318 stories
·
0 followers

Cloud Threats on the Rise: Alert Trends Show Intensified Attacker Focus on IAM, Exfiltration

1 Share

Understanding trends amidst noise: tracking shifts in security alerts allows cloud defenders to parse threats from attackers targeting IAM, storage and more.

The post Cloud Threats on the Rise: Alert Trends Show Intensified Attacker Focus on IAM, Exfiltration appeared first on Unit 42.



Read the whole story
felixatter
5 days ago
reply
Share this story
Delete

Threat Assessment: GitHub Actions Supply Chain Attack: The Compromise of tj-actions/changed-files

1 Share

A compromise of the GitHub action tj-actions/changed-files highlights how attackers could exploit vulnerabilities in third-party actions to compromise supply chains.

The post Threat Assessment: GitHub Actions Supply Chain Attack: The Compromise of tj-actions/changed-files appeared first on Unit 42.



Read the whole story
felixatter
5 days ago
reply
Share this story
Delete

Beneath the Surface: Detecting and Blocking Hidden Malicious Traffic Distribution Systems

1 Share

A topological analysis and case studies add nuance to a study of malicious traffic distribution systems. We compare their use by attackers to benign systems.

The post Beneath the Surface: Detecting and Blocking Hidden Malicious Traffic Distribution Systems appeared first on Unit 42.



Read the whole story
felixatter
5 days ago
reply
Share this story
Delete

Chinese Volt Typhoon Hackers Infiltrated US Electric Utility for Nearly a Year

1 Share
Dragos reveals Volt Typhoon hackers infiltrated a US electric utility for 300 days, collecting sensitive data. Learn how this cyberattack threatens infrastructure.
Read the whole story
felixatter
6 days ago
reply
Share this story
Delete

New OBSCURE#BAT Malware Targets Users with Fake Captchas

1 Share
OBSCURE#BAT malware campaign exploits social engineering & fake software downloads to evade detection, steal data and persist on…
Read the whole story
felixatter
6 days ago
reply
Share this story
Delete

StilachiRAT Exploits Chrome for Crypto Wallets and Credentials

1 Share
StilachiRAT: Sophisticated malware targets crypto wallets & credentials. Undetected, it maps systems & steals data. Microsoft advises strong security measures.
Read the whole story
felixatter
6 days ago
reply
Share this story
Delete
Next Page of Stories