Infosec News
- unit42.paloaltonetworks.com Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack
North Korean IT worker cluster CL-STA-0237 instigated phishing attacks via video apps in Laos, exploiting U.S. IT firms and major tech identities. North Korean IT worker cluster CL-STA-0237 instigated phishing attacks via video apps in Laos, exploiting U.S. IT firms and major tech identities.
- therecord.media Ohio man behind Helix cryptocurrency mixer gets 3-year sentence
Larry Harmon ran the mixer from 2014 to 2017, facilitating more than $300 million worth of cryptocurrency transactions.
-
Сrimeware and financial cyberthreats in 2025
securelist.com Crimeware and financial predictions for 2025Kaspersky's GReAT looks back on the 2024 predictions about financial and crimeware threats, and explores potential cybercrime trends for 2025.
-
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency
securelist.com SteelFox Trojan imitates popular products to drop stealer and miner malwareKaspersky experts have discovered a new SteelFox Trojan that mimics popular software like Foxit PDF Editor and JetBrains to spread a stealer-and-miner bundle.
- www.trustwave.com Hooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emails
Previously, Trustwave SpiderLabs covered a massive fake order spam scheme that impersonated a tech support company and propagated via Google Groups.
-
Hot Topic - 56,904,909 breached accounts
haveibeenpwned.com Have I Been Pwned: Pwned websitesHave I Been Pwned allows you to search across multiple data breaches to see if your email address or phone number has been compromised.
- www.trendmicro.com SOC Around the Clock: World Tour Survey Findings
Trend surveyed 750 cybersecurity professionals in 49 countries to learn more about the state of cybersecurity.
-
Microsoft Data Security Index annual report highlights evolving generative AI security needs
www.microsoft.com Microsoft Data Security Index annual report highlights evolving generative AI security needs | Microsoft Security Blog84% of surveyed organizations want to feel more confident about managing and discovering data input into AI apps and tools.
-
(In)tuned to Takeovers: Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environments
cloud.google.com Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environments | Google Cloud BlogWe demonstrate a novel way how adversaries can move laterally and elevate privileges within Microsoft Entra ID.
-
Ymir: new stealthy ransomware in the wild
securelist.com Kaspersky discovers new Ymir ransomware used together with RustyStealerKaspersky GERT experts have discovered in Colombia new Ymir ransomware, which uses RustyStealer for initial access and the qTox client for communication with its victims.
-
Dennis Kirk - 1,356,026 breached accounts
haveibeenpwned.com Have I Been Pwned: Pwned websitesHave I Been Pwned allows you to search across multiple data breaches to see if your email address or phone number has been compromised.
-
Elevate Your Threat Hunting with Elastic
www.elastic.co Elevate Your Threat Hunting with Elastic — Elastic Security LabsElastic is releasing a threat hunting package designed to aid defenders with proactive detection queries to identify actor-agnostic intrusions.
- therecord.media 1,400 Pegasus spyware infections detailed in WhatsApp’s lawsuit filings
The filings, part of a lawsuit WhatsApp filed against the NSO Group in 2019, shine a light on how Israel-based NSO Group — a notoriously secretive company — operates the powerful Pegasus spyware on behalf of government customers.
-
QSC: A multi-plugin framework used by CloudComputating group in cyberespionage campaigns
securelist.com QSC: new modular framework in CloudComputating campaignsKaspersky shares details on QSC modular cyberespionage framework, which appears to be linked to CloudComputating group campaigns.
- unit42.paloaltonetworks.com Silent Skimmer Gets Loud (Again)
We discuss a new campaign from the cybercrime group behind Silent Skimmer, showcasing the exploit of Telerik UI vulnerabilities and malware like RingQ loader. We discuss a new campaign from the cybercrime group behind Silent Skimmer, showcasing the exploit of Telerik UI vulnerabilities and malware l...
- therecord.media Indian police arrest suspect in $230 million WazirX crypto exchange hack
Delhi police arrested a man suspected of helping to initiate an intrusion into WazirX, one of the country's largest cryptocurrency exchanges.
-
Earth 2 - 420,961 breached accounts
haveibeenpwned.com Have I Been Pwned: Pwned websitesHave I Been Pwned allows you to search across multiple data breaches to see if your email address or phone number has been compromised.
-
Pirates in the Data Sea: AI Enhancing Your Adversarial Emulation
cloud.google.com AI Enhancing Your Adversarial Emulation | Google Cloud BlogLearn how Mandiant Red Team is using Gemini and LLMs for adversarial emulation and defense.
-
DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration
www.microsoft.com DoD Zero Trust Strategy proves security benchmark years ahead of schedule with Microsoft collaboration | Microsoft Security BlogThe Navy implementation scored a 100 percent success rate, meeting DoD requirements on all 91 Target-Level activities tested. Learn more.
-
Tricks and Treats: GHOSTPULSE’s new pixel-level deception
www.elastic.co Tricks and Treats: GHOSTPULSE’s new pixel-level deception — Elastic Security LabsThe updated GHOSTPULSE malware has evolved to embed malicious data directly within pixel structures, making it harder to detect and requiring new analysis and detection techniques.
- therecord.media US agencies confirm Beijing-linked telecom breach involving call records of politicians, wiretaps
In a statement late on Wednesday, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) said an investigation that began in late October has revealed a “broad and significant cyber espionage campaign.”
- www.trustwave.com 2024 Trustwave Risk Radar Report: Cyber Threats to the Retail Sector
The 2024 Trustwave Risk Radar Report: Retail Sector reveals that cybercriminals have sharpened their tactics, utilizing ransomware and phishing attacks.