Tag: EN

COM Objects Hijacking

The COM Hijacking technique is often utilized by threat actors and various malware families to achieve both persistence and privilege escalation in target systems. It relies on manipulating Component Object Model (COM), exploiting the core architecture of Windows that enables…

Evasive Panda Targets Tibet With Trojanized Software

ESET researchers said the attackers strategically leveraged the Monlam Festival, targeting individuals associated with Tibetan Buddhism This article has been indexed from www.infosecurity-magazine.com Read the original article: Evasive Panda Targets Tibet With Trojanized Software

Google opens first ever Cyberdefense hub in Japan

Amid escalating Chinese cyber attacks targeting government infrastructure globally, Google has inaugurated its inaugural Asia-Pacific Cyberdefense center in Tokyo, Japan. This hub is poised to serve as a pivotal nexus for information exchange and research collaboration among businesses, governmental entities,…

United Health Allegedly Paid $22M Ransomware

Change Healthcare breach There is evidence that the ransomware group behind the Change Healthcare breach, which has caused chaos for hospitals and pharmacies attempting to handle prescriptions, may have received $22 million from UnitedHealth Group. Researchers studying security issues discovered…

PSD2, the Future of Open Banking, and API Security

Open Banking Has Accelerated the Use of APIs – and the Need for API Security The landscape of open banking is rapidly evolving, fueled in no small part by the EU’s Revised Payment Services Directive (PSD2) aimed at enhancing authentication…

The 3 most common post-compromise tactics on network infrastructure

We discuss three of the most common post-compromise tactics that Talos has observed in our threat telemetry and Cisco Talos Incident Response (Talos IR) engagements. These include modifying the device’s firmware, uploading customized/weaponized firmware, and bypassing security measures. This article…

Apple Releases Security Updates for iOS and iPadOS

Apple released security updates to address vulnerabilities in iOS and iPadOS. A cyber threat actor could exploit one of these vulnerabilities to obtain sensitive information. CISA encourages users and administrators to review the following security releases and apply the necessary…