Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns

Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns

The UK, US and partners from across the globe have released a new report on the notorious Chinese APT group Salt Typhoon, claiming it has received help from several commercial tech companies to further its cyber-espionage goals. The report named Sichuan Juxinhe Network Technology, Beijing Huanyu Tianqiong Information Technology and Sichuan Zhixin Ruijie Network Technology … Ler mais

Nova pesquisa explora as táticas de aranha dispersas em cenários do mundo real

New Research Explores Emulating Scattered Spider Tactics in Real-World Scenarios

Especialistas descreveram métodos para imitar as estratégias do grupo de ameaças persistentes (APT), em uma análise recente aprofundada da empresa de segurança cibernética Lares, permitindo que as empresas fortalecem suas defesas por meio de cooperação adversária. Lares é especialista em emulação de ameaças, replicando táticas, técnicas e procedimentos do mundo real observados em atividades cibercriminais. … Ler mais

NSA, NCSC, and allies detailed TTPs associated with Chinese APT actors targeting critical infrastructure Orgs

Taiwan Web Infrastructure targeted by APT UAT-7237 with custom toolset

NSA, NCSC, and allies detailed TTPs associated with Chinese APT actors targeting critical infrastructure Orgs NSA and allies warn that Chinese APT actors, including Salt Typhoon, are targeting critical infrastructure worldwide. The U.S. National Security Agency (NSA), the UK’s National Cyber Security Centre (NCSC), and allies warn Chinese APT actors, linked to Salt Typhoon, are … Ler mais

Primeiro ransomware movido a IA “Prompt” usa o OpenAI GPT-20B para criptografia

First AI-Powered Ransomware “PromptLock” Uses OpenAI gpt-oss-20b for Encryption

PromptLock, uma nova tensão de ransomware descoberta pela equipe de pesquisa do ESET, marca a primeira instância conhecida de malware Aproveitando um modelo de idioma grande local para gerar sua carga útil maliciosa na máquina da vítima. Em vez de transportar a lógica de ataque pré-compilada, o Prompllock é fornecido com instruções codificadas que instruem … Ler mais

A Vulnerability in Git Could Allow for Remote Code Execution

MS-ISAC ADVISORY NUMBER: 2025-078 DATE(S) ISSUED: 08/26/2025 OVERVIEW: A vulnerability has been discovered in Git, which could allow for remote code execution. Git is a free and open-source distributed version control system (VCS). It is designed to track changes in source code during software development and is widely used for coordinating work among multiple developers … Ler mais

Badsuccessor After Patch: Usando DMSAS para roubo de credencial e movimento lateral no anúncio

BadSuccessor After Patch: Using dMSAs for Credential Theft and Lateral Movement in AD

Os pesquisadores da Akamai avaliaram o patch da Microsoft para a vulnerabilidade do BadSuccessor (CVE-2025-53779) para determinar seu escopo e limitações. Enquanto a atualização bloqueia efetivamente o caminho de escalação direta original, a mecânica principal do Badsuccessor permanece explorável sob condições específicas. Neste artigo, examinamos como os invasores podem continuar a alavancar as contas de … Ler mais

Crypto Companies Freeze $47m in Romance Baiting Funds

Crypto Companies Freeze $47m in Romance Baiting Funds

Several cryptocurrency companies have come together to prevent nearly $50m stolen via “romance baiting” (pig butchering) scammers reaching its intended destination. Blockchain analytics firm Chainalysis said it teamed up with crypto-exchanges Binance and OKX and stablecoin Tether to seize the funds. Chainalysis used its investigations tooling to identify several addresses associated with a romance baiting … Ler mais

A Microsoft revela as táticas de implantação de ransomware baseadas em nuvem Storm-0501

Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders

A inteligência da Microsoft Threat detalhou as táticas em evolução do ator de ameaças motivadas financeiramente, Storm-0501, que passou da transição das implantações tradicionais de ransomware no local para operações sofisticadas baseadas em nuvem. Ao contrário do ransomware convencional que depende do malware de criptografia de endpoint e das principais negociações de descriptografia, o Storm-0501 … Ler mais

Multiple Vulnerabilities in NetScaler ADC and NetScaler Gateway Could Allow for Remote Code Execution

MS-ISAC ADVISORY NUMBER: 2025-079 DATE(S) ISSUED: 08/27/2025 OVERVIEW: Multiple Vulnerabilities have been discovered in NetScaler ADC and NetScaler Gateway, which could allow for remote code execution. NetScaler ADC is a networking product that functions as an Application Delivery Controller (ADC), a tool that optimizes, secures, and ensures the reliable availability of applications for businesses. NetScaler … Ler mais

Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure

Ransomware Actor Deletes Data and Backups Post-Exfiltration on Azure

A threat actor has destroyed data and backups following exfiltration in a victim’s Microsoft Azure environment in a novel cloud-based ransomware attack. Microsoft Threat Intelligence recently provided details of the tactics deployed by the actor tracked as Storm-0501 in a blog published on August 27. Ultimately the threat actor prevented the victim from taking effective … Ler mais