Advertisement · 728 × 90
#
Hashtag
#ciscotalos
Advertisement · 728 × 90
Preview
Chinese Cyber Espionage Group Targets Telecom Infrastructure With New Toolkit   In the midst of intensifying geopolitical competition in cyberspace, a previously undetected cyberattack linked to China is quietly unfolding across South America's telecommunications industry since 2024. Cisco Talos researchers have reported that the operation represents a methodical and deeply embedded effort to secure long-term access to core communications infrastructure -- an objective which goes well beyond opportunistic intrusions.  The group is responsible for the UAT-9244 malware, a suite of tools engineered not only for initial compromise but also for durability, stealth, and sustained intelligence collection. A number of analysts have noted that this campaign's tactics, techniques, and operational overlaps have a strong resemblance to those of Chinese advanced persistent threat actors like Famous Sparrow and Tropic Trooper, suggesting a shared tooling framework, coordination of activities, or a broader strategic alignment.  As a result of this campaign's apparent emphasis on maintaining uninterrupted footholds within telecom environments, which underpin national connectivity, sensitive data flows, and, by extension, elements of sovereign control, are apparent to have been paramount. In embedding themselves within these networks, operators position their capabilities at a crucial vantage point where surveillance, data interception, and disruption can all converge.  According to the findings, telecommunications companies are no longer peripheral targets, but rather are central elements in state-aligned intelligence gathering. This reflects a dramatic shift in modern cyber warfare towards infrastructure-level persistence.  On the basis of these observations, Cisco Talos researchers believe the activity cluster has a strong operational affinity with Famous Sparrow and Tropic Trooper, while remaining sufficiently distinct to qualify for its own classification. The attribution does not rely on any particular indicator, but instead on a convergence of technical evidence, including shared tooling characteristics, overlapping tactics, techniques, and procedures, as well as a unified victimology focused on telecommunications infrastructure.  A comparison between the targeting profile and campaigns attributed to Salt Typhoon cannot be established without establishing a definitive link, suggesting either parallel operational tracks or compartmentalized tasking within the context of a broad state-aligned actor ecosystem.  In addition to the three previously undocumented malware families in the intrusion set, a variety of newly developed malware families have been specifically developed to provide resilience in heterogeneous telecom environments. There are several backdoors that are designed for covert persistence and flexible post-exploitation control, including TernDoor.  he malware deploys itself using DLL side-loading, by abusing the legitimate wsprint.exe executable to load the malicious library BugSplatRc64.dll, which, in turn, decrypts and executes the payload directly in memory by injecting it into msiexec.exe, thereby minimizing its forensic impact. It also includes a kernel-level component, WSPrint.sys, which enables granular manipulation of system processes, such as terminating, suspending, or resuming them, improving evasion as well as operational stability.  A layering of persistence mechanisms is created through scheduled tasks and carefully crafted modifications to the Windows Registry, as well as additional steps taken to obscure these artifacts from routine examination.   Additionally, the malware is capable of performing many operator-controlled actions, including remote shell execution, initiation of arbitrary processes, file system interaction, reconnaissance, and even controlled self-removal, underscoring a level of engineering consistent with long-term intelligence-driven campaigns rather than transient intrusions.  Considering the historical context of this threat landscape further reinforces the assessment of continuity. It is believed that Famous Sparrow has been operating since at least 2019, consistently targeting sectors such as the hospitality industry, government institutions, international organizations, and legal services, whereas Tropic Trooper has been in business since 2011, concentrating on government entities, transportation systems, and advanced technology industries across a range of regions, including Taiwan, Philippines, and Hong Kong, as well as more recently in the Middle East.  In light of this background, the current campaign's focus on telecommunication networks illustrates a deliberate preference for infrastructure that aggregates vast amounts of sensitive information related to communications, positioning compromised environments as strategic vantage points for the collection of long-term intelligence.  There was a coordinated deployment of three malware families within the intrusions, including TernDoor, PeerTime, and BruteEntry, each designed to fulfil a specific operational role across heterogeneous networks. Apparently, TernDoor, an implant for Windows, can be traced back to earlier implants like CrowDoor and SparrowDoor, underscoring the iterative nature of the development process within established espionage working groups.  In order to execute the malware, it uses DLL side-loading, by manipulating trusted executables in order to load malicious libraries that decrypt and inject the payload into msiexec.exe, which allows the malware to operate under the guise of legitimate system activity.  Upon establishing the implant, remote command execution, system reconnaissance, and file manipulation are available, while persistence is enhanced by scheduling tasks and registry-based autorun mechanisms designed to avoid routine inspection.  As a result of the malicious kernel driver, the campaign has a greater ability to bypass security controls since it is capable of suspending or terminating processes. Furthermore, PeerTime extends the campaign’s reach to Linux-based infrastructure commonly used in telecom environments, including servers, routers, and embedded systems.  The ELF binary is compatible with multiple architectures including ARM, MIPS, PowerPC, and AArch64 and demonstrates a deliberate effort to maximize operational coverage. As a result of this design choice, it obscures infrastructure dependencies and complicates attribution and detection by utilizing BitTorrent protocol to retrieve instructions and secondary payloads from distributed peers, diverging from conventional command-and-control paradigms.  An embedded debug string in Simplified Chinese within associated binaries serves as an additional linguistic indicator that aligns the activity with Chinese-speaking operators. Additionally, the malware can masquerade as legitimate processes while executing commands and facilitating lateral file transfers between compromised hosts in addition to executing commands.  A third component, BruteEntry, allows for expansion of the threat by transforming compromised edge devices into operational relay boxes that serve as distributed scanning nodes in the event that they are compromised.  By using predefined credential sets, the tool systematically probes exposed services, including SSH, Postgres, and Tomcat, using attacker-controlled infrastructure that receives target lists. Authentication attempts that are successful are relayed back to command infrastructure, effectively converting compromised systems into contributors within a broader framework of reconnaissance and access acquisition.  As a result of this distributed approach, operators can scale credential harvesting efforts across large address spaces while minimizing the exposure of their core infrastructure to direct exposure. This study matches a larger pattern of cyberespionage activity targeting global telecommunications providers, which is increasingly recognized as a critical sector for both national security and intelligence.  The scope of Salt Typhoon's campaigns has already been demonstrated with incidents spanning multiple major carriers in the United States and dozens of countries worldwide, and this activity is believed to be continuing into early 2026.  A renewed focus on infrastructure-centric operations aiming to secure enduring access to the world's communications backbones is underscored by the emergence of UAT-9244 and its tailored malware ecosystem. In further investigation of the Linux-oriented component, it becomes evident that the architecture is intentionally designed to facilitate operation across diverse hardware environments.  PeerTime has been designed to support multiple processor architectures including ARM, MIPS, PowerPC, and AArch64 so it can propagate across a wide range of devices, including routers, network appliances, and embedded systems, that are essential components of modern telecommunications infrastructures.  The deployment of the application is managed by a shell-based installation procedure, which introduces both a loader and a secondary "instrumentor" module, the latter of which facilitates operational management and control of execution.  Typically, when containerization is implemented, particularly when Docker is used, the loader is executed within a container context, a technique aligned with contemporary infrastructure practices but also provides a layer of abstraction, thereby complicating detection and forensic analysis.  Additionally, by utilizing BruteEntry, the campaign is systematically extending its reach beyond initially compromised hosts in parallel to this foothold. Specifically, Cisco Talos has documented that the tool is specifically designed to convert infected Linux systems especially edge-facing devices into operational relay boxes that can conduct large-scale scanning operations and credential harvesting operations.  Upon deployment, BruteEntry communicates with attacker-controlled command infrastructure, from which it receives dynamically assigned IP addresses for reconnaissance. This application probes common enterprise and telecommunications services, including SSH endpoints, PostgreSQL databases, and Apache Tomcat management interfaces, using predefined credential sets that are then matched by a structured brute-force approach.  As successful authentication attempts are relayed back to the command infrastructure, attackers are effectively able to pivot laterally and incrementally expand their access across interconnected systems as a consequence. By using modular tooling coordinated in this way, a deliberate strategy to enhance scalability and persistence can be seen, with each compromised node contributing to an overall reconnaissance and intrusion framework.  Especially significant is the emphasis placed on telecommunication providers, as these entities provide access to vast volumes of sensitive communications and metadata by operating at the convergence of data flow and network control. Their positioning enables them to act not only as a target of opportunity but also as critical assets in a broader context of state-aligned intelligence gathering, where sustained access can offer both immediate and long-term benefits. It is important for telecommunications operators to take note of these findings and to reassess their defensive posture in the face of highly persistent, state-sponsored threats designed to disrupt operations for extended periods of time rather than to create short-term disruptions. In environments where adversaries actively blend into legitimate system processes and take advantage of trusted execution paths, traditional perimeter-based controls are no longer sufficient. In order to protect critical network assets, a shift is becoming increasingly important toward continuous monitoring, behavior-based threat detection, and rigorous segmentation is needed. Edge devices are being hardened, credential policies are being enforced, and containerized environments are being audited in particular, since they are emerging as attractive platforms for covert operations.  Additionally, proactive threat hunting and intelligence sharing across sectors are essential, as campaigns of this nature often unfold slowly across multiple jurisdictions and often take a long time to complete. An organization can improve early detection and limit lateral movement by identifying anomalous activity based on known adversarial patterns and maintaining visibility across Windows and Linux ecosystems.   As a result of the persistence and adaptability demonstrated in this operation, cyberespionage strategy has evolved with silent access to critical infrastructure being prioritized over overt disruption putting the onus on defenders to adopt security frameworks that are equally adaptive and intelligence-driven.

Chinese Cyber Espionage Group Targets Telecom Infrastructure With New Toolkit #AdvancedPersistentThreats #Chinesecyberespionage #CiscoTalos

0 0 0 0

📰 Hacker Negara Tiongkok Targetkan Telko dengan Toolkit Malware Baru

👉 Baca artikel lengkap di sini: ahmandonk.com/2026/03/06/uat-9244-malw...

#apt #ciscoTalos #keamananSiber #malware #telekomunikasi

0 0 0 0
Post image

Allarme sicurezza: sfruttamento attivo della vulnerabilità Cisco Catalyst SD-WAN

📌 Link all'articolo : www.redhotcyber.com/post/all...

#redhotcyber #news #cybersecurity #hacking #ciscotalos #sdwan #vulnerabilita #cve202620127 #sicurezzainformatica

0 0 0 0
Preview
UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors Cisco Talos links UAT-9921 to VoidLink, a modular Zig-based malware targeting Linux cloud systems with stealth plugins and C2 control.

L'acteur UAT-9921 utilise le malware VoidLink pour cibler les secteurs tech et finance depuis 2019, révèle #CiscoTalos. Une menace à surveiller de près ! 🛡️💻 #CyberSecurity #Automatisation

1 0 0 0
Post image

China Linked APT Targets North American Infrastructure
Read More: buff.ly/yvokY9M

#APT #ChinaLinked #CriticalInfrastructure #CyberEspionage #ThreatIntel #ZeroDay #NationState #CiscoTalos #CyberSecurity #Infosec

0 0 0 0
Preview
China-Linked APT Exploited Sitecore Zero-Day in Critical Infrastructure Intrusions Cisco Talos reports China-linked APT UAT-8837 targeting North American critical infrastructure via a Sitecore zero-day, abusing Active Directory and R

Un groupe APT lié à la Chine exploite une faille zero-day de #Sitecore pour attaquer des infrastructures critiques américaines ⚠️. Depuis l’an dernier, le collectif cible l’Amérique du Nord selon #CiscoTalos (UAT-8837). #CyberSecurity #IA2025 #IA https://kntn.ly/00a023b3

0 0 0 0
Post image

L’EDR è inutile! Gli hacker di DeadLock hanno trovato un “kill switch” universale

📌 Link all'articolo : www.redhotcyber.com/post/led...

#redhotcyber #news #ciscoTalos #ransomware #cybersecurity #malware #edr #sicurezzainformatica

0 0 0 0
Post image

Il ransomware DeadLock sfrutta un nuovo loader BYOVD con vulnerabilità Baidu, PowerShell avanzato e persistenza AnyDesk per disattivare difese e cifrare sistemi Windows.

#AnyDesk #Baidu #byovd #CiscoTalos #DeadLockransomware #Powershell #Windows
www.matricedigitale.it/2025/12/09/d...

0 0 0 0
Post image

Arriva Kraken: il nuovo ransomware che valuta l’ambiente per infliggere il massimo danno

📌 Link all'articolo : www.redhotcyber.com/post/arr...

#redhotcyber #news #ciscoTalos #KrakenRansomware #Ransomware #Doppiaestorsione #Cybersecurity #Malware #Bitcoin #USA #UK

0 0 0 0
Post image

🚨 Cisco Talos: in forte aumento gli attacchi che sfruttano app pubbliche e phishing da account compromessi.

👉www.zazoom.it/news-notizia/post/899883... 💥

#CyberSecurity #CiscoTalos #Infosec #Ransomware #SharePoint

0 0 0 0
Preview
Qilin Ransomware's Evolving Attack Methods Include Leveraging VPN Credentials Exposed on the Dark Web An analysis details attack methods of the Qilin ransomware group, including double extortion and targeting the manufacturing sector.

Full report via TechNadu:
www.technadu.com/qilin-ransom...

Do you think organizations are underestimating VPN credential hygiene as a top-tier attack vector?
#CyberSecurity #Ransomware #VPN #DarkWeb #CiscoTalos #InfoSec

0 0 0 0
Preview
North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware OtterCookie v5 merges BeaverTail features with new keylogging and blockchain-based C2 tactics.

Des hackers nord-coréens fusionnent BeaverTail et OtterCookie dans un malware JS avancé 🐾 Selon #CiscoTalos, ce groupe affine activement ses outils en combinant les fonctionnalités de ces malwares. #CyberSecurity #IA #InnovationIA https://kntn.ly/e3ca5204

0 0 0 0
Post image

ClayRat e Velociraptor ridefiniscono le minacce cyber: spyware Android e tool forensics usati da Storm-2603 in attacchi ransomware globali.

#Android #CiscoTalos #ClayRat #Ransomware #spyware #Storm2603 #Velociraptor #Zimperium
www.matricedigitale.it/2025/10/09/c...

0 0 0 0
Post image

Talos documenta il “salting” CSS nelle email: testo invisibile che altera intent e sentiment, elude filtri e modelli ML. Difese? Normalizzare prima, analizzare dopo.

#CiscoTalos #CSS
www.matricedigitale.it/2025/10/07/t...

0 0 0 0
Post image

Rainyday, Turian e nuova variante PlugX sfruttano il DLL search-order hijacking: analisi TTP, IOC e mitigazioni pratiche per Windows.

#apt #backdoor #cina #CiscoTalos #PlugX #Rainyday #Turian
www.matricedigitale.it/2025/09/27/r...

0 0 0 0
Post image

Rainyday, Turian e nuova variante PlugX sfruttano il DLL search-order hijacking: analisi TTP, IOC e mitigazioni pratiche per Windows.

#apt #backdoor #cina #CiscoTalos #plugx #Rainyday #Turian
www.matricedigitale.it/2025/09/27/r...

0 0 0 0
Preview
ClamAVNet ClamAV® is an open-source antivirus engine for detecting trojans, viruses, malware & other malicious threats.

#ClamAV 1.5.0 RC has been released ( #OpenSourceAntiVirus / #AntiVirus / #Cisco / #CiscoSystems / #CiscoTalos / #Sourcefire / #OpenSource / #ClamWin ) clamav.net

2 0 0 0
Post image

Vulnerabilità ReVault e CVE-2025-49760 espongono sistemi Dell a takeover hardware e escalation dominio, richiedendo hardening avanzato.

#CiscoTalos #ControlVault3 #dell #exploit #ReVault #SafeBreach #WindowsEPM
www.matricedigitale.it/2025/08/11/d...

0 1 0 0
Preview
BlackSuit Ransomware Capabilities Undermined by Targeted Server Takedown   With the help of U.S Immigration and Customs Enforcement's Homeland Security Investigations (HSI), as well as domestic and international law enforcement agencies, U.S Immigration and Customs Enforcement's Homeland Security Investigations has dismantled the backbone of the BlackSuit ransomware group, a decisive blow taken against transnational cybercrime.  As a result of the coordinated action taken against the gang, servers, domains, and other digital assets vital to the gang's illicit activities were seized. There is widespread evidence that BlackSuit is the successor to the notorious Royal ransomware. It has been implicated in numerous high-impact attacks on critical sectors such as healthcare and education, public safety organisations, energy infrastructure, and government agencies, which have threatened the availability of essential services and public safety.  Currently, the U.S. Department of Homeland Security (DHS) is examining allegations that the BlackSuit ransomware group—the successor to the Royal gang—was responsible for compromising 450 organisations across the country and extorting $370 million in ransom payments before its federal authorities took action to take the group down.  An official at Immigration and Customs Enforcement (ICE) confirmed today that Homeland Security Investigations (HSI), in collaboration with U.S. and international law enforcement partners, had successfully dismantled the critical infrastructure supporting the organisation's operations, as part of a statement issued by the agency.  In a coordinated action initiated by the FBI, servers, domains, and digital assets used to deliver ransomware were seized, along with the proceeds that were laundered from the extortion of victims and the deployment of ransomware on victims. This marks a significant disruption of one of the most damaging cybercriminal enterprises in recent memory.  A multinational law enforcement effort, coordinated by U.S. and Europol officials and spanning nine countries, has struck a significant blow against the BlackSuit ransomware gang, seizing its darknet leak site and disassembling portions of its digital infrastructure, in accordance with a joint announcement on July 24, 2025. A company with roots dating back to the spring of 2023, BlackSuit stands out from the crowd due to the fact that the firm has been able to avoid the common ransomware-as-a-service model, preferring instead to keep full control of the malicious tools and infrastructure instead of licensing them out to affiliates.  A joint advisory released in 2024 by the FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) identified this group as a continuation and evolution of the Royal ransomware, which itself was associated with Conti, a notorious Russian-speaking syndicate that disbanded in the year 2022-23. There has been a calculated campaign by the BlackSuit ransomware group against organisations that range in scope from education, government, healthcare, information technology, manufacturing, and retail.  The group used a double extortion model for extorting victims by stealing data before it was encrypted to maximise their leverage. With respect to Windows and Linux environments, the gang exploited VMware ESXi servers, encrypting files over a wide area within accessible drives, hindering recovery efforts, and issuing ransom notes that direct victims to the Tor network for communication. As part of its operations, the group targeted small and medium-sized businesses, as well as large enterprises. According to the US authorities, they had demanded at least $500 million in ransom payments by August 2024, ranging from $1 million to $60 million for individual demands. Approximately the same time as the leak site of the Cisco Talos network was seized, cybersecurity researchers from Cisco Talos released an analysis of Chaos ransomware - the first to be observed in early 2025. This ransomware is likely to be a successor to BlackSuit, according to Cisco Talos researchers.  A string of high-profile ransomware attacks, including those perpetrated by BlackSuit and its predecessor, Royal, caused extensive disruptions as well as financial losses. A crippling attack on the city of Dallas led to heightened law enforcement interest in this group. The attack disrupted emergency services, court operations, and municipal systems in the city. Several U.S. schools, colleges, major corporations, and local governments were the victims of this attack, including Japan's publishing giant Kadokawa and the Tampa Bay Zoo.  During April 2024, the gang claimed responsibility for an attack on Octapharma, a blood plasma collection company that caused the temporary closure of nearly 200 collection centres across the country, according to the American Hospital Association. In an effort led by Europol to target Royal and BlackSuit, Operation Checkmate was a key component of the effort, which Bitdefender called a milestone in the fight against organised cybercrime by marking the group's dismantling as one of the largest achievements to date.  Even though the takedown has been described as a “critical blow” to the group’s infrastructure, U.S. Secret Service Special Agent in Charge William Mancino said that the group has re-surfaced under the Chaos ransomware name, displaying striking similarities in the encryption methods, ransom note formatting, and attack tools. However, Cisco Talos analysts reported resurfacing with elements of the gang under the Chaos ransomware name after the operation. In addition, the Department of Justice announced that $2.4 million in cryptocurrency has been confiscated from an address allegedly linked to a Chaos member known as Hors, who has been implicated in ransomware attacks in Texas and other countries. BlackSuit's servers have been effectively disabled by the operation, effectively stopping it from functioning, according to experts confirmed by the operation.  There were 184 victims of the group worldwide, including several Germans, whose data was published on a dark web leak site to pressure victims into paying ransoms, which the group claimed to have killed. At the time that this report was written, the site was no longer accessible, instead showing a seizure notice stating that the site had been taken down following an international law enforcement investigation coordinated by the organisation. It has been confirmed by German authorities that the effort was carried out with the support of ICE's Homeland Security Investigations unit as well as Europol, although ICE representatives declined to comment on this matter.  The seizure of the drugs was reported earlier in the week by officials, but no arrests have yet been confirmed as a result. As of late, BlackSuit has emerged as one of the largest ransomware operations in the United States, having struck major U.S. cities like Dallas and targeting organisations from several industries, including manufacturing, communications, and healthcare.  Cisco Talos cybersecurity researchers have discovered that after blackSuit's infrastructure was dismantled, it was found that the ransomware group likely rebranded itself as Chaos ransomware after dismantling its infrastructure. Several cases of newly emerging ransomware-as-a-service (RaaS) operations have been associated with distinct double-extortion strategies, combining voice-based social engineering to gain access to targets, followed by deploying an encryptor to target both local and remote storage to create maximum impact. In a report by the Talos security group, the current Chaos ransomware is not related to earlier Chaos variants, and there are rumours that the group adopted the name to create confusion among victims. Several researchers have analysed the operation and assessed it as either a direct rebranding of BlackSuit (formerly Royal ransomware) or as run by former members of the organisation with moderate confidence.  According to their findings, there are similarities between tactics, techniques, and procedures, from encrypted commands and ransom notes to the use of LOLbins and remote monitoring and management tools. It is believed that BlackSuit's origins can be traced back to the Conti ransomware group, which was fractured in 2022 after its internal communications were leaked.  After the Russian-speaking syndicate splintered into three factions, the first was Zeon, the second was Black Basta, the third was Quantum, but by 2024, they had adopted the BlackSuit name after rebranding themselves as Royal. Among the most significant developments in the Russian-language ransomware ecosystem is the rise of the INC collective, which has been dubbed the "granddaddy of ransomware" by cybersecurity researcher Boguslavskiy. There is concern that BlackSuit will increase its dependency on INC's infrastructure as a result of INC's growth.  According to reports, the syndicate has about 40 members and is led by a person who is referred to as "Stern", who has forged extensive alliances, creating a decentralised network with operational ties to groups such as Akira, ALPHV, REvil, and Hive, among others. In terms of Russian-speaking ransomware collectives, LockBit Inc. is presently ranked as the second biggest, only being surpassed by DragonForce.  There is no doubt that the takedown of BlackSuit marks a decisive moment in the fight against ransomware syndicates as it represents the disruption of a prolific and financially destructive cybercrime operation. Although analysts warn that the seizure of infrastructure, cryptocurrency, and dark web platforms might have been a tangible setback for these groups, they have historically shown they can reorganise, rebrand, and adapt their tactics when they are under pressure from law enforcement.  It is evident that Chaos ransomware, which employs sophisticated extortion techniques as well as targeted exploitation of both local and remote systems, has demonstrated the persistence of this threat, as well as the adaptability of its operators. Experts point out that the operation's success is a reflection of unprecedented international coordination, which combines investigative expertise, intelligence sharing, and cyber forensics across multiple jurisdictions to achieve unprecedented success.  In today's world, a collaborative model has become increasingly crucial for dismantling decentralised ransomware networks that span borders, rely on anonymising technologies to avoid detection, and use decentralised methods of evading detection. Cybersecurity researchers note that the BlackSuit case highlights how deeply connected Russian-speaking ransomware groups are, with many of them sharing tools, infrastructure, and operational methods, making them more resilient and also making them easier to trace when global enforcement efforts are aligned.  There is no doubt that the BlackSuit takedown serves as both a victory and a warning for governments, industries, and cybersecurity professionals alike—demonstrating how effective sustained, multinational countermeasures are, but also demonstrating the importance of maintaining vigilance against the rapid reemergence of threat actors in new identities that can happen any time.  Despite law enforcement agencies' attempts to track the remnants of BlackSuit through the lens of Chaos ransomware and beyond, the case serves as a reminder that, when it comes to cybercrime, it is quite common for one operation to end, only for another to begin some weeks later.

BlackSuit Ransomware Capabilities Undermined by Targeted Server Takedown #ALPHVBlackcatRansomware #BlackSuit #CiscoTalos

0 0 0 0
Preview
Dell fixes major security flaw in ControlVault chip affecting millions of laptops Massive Dell laptop security breach exposed: Cisco Talos reveals chip flaw ahead of Black Hat

A flaw in the chips used to secure tens of millions of Dell laptops could have given attackers the ability to steal sensitive data

More info: https://cnews.link/dell-fixes-flaw-in-laptops-3/
#Dell #laptop #CiscoTalos

0 1 0 0
Preview
Dell-Firmware macht Millionen Laptops angreifbar – «it business» – Meldungen aus der ICT-Welt

Cisco Talos entdeckt gravierende Schwachstellen in der Dell ControlVault Firmware. Über 10 Mio. Geräte betroffen. Jetzt Firmware prüfen und absichern.
#Cybersecurity #Dell #CiscoTalos #Firmware #ITSecurity #PatchNow

0 2 1 0
Post image

Campagna MaaS usa Emmenhtal e Amadey per colpire entità ucraine via GitHub. Talos rivela tattiche e IOC per la mitigazione.

#Amadey #CiscoTalos #Emmenhtal #github #MaaS #SmokeLoader #ucraina
www.matricedigitale.it/2025/07/17/o...

1 0 0 0

#ClamAV 1.0.9 (old #LTS) has been released ( #OpenSourceAntiVirus / #AntiVirus / #Cisco / #CiscoSystems / #CiscoTalos / #Sourcefire / #OpenSource / #LongTermSupport / #ClamWin ) clamav.net

1 0 0 0

#ClamAV 1.4.3 #LTS has been released ( #OpenSourceAntiVirus / #AntiVirus / #Cisco / #CiscoSystems / #CiscoTalos / #Sourcefire / #OpenSource / #ClamWin ) clamav.net

1 0 0 0
Post image

Prompt injection, evasione AI e abuso dei LLM: Check Point e Cisco Talos analizzano le nuove strategie cybercriminali, rischi e difese per i sistemi AI.

#AI #CheckPoint #CiscoTalos #evidenza #LargeLanguageModel #LLM #promptinjection
www.matricedigitale.it/2025/06/25/e...

0 0 0 0
Post image

Prompt injection, evasione AI e abuso dei LLM: Check Point e Cisco Talos analizzano le nuove strategie cybercriminali, rischi e difese per i sistemi AI.

#AI #CheckPoint #CiscoTalos #evidenza #LargeLanguageModel #LLM #promptinjection
www.matricedigitale.it/2025/06/25/e...

0 0 0 0