What the arrest of Telegram’s CEO means, with Eva Galperin (Lock and Code S05E19)
This week on the Lock and Code podcast, we speak with Eva Galperin about the arrest of Telegram’s CEO and how it impacts security and privacy.
Read moreThis week on the Lock and Code podcast, we speak with Eva Galperin about the arrest of Telegram’s CEO and how it impacts security and privacy.
Read moreCredit to Author: Microsoft Threat Intelligence and Microsoft Security Response Center (MSRC)| Date: Fri, 30 Aug 2024 16:00:00 +0000
Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain remote code execution (RCE) in the Chromium renderer process. Our assessment of ongoing analysis and observed infrastructure attributes this activity to Citrine Sleet, a North Korean threat actor that commonly targets the cryptocurrency sector for financial gain.
The post North Korean threat actor Citrine Sleet exploiting Chromium zero-day appeared first on Microsoft Security Blog.
Read moreCredit to Author: Microsoft Incident Response| Date: Wed, 28 Aug 2024 19:00:00 +0000
In this blog post, read how Microsoft Incident Response leverages three types of threat intelligence to enhance incident response scenarios.
The post The art and science behind Microsoft threat hunting: Part 3 appeared first on Microsoft Security Blog.
Read moreCriminals are impersonating MyLowesLife, Lowes’ HR portal for current and former employees.
Read moreCredit to Author: Microsoft Threat Intelligence| Date: Wed, 28 Aug 2024 15:00:00 +0000
Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which we named Tickler. Tickler has been used in attacks against targets in the satellite, communications equipment, oil and gas, as well as federal and state government sectors in the United States and the United Arab […]
The post Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations appeared first on Microsoft Security Blog.
Read moreIntermountain Planned Parenthood of Montana suffered a cyberattack which has been claimed by a ransomware group
Read more” Hello pervert” sextortion mails keep adding new features to their email to increase credibility and urge victims to pay
Read moreTransport for London (TfL) is apparently fighting a cybersecurity incident but is rather sparing in providing details
Read more