Symantec says the advanced persistent threat Lancefly used custom malware to attack Asian governments, telcos, and other organizations from mid-2022 to Q1 2023
A government-backed hacking group known as “Lancefly” has been seen using custom-made malware to attack governments, telecoms and other organizations across Asia.
Mandiant says the North Korea-linked hack of VoIP company 3CX's customers is the first confirmed incident of one software-supply-chain attack enabling another
perhaps the first confirmed case of one software supply chain attack causing another. https://www.wired.com/... Kim Zetter / @kimzetter : I've updated story about 3XC/X_Trader with new info: per @syma...
Symantec details China-linked backdoor Daxin, a Windows kernel driver that can hijack TCP connections to stealthily connect with command-and-control servers
Security researchers have discovered Daxin, a China-linked stealthy backdoor specifically designed for deployment in hardened corporate networks …
DDoS attacks disrupt several Ukrainian government sites; ESET researchers discover new data wiper malware installed on hundreds of Ukrainian machines
here's what you need to know NetBlocks : Internet disruptions registered as Russia moves in on Ukraine Andy Greenberg / Wired : Russia's Sandworm Hackers Have Built a Botnet of Firewalls Yadullah Abid...
Symantec says a hacking group believed to be sponsored by the Chinese gov't has exploited the Zerologon vulnerability in companies worldwide since Oct. 2019
A massive campaign is underway around the globe, with automotive, pharmaceutical and engineering entities top targets.
Microsoft, Symantec, ESET, and other tech companies orchestrated an attempt to take down the TrickBot malware botnet, which had infected 1M+ computers
FS-ISAC, ESET, Lumen's Black Lotus Labs, NTT, Symantec, and the Microsoft Defender team participated in the takedown.
A coalition of tech companies, including Microsoft and Symantec, orchestrated a takedown of the TrickBot malware botnet, which had infected 1M+ computers
FS-ISAC, ESET, Lumen's Black Lotus Labs, NTT, Symantec, and the Microsoft Defender team participated in the takedown.
Check Point: Chinese hacker group APT3 reverse engineered EternalRomance NSA exploit by setting up machines as traps to retrieve info after they were attacked
I write about security and surveillance. — When it was alleged earlier this year that secretive Chinese hacking group APT3 … Tweets: @_cpresearch_ , @docligot , @hatr , and @virusbtn Tweets: @_cpres...
Symantec says it wasn't impacted by Fxmsp hack, denies being contacted by researchers, who refute Symantec's claim; Trend Micro calls hack a “low risk” incident
Symantec, Trend Micro, and McAfee—b/c their names had been offered up on reddit, twitter & in one article this morning as maybe victims. Trend Micro confirmed it's working w/ law enforcement. Symantec...
Kaspersky: ASUS pushed a malicious backdoor to ~500K Windows machines for at least five months last year, after its live software update tool was compromised
Earlier today, Motherboard published … Lily Hay Newman / Wired : HACK BRIEF: HOW TO CHECK YOUR COMPUTER FOR ASUS UPDATE MALWARE Vibhuti Sharma / Reuters : Asus implements fix for malware attack Kasper...