Tag: EN

Phantom Taurus: 新たな中華系Nexus APTとNET-STARマルウェア スイートの発見

「Phantom Taurus」は、これまで活動が報告されていなかった中国の脅威グループです。本稿では、このグループが使用する特徴的なツールセットが、いかにしてその存在の発見につながったのかを解説します。 The post Phantom Taurus: 新たな中華系Nexus APTとNET-STARマルウェア スイートの発見 appeared first on Unit 42. This article has been indexed from Unit 42 Read the original article: Phantom Taurus: 新たな中華系Nexus APTとNET-STARマルウェア スイートの発見

Microsoft Flags AI Phishing Attack Hiding in SVG Files

Microsoft Threat Intelligence detected a new AI-powered phishing campaign using LLMs to hide malicious code inside SVG files disguised as business dashboards. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the…

£5.5B Bitcoin fraudster pleads guilty after years on the run

Zhimin Qian recruited takeaway worker to launder funds through property overseas London’s Metropolitan Police has secured a “landmark conviction” following a record-busting Bitcoin seizure and seven-year investigation.… This article has been indexed from The Register – Security Read the original…

Cyberattack on Beer Giant Asahi Disrupts Production

The incident has resulted in a system failure that impacted orders and shipments in Japan, and call center operations. The post Cyberattack on Beer Giant Asahi Disrupts Production  appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Asahi Suspends Operations in Japan After Cyber-Attack

Japanese brewery giant Asahi revealed that a cyber-attack had caused a “system failure”, with order and shipment operations suspended in Japan This article has been indexed from www.infosecurity-magazine.com Read the original article: Asahi Suspends Operations in Japan After Cyber-Attack

Threat Actors Exploiting MS-SQL Servers to Deploy XiebroC2 Framework

A surge in attacks targeting improperly managed MS-SQL servers, culminating in the deployment of the open-source XiebroC2 command-and-control (C2) framework. Similar in functionality to legitimate tools like Cobalt Strike, XiebroC2 offers capabilities for information gathering, remote control, and defense evasion,…