X

Vous n'êtes pas connecté

Maroc Maroc - SECURITYAFFAIRS.CO - A La Une - 13/Feb 15:49

China-linked APTs’ tool employed in RA World Ransomware attack

A November 2024 RA World ransomware attack on an Asian software firm used a tool linked to China-linked threat actors. Broadcom researchers reported that threat actors behind an RA World ransomware attack against an Asian software and services firm employed a tool that was explosively associated in the past with China-linked APT groups. “Tools that […]

Articles similaires

Sorry! Image not available at this time

Chinese espionage tools deployed in RA World ransomware attack

bleepingcomputer.com - 13/Feb 14:31

A China-based threat actor, tracked as Emperor Dragonfly and commonly associated with cybercriminal endeavors, has been observed using in a...

Sorry! Image not available at this time

Russia-linked APTs target Signal messenger

securityaffairs.co - 19/Feb 21:43

Russia-linked threat actors exploit Signal ‘s “linked devices” feature to hijack accounts, per Google Threat Intelligence Group....

Sorry! Image not available at this time

China-linked APT group Winnti targets Japanese organizations since March 2024

securityaffairs.co - 18/Feb 16:10

China-linked threat actor Winnti targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024 as part of a campaign...

Sorry! Image not available at this time

Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines

itsecuritynews.info - 20/Feb 17:32

China-linked cyberespionage toolkits are popping up in ransomware attacks, forcing defenders to rethink how they combat state-backed hackers. The post...

Sorry! Image not available at this time

Salt Typhoon used custom malware JumbledPath to spy U.S. telecom providers

securityaffairs.co - 20/Feb 23:17

China-linked cyber espionage group Salt Typhoon uses custom malware JumbledPath to on spy U.S. telecom providers. Cisco Talos researchers reported...

Sorry! Image not available at this time

Crooks use Google Tag Manager skimmer to steal credit card data from a Magento-based e-stores

securityaffairs.co - 11/Feb 12:34

Sucuri researchers observed threat actors leveraging Google Tag Manager (GTM) to install e-skimmer software on Magento-based e-stores. Sucuri...

Spyware As A Service: Challenges In Applying Export Controls To Cloud-Based Cyber-Surveillance Software – Analysis

eurasiareview.com - 18/Feb 00:03

By Kolja Brockmann and Lauriane Héau For all their legitimate law-enforcement and intelligence-gathering uses, cyber-surveillance tools are...

Sorry! Image not available at this time

China-linked APT Salt Typhoon breached telecoms by exploiting Cisco router flaws

securityaffairs.co - 14/Feb 19:23

China-linked APT Salt Typhoon has breached more U.S. telecommunications providers via unpatched Cisco IOS XE network devices. China-linked APT group...

Sorry! Image not available at this time

Chinese Threat Group conducting espionage found moonlighting with ransomware

itsecuritynews.info - 14/Feb 16:18

For years, cyber threat actors have been launching attacks to spread malware and deploy tools for intelligence gathering, often driven by financial...

Sorry! Image not available at this time

whoAMI attack could allow remote code execution within AWS account

securityaffairs.co - 17/Feb 09:05

Researchers warn that the whoAMI attack lets attackers publish an AMI with a specific name to execute code in an AWS account. Cybersecurity...