Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive Emails

Microsoft says the Midnight Blizzard APT group may still be poking around its internal network after stealing source code, spying on emails.
The post Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive Emails appeared first … Continue reading Microsoft Says Russian Gov Hackers Stole Source Code After Spying on Executive Emails

Cybercriminals harness AI for new era of malware development

The alliance between ransomware groups and initial access brokers (IABs) is still the powerful engine for cybercriminal industry, as evidenced by the 74% year-on-year increase in the number of companies that had their data uploaded on dedicated leak si… Continue reading Cybercriminals harness AI for new era of malware development

JCDC’s strategic shift: Prioritizing cyber hardening

In this Help Net Security interview, Geoffrey Mattson, CEO of Xage Security, discusses the evolution of the Joint Cyber Defense Collaborative (JCDC) since its 2021 inception and tackles its 2024 strategic priorities in response to escalating cyber thre… Continue reading JCDC’s strategic shift: Prioritizing cyber hardening

APT29 revamps its techniques to breach cloud environments

Russian threat actors APT29 are changing their techniques and expanding their targets to access cloud environments, members of the Five Eyes intelligence alliance have warned. About APT29 APT29 (aka Midnight Blizzard, aka Cozy Bear) is a cyber espionag… Continue reading APT29 revamps its techniques to breach cloud environments

How are state-sponsored threat actors leveraging AI?

Microsoft and OpenAI have identified attempts by various state-affiliated threat actors to use large language models (LLMs) to enhance their cyber operations. Threat actors use LLMs for various tasks Just as defenders do, threat actors are leveraging A… Continue reading How are state-sponsored threat actors leveraging AI?

State-backed hackers are experimenting with OpenAI models 

Microsoft and OpenAI say hackers from China, Iran, North Korea and Russia are exploring the use of large language models in their operations. 

The post State-backed hackers are experimenting with OpenAI models  appeared first on CyberScoop.

Continue reading State-backed hackers are experimenting with OpenAI models 

Microsoft patches two zero-days exploited by attackers (CVE-2024-21412, CVE-2024-21351)

On February 2024 Patch Tuesday, Microsoft has delivered fixes for 72 CVE-numbered vulnerabilities, including two zero-days (CVE-2024-21412, CVE-2024-21351) that are being leveraged by attackers in the wild. About CVE-2024-21412 and CVE-2024-21351 CVE-2… Continue reading Microsoft patches two zero-days exploited by attackers (CVE-2024-21412, CVE-2024-21351)

China-Linked Blackwood APT Deploys Advanced NSPX30 Backdoor in Cyberespionage

By Deeba Ahmed
The NSPX30 backdoor, initially uncovered in 2005 as a simple form of malware, has evolved over time into an advanced threat.
This is a post from HackRead.com Read the original post: China-Linked Blackwood APT Deploys Advanced NSPX30 Back… Continue reading China-Linked Blackwood APT Deploys Advanced NSPX30 Backdoor in Cyberespionage

Russian hackers breached Microsoft, HPE corporate maliboxes

Cozy Bear (aka Midnight Blizzard, aka APT29) has been busy hacking and spying on big tech companies: both Microsoft and Hewlett Packard Enterprise (HPE) have recently disclosed successful attack campaigns by the Russia-affiliated APT group. The Microso… Continue reading Russian hackers breached Microsoft, HPE corporate maliboxes