Trend Micro Managed XDR Analysis of Infection From Fake Installers and Cracks

Credit to Author: Ryan Maglaque| Date: Fri, 10 Jan 2025 00:00:00 +0000

Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Read more

US Names One of the Hackers Allegedly Behind Massive Salt Typhoon Breaches

Credit to Author: Lily Hay Newman, Andy Greenberg| Date: Sat, 18 Jan 2025 11:30:00 +0000

Plus: New details emerge about China’s cyber espionage against the US, the FBI remotely uninstalls malware on 4,200 US devices, and victims of the PowerSchool edtech breach reveal what hackers stole.

Read more

The FCC’s Jessica Rosenworcel Isn’t Leaving Without a Fight

Credit to Author: Eric Geller| Date: Fri, 17 Jan 2025 18:48:19 +0000

As the US faces “the worst telecommunications hack in our nation’s history,” by China’s Salt Typhoon hackers, the outgoing FCC chair is determined to bolster network security if it’s the last thing she does.

Read more

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024

Credit to Author: Trend Micro Research| Date: Fri, 17 Jan 2025 00:00:00 +0000

Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras.

Read more

New Star Blizzard spear-phishing campaign targets WhatsApp accounts

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 16 Jan 2025 17:00:00 +0000

In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets spear-phishing messages, this time offering the supposed opportunity to join a WhatsApp group. This is the first time we have identified a shift in Star Blizzard’s longstanding tactics, techniques, and procedures (TTPs) to leverage a […]

The post New Star Blizzard spear-phishing campaign targets WhatsApp accounts appeared first on Microsoft Security Blog.

Read more