security-affairs-malware-newsletter-round-59

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

you might also like leave a comment newsletter Subscribe to my email list and stay up-to-date! recent articles We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit … Ler mais

Security Affairs newsletter Round 538 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs newsletter Round 538 by Pierluigi Paganini – INTERNATIONAL EDITION A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. International Press – Newsletter Cybercrime … Ler mais

DaVita confirms ransomware attack compromised data of 2.7M people

DaVita confirms ransomware attack compromised data of 2.7M people

Kidney dialysis firm DaVita confirms ransomware attack compromised data of 2.7M people Kidney dialysis firm DaVita confirms ransomware breach exposed personal and health data of nearly 2.7M individuals. Kidney dialysis firm DaVita disclosed a data breach after a ransomware attack, the incident exposed personal and health information of nearly 2.7 million individuals. The number of … Ler mais

10 melhores ferramentas de monitoramento de rede em 2025

10 Best Network Monitoring Tools in 2025

O cenário digital em 2025 é mais complexo do que nunca, com organizações dependendo de redes intrincadas híbridas, nuvens e locais para alimentar suas operações. As ferramentas de monitoramento de rede tornaram -se indispensáveis ​​para as equipes de TI manter a saúde, a segurança e o desempenho da rede. Essas soluções fornecem visibilidade em tempo … Ler mais

FTC warns tech giants not to bow to foreign pressure on encryption

Picus Blue Report 2025

The Federal Trade Commission (FTC) is warning major U.S. tech companies against yielding to foreign government demands that weaken data security, compromise encryption, or impose censorship on their platforms. FTC Chairman Andrew N. Ferguson signed the letter sent to large American companies like Akamai, Alphabet (Google), Amazon, Apple, Cloudflare, Discord, GoDaddy, Meta, Microsoft, Signal, Snap, … Ler mais

Microsoft working on fix for ongoing Outlook email issues

Picus Blue Report 2025

​Microsoft is working to resolve an Exchange Online issue causing email access problems for Outlook mobile users who use Hybrid Modern Authentication (HMA). HMAis aMicrosoft Exchange Server feature thatallows users to access on-premises mailboxes using authorization tokens from the cloud. Tracked under EX1137017 in the Microsoft 365 Admin Center, this known issue is caused by … Ler mais

China-linked Silk Typhoon APT targets North America

Taiwan Web Infrastructure targeted by APT UAT-7237 with custom toolset

China-linked Silk Typhoon APT targets North America China-linked Silk Typhoon APT group ramp up North America attacks, exploiting n-day and zero-day flaws for system access, CrowdStrike warns. China-linked Silk Typhoon APT group (aka Murky Panda) targets organizations in North America exploiting n-day and zero-day flaws for system access, CrowdStrike warns. This Chinese APT has one … Ler mais

Over 300 entities hit by a variant of Atomic macOS Stealer in recent campaign

Over 300 entities hit by a variant of Atomic macOS Stealer in recent campaign

Over 300 entities hit by a variant of Atomic macOS Stealer in recent campaign Over 300 entities hit by the Atomic macOS Stealer via malvertising campaign between June and August, CrowdStrike warns. From June and August, over 300 entities were hit by a variant of the Atomic macOS Stealer (AMOS) called SHAMOS, reports CrowdStrike. The … Ler mais

Os hackers têm como alvo telefones de indivíduos ligados militares no sul da Ásia usando novas ferramentas de espionagem

Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools

Os atores de ameaças cibernéticas lançaram operações sofisticadas de phishing destinadas a funcionários militares e governamentais no sul da Ásia, alavancando iscas relacionadas à defesa para distribuir arquivos e aplicações maliciosas. Detecções recentes incluem arquivos postais como “Coordenação da visita do chefe do exército à China.zip”, que contêm PDFs compactados projetados como chamarizes de phishing. … Ler mais

Murky Panda hackers exploit cloud trust to hack downstream customers

Picus Blue Report 2025

A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud environments to gain initial access to the networks and data of downstream customers. Murky Panda, also known as Silk Typhoon (Microsoft) and Hafnium, is known for targeting government, technology, academic, legal, and professional services organizations in North America. The … Ler mais