurus using our attribution framework, enhancing our understanding of threat group tradecraft. The post Bookworm to Stately Taurus Using the Unit 42 Attribution Framework appeared first on Unit…
-
Microsoft Security Blog: Retail at risk: How one alert uncovered a persistent cyberthreat
Source URL: https://www.microsoft.com/en-us/security/blog/2025/09/24/retail-at-risk-how-one-alert-uncovered-a-persistent-cyberthreat/ Source: Microsoft Security Blog Title: Retail at risk: How one alert uncovered a persistent cyberthreat Feedly Summary: In the latest edition of our Cyberattack Series, we dive into real-world cases targeting retail organizations. With 60% of retail companies reporting operational disruptions from cyberattacks and 43% experiencing breaches in the past year, the stakes…
-
The Register: Google warns China-linked spies lurking in ‘numerous’ enterprises since March
Source URL: https://www.theregister.com/2025/09/24/google_china_spy_report/ Source: The Register Title: Google warns China-linked spies lurking in ‘numerous’ enterprises since March Feedly Summary: Mandiant CTO anticipates ‘hearing about this campaign for the next one to two years’ Unknown intruders – likely China-linked spies – have broken into “numerous" enterprise networks since March and deployed backdoors, providing access for their…
-
Microsoft Security Blog: AI vs. AI: Detecting an AI-obfuscated phishing campaign
Source URL: https://www.microsoft.com/en-us/security/blog/2025/09/24/ai-vs-ai-detecting-an-ai-obfuscated-phishing-campaign/ Source: Microsoft Security Blog Title: AI vs. AI: Detecting an AI-obfuscated phishing campaign Feedly Summary: Microsoft Threat Intelligence recently detected and blocked a credential phishing campaign that likely used AI-generated code to obfuscate its payload and evade traditional defenses, demonstrating a broader trend of attackers leveraging AI to increase the effectiveness of…
-
Cisco Talos Blog: What happens when you engage Cisco Talos Incident Response?
Source URL: https://blog.talosintelligence.com/what-happens-when-you-engage-talos-ir/ Source: Cisco Talos Blog Title: What happens when you engage Cisco Talos Incident Response? Feedly Summary: What happens when you bring in a team of cybersecurity responders? How do we turn chaos into control, and what is the long-term value that Talos IR provides to the organizations we work with? AI Summary…
-
Cisco Talos Blog: Put together an IR playbook — for your personal mental health and wellbeing
Source URL: https://blog.talosintelligence.com/put-together-an-ir-playbook/ Source: Cisco Talos Blog Title: Put together an IR playbook — for your personal mental health and wellbeing Feedly Summary: This edition pulls the curtain aside to show the realities of the VPN Filter campaign. Joe reflects on the struggle to prevent burnout in a world constantly on fire. AI Summary and…