Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
6 résultats taggé threat-intelligence  ✕
Microsoft launches new European Security Program https://blogs.microsoft.com/on-the-issues/2025/06/04/microsoft-launches-new-european-security-program/
07/06/2025 23:11:11
QRCode
archive.org

As AI and digital technologies advance, the European cyber threat landscape continues to evolve, presenting new challenges that require stronger partnerships and enhanced solutions. Ransomware groups and state-sponsored actors from Russia, China, Iran, and North Korea continue to grow in scope and sophistication, and European cyber protection cannot afford to stand still.

That is why, today, in Berlin, we are announcing a new Microsoft initiative to expand our longstanding work to help defend Europe’s cybersecurity. Implementing one of the five European Digital Commitments I shared in Brussels five weeks ago, we are launching a new European Security Program that adds to the company’s longstanding global Government Security Program.

This new program expands the geographic reach of our existing work and adds new elements that will become critical to Europe’s protection. It puts AI at the center of our work as a tool to protect traditional cybersecurity needs and strengthens our protection of digital and AI infrastructure.

We are launching the European Security Program with three new elements:

  • Increasing AI-based threat intelligence sharing with European governments;
  • Making additional investments to strengthen cybersecurity capacity and resilience; and
  • Expanding our partnerships to disrupt cyberattacks and dismantle the networks cybercriminals us
Microsoft EN 2025 EU security program AI-based threat-intelligence launch annonce
Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm?hl=en
18/04/2024 07:10:04
QRCode
archive.org
thumbnail

APT44 is a threat actor that is actively engaged in the full spectrum of espionage, attack, and influence operations.

Mandiant EN 2024 APT44 Threat-Intelligence Sandworm Russia google attribution FROZENBARENTS
InfectedSlurs Botnet Spreads Mirai via Zero-Days https://www.akamai.com/blog/security-research/new-rce-botnet-spreads-mirai-via-zero-days?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
29/11/2023 09:46:41
QRCode
archive.org
thumbnail

Akamai SIRT has uncovered two zero-day vulnerabilities that are being actively exploited to spread a Mirai variant in the wild. Read on for details and mitigation.

akamai EN 2023 Research Threat-Intelligence Mirai china-cat
Meet the Unique New "Hacking" Group: AlphaLock https://www.bleepingcomputer.com/news/security/meet-the-unique-new-hacking-group-alphalock/
22/11/2023 14:34:20
QRCode
archive.org
thumbnail

It’s not every day that you discover a new Russian hacking group complete with a song and dance routine (performed live), a sleek user interface (with dark mode!) and a clearly thought-out business model. But that is exactly what our security research team discovered with “AlphaLock,” a “pentesting training organization” that trains hackers and then monetizes their services through a dedicated affiliate program.
...
We originally discovered their group through a public Telegram channel that has since become private. This post will serve as a detailed investigation and description of one of the most brazen, strange, and best marketed cybercrime groups to appear in 2023.

  • Cybercrime sophistication and commoditization continues to grow: We now have a real life example of a threat group that seeks to create its own talent pool through a training program, goes to extensive lengths to market itself, and plans to monetize this through a hacker-for-hire scheme. The level of technical sophistication required to do this isn’t very high, but the level of organizational sophistication and business acumen is quite interesting.
  • Ransomware isn’t the only game in town: Cybercriminals typically choose the path of least resistance that is most likely to prove profitable, this has been increasingly the case as the cybercrime ecosystem has evolved into a functional market economy. However AlphaLock represents another potential method to both monetize and democratize cybercrime. This could be a particularly interesting model alternative for ransomware groups if the U.S. follows through with the proposal of banning ransomware payments.
  • A Technical Threat Actor Supply Shortage? One of the most fascinating things about AlphaLock is they want to create a pipeline of talent to populate their hacker marketplace. This suggests that there may be limitations on the supply of talented threat actors that have the required degree of sophistication to the point where they have tried to build their own pipeline of actors.
  • The Brand: Our researchers have noted an increasing focus on group “brand” and identity among financially motivated threat groups. AlphaLock has clearly made significant investments in time to create a brand and reputation for itself. Notice in the final post they even advertise that they are looking to hire someone to market themselves on Telegram and social media.
  • Blurred Lines: Many security practitioners have often assumed that threat actors primarily operate on the dark web. In most cases today this isn’t the case. There are increasingly blurred lines between clear web sites, Tor, and social media applications such as Telegram that create easy avenues for threat actors to congregate and communicate.
bleepingcomputer EN 2023 AlphaLock Cybersecurity Flare Penetration-Testing Telegram Threat-Intelligence Russia
InfectedSlurs Botnet Spreads Mirai via Zero-Days https://www.akamai.com/blog/security-research/new-rce-botnet-spreads-mirai-via-zero-days
22/11/2023 09:52:18
QRCode
archive.org
thumbnail

Akamai SIRT has uncovered two zero-day vulnerabilities that are being actively exploited to spread a Mirai variant in the wild.

akamai EN 2023 Research Threat-Intelligence botnet zero-day mirai china-cat
Researchers Explore Hacking VirusTotal to Find Stolen Credentials https://www.darkreading.com/threat-intelligence/researchers-explore-hacking-virustotal-to-find-stolen-credentials
22/11/2022 15:57:11
QRCode
archive.org
thumbnail

VirusTotal can be used to collect large amounts of credentials without infecting an organization or buying them online, researchers found.

darkreading EN 2022 threat-intelligence VirusTotal Credentials
4395 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio