Tag: communications
-
Warning: React2Shell vulnerability already being exploited by threat actors
Tags: ai, application-security, attack, china, cloud, communications, credentials, data, data-breach, exploit, firewall, framework, group, infosec, intelligence, linux, malicious, malware, open-source, service, software, threat, tool, update, vulnerability, wafSystem.Management.Automation.AmsiUtils.amsiInitFailed = true (a standard AMSI bypass), and iex executes the next stage.JFrog’s security research team also today reported finding a working proof of concept that leads to code execution, and they and others have also reported finding fake PoCs containing malicious code on GitHub. “Security teams must verify sources before testing [these PoCs],” warns JFrog.Amitai Cohen, attack…
-
New Phishing Campaign Impersonates India’s Income Tax Department to Distribute AsyncRAT
In November 2025, security researchers at Raven AI identified a sophisticated zero-day phishing campaign impersonating the Income Tax Department of India, targeting enterprises across the country with a multi-stage malware chain. The attack combined authentic-looking government communications with advanced evasion techniques, delivering both a shellcode-based RAT loader and a malicious executable disguised as a GoTo…
-
Russia limits WhatsApp use, claiming it enables terrorism, crime, espionage
Russian users of WhatsApp reported disruptions as authorities limited access to the app, which they said enabled fraud, terrorism and possibly a recent leak of diplomatic communications with the U.S. First seen on therecord.media Jump to article: therecord.media/russia-whatsapp-restrictions
-
Comcast Fined $1.5 Million to Settle FCC Probe Tied to Vendor Data Breach
Comcast has agreed to a $1.5 million settlement with the Federal Communications Commission (FCC) following a data breach at a third-party vendor that exposed the personal information of hundreds of thousands of its customers. The breach has raised concerns about the security of customer data when handled by external companies. The incident originated with Financial…
-
Comcast to pay $1.5M fine for vendor breach affecting 270K customers
Comcast will pay a $1.5 million fine to settle a Federal Communications Commission investigation into a February 2024 vendor data breach that exposed the personal information of nearly 275,000 customers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/comcast-to-pay-15-million-fine-after-a-vendor-data-breach-affecting-270-000-customers/
-
US FCC Scraps CALEA Move, Raising Telecom Security Fears
Lawmakers Say Reversal Strips One of Few Enforceable Standards for Major Carriers. The U.S. FCC’s move to scrap its short-lived interpretation of the Communications Assistance for Law Enforcement Act – the 1994 statute known as CALEA – sparked warnings that the agency just eliminated one of the few enforceable cybersecurity tools for the telecom sector.…
-
US FCC Scraps CALEA Move, Raising Telecom Security Fears
Lawmakers Say Reversal Strips One of Few Enforceable Standards for Major Carriers. The U.S. FCC’s move to scrap its short-lived interpretation of the Communications Assistance for Law Enforcement Act – the 1994 statute known as CALEA – sparked warnings that the agency just eliminated one of the few enforceable cybersecurity tools for the telecom sector.…
-
ToddyCat APT Targeting Internal Employee Communications at Organizations
Advanced persistent threat actors continue to develop sophisticated techniques for compromising corporate communications, with the ToddyCat APT group demonstrating remarkable evolution in their operational capabilities. Recent research from Kaspersky reveals how this highly organized espionage group has refined methods for covertly accessing internal employee communications at target organizations throughout the second half of 2024 and…
-
ToddyCat APT Targeting Internal Employee Communications at Organizations
Advanced persistent threat actors continue to develop sophisticated techniques for compromising corporate communications, with the ToddyCat APT group demonstrating remarkable evolution in their operational capabilities. Recent research from Kaspersky reveals how this highly organized espionage group has refined methods for covertly accessing internal employee communications at target organizations throughout the second half of 2024 and…
-
ToddyCat APT Targeting Internal Employee Communications at Organizations
Advanced persistent threat actors continue to develop sophisticated techniques for compromising corporate communications, with the ToddyCat APT group demonstrating remarkable evolution in their operational capabilities. Recent research from Kaspersky reveals how this highly organized espionage group has refined methods for covertly accessing internal employee communications at target organizations throughout the second half of 2024 and…
-
ToddyCat APT Targeting Internal Employee Communications at Organizations
Advanced persistent threat actors continue to develop sophisticated techniques for compromising corporate communications, with the ToddyCat APT group demonstrating remarkable evolution in their operational capabilities. Recent research from Kaspersky reveals how this highly organized espionage group has refined methods for covertly accessing internal employee communications at target organizations throughout the second half of 2024 and…
-
ToddyCat APT Targeting Internal Employee Communications at Organizations
Advanced persistent threat actors continue to develop sophisticated techniques for compromising corporate communications, with the ToddyCat APT group demonstrating remarkable evolution in their operational capabilities. Recent research from Kaspersky reveals how this highly organized espionage group has refined methods for covertly accessing internal employee communications at target organizations throughout the second half of 2024 and…
-
FCC reversal removes federal cyber safeguards targeting telecom weaknesses post-Salt Typhoon attacks
Tags: access, at&t, attack, breach, ceo, china, communications, control, country, cyber, cyberattack, cybersecurity, exploit, government, group, hacker, intelligence, law, mobile, network, phone, router, threatSalt Typhoon still reverberating: Salt Typhoon impacted major carriers including AT&T, Charter Communications, Consolidated Communications, Lumen Technologies, T-Mobile, Verizon, and Windstream. But law enforcement and intelligence agencies caution that its impact is far more widespread, exposing at least 200 US organizations, plus entities in 80 other countries.According to federal investigations, the attack allowed the Chinese…
-
How to turn threat intel into real security wins
Tags: access, api, attack, automation, awareness, business, ciso, cloud, communications, control, credentials, csf, data, data-breach, detection, dns, edr, email, endpoint, exploit, finance, framework, governance, guide, identity, intelligence, lessons-learned, mail, malware, mitre, nist, phishing, ransomware, resilience, risk, saas, siem, soar, soc, switch, tactics, theft, threat, tool, update, vulnerabilityThe CISO mandate: Risk, efficiency, investment, response: Reduce operational risk and financial loss Intelligence-led detection and response aim to prevent or minimise data loss and business disruption. The downstream effects, smaller blast radii, fewer regulatory headaches and lower recovery bills, are what boards recognise. Maximise staff efficiency Manual validation and correlation drive alert fatigue. Automating…
-
Recognizing and responding to cyber threats: What differentiates NDR, EDR and XDR
Tags: access, attack, automation, breach, cloud, communications, computer, cyber, cybersecurity, data, data-breach, defense, detection, edr, endpoint, firewall, intelligence, iot, malware, microsoft, monitoring, network, siem, software, sql, strategy, technology, threat, tool, windowsEDR identifies noticeable changes at the endpoint EDR, the oldest of the three detection technologies, monitors endpoints to mitigate attacks on them. Endpoints are network devices such as PCs, file servers, smartphones and IoT devices that connect to the network to communicate. A software agent is used to inventory EDR malware and suspicious activity detected…
-
Recognizing and responding to cyber threats: What differentiates NDR, EDR and XDR
Tags: access, attack, automation, breach, cloud, communications, computer, cyber, cybersecurity, data, data-breach, defense, detection, edr, endpoint, firewall, intelligence, iot, malware, microsoft, monitoring, network, siem, software, sql, strategy, technology, threat, tool, windowsEDR identifies noticeable changes at the endpoint EDR, the oldest of the three detection technologies, monitors endpoints to mitigate attacks on them. Endpoints are network devices such as PCs, file servers, smartphones and IoT devices that connect to the network to communicate. A software agent is used to inventory EDR malware and suspicious activity detected…
-
FCC rolls back cybersecurity rules for telcos, despite state-hacking risks
The Federal Communications Commission (FCC) has rolled back a previous ruling that required U.S. telecom carriers to implement stricter cybersecurity measures following the massive hack from the Chinese threat group known as Salt Typhoon. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fcc-rolls-back-cybersecurity-rules-for-telcos-despite-state-hacking-risks/
-
How to turn threat intel into real security wins
Tags: access, api, attack, automation, awareness, business, ciso, cloud, communications, control, credentials, csf, data, data-breach, detection, dns, edr, email, endpoint, exploit, finance, framework, governance, guide, identity, intelligence, lessons-learned, mail, malware, mitre, nist, phishing, ransomware, resilience, risk, saas, siem, soar, soc, switch, tactics, theft, threat, tool, update, vulnerabilityThe CISO mandate: Risk, efficiency, investment, response: Reduce operational risk and financial loss Intelligence-led detection and response aim to prevent or minimise data loss and business disruption. The downstream effects, smaller blast radii, fewer regulatory headaches and lower recovery bills, are what boards recognise. Maximise staff efficiency Manual validation and correlation drive alert fatigue. Automating…
-
$5M Settlement in Geisinger Health, Nuance Insider Breach
Class Action Litigation and Criminal Case Focus on Actions of an Ex-Tech Worker. A federal court has granted preliminary approval of a $5 million settlement in class action litigation filed against Pennsylvania-based Geisinger Health and Nuance Communications – now part of Microsoft – involving a 2023 insider data breach affecting more than 1 million Geisinger…
-
Sturnus: New Android banking trojan targets WhatsApp, Telegram, and Signal
The Android trojan Sturnus targets communications from secure messaging apps like WhatsApp, Telegram and Signal. Sturnus is a new Android banking trojan with full device-takeover abilities. It bypasses encrypted messaging by capturing on-screen content and can steal banking credentials, remotely control the device, and hide fraudulent actions from the user. ThreatFabric analysis shows Sturnus malware…
-
Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework
Cyble and the Botswana Communications Regulatory Authority (BOCRA) have announced a strategic Memorandum of Understanding (MoU). The Cyble and BOCRA MoU is designed to provide stronger defenses, improved detection capabilities, and faster incident response for critical sectors across Botswana. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/cyble-bocra-mou-botswana-cybersecurity/
-
What defines a smart approach to Non-Human Identity management
Why Are Non-Human Identities Crucial to Cloud Security? Where cloud technologies dominate operations across industries, how can organizations ensure robust security and optimal efficiency? A strategic approach to Non-Human Identity (NHI) management provides the answer. These machine identities, vital in cybersecurity frameworks, serve as the backbone for secure communications and data exchanges. NHIs, encompassing machine……
-
The Countdown to Q-Day
Quantum Advances Are Outpacing Global Readiness, Cybersecurity Leaders Warn. While quantum computing promises advances in fields such as healthcare and financial modeling, cybersecurity experts say Q-Day also poses a fundamental risk to the cryptographic standards that secure communications, digital signatures and transactions worldwide. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/countdown-to-q-day-a-30048
-
Lumma Stealer Leverages Browser Fingerprinting for Data Theft and Stealthy C2 Communications
Following the doxxing of Lumma Stealer’s alleged core members last month, the notorious infostealer initially experienced a significant decline in activity as customers migrated to rival platforms like Vidar and StealC. However, recent telemetry data reveals a concerning resurgence of Lumma Stealer operations beginning the week of October 20, 2025, accompanied by sophisticated new capabilities…
-
Lazarus Group Deploys Weaponized Documents Against Aerospace Defense
Security researchers at ENKI have uncovered a sophisticated espionage campaign targeting aerospace and defense organizations, in which the Lazarus Group is weaponizing a new variant of the Comebacker backdoor to infiltrate high-value targets. The threat actor has been actively conducting phishing operations since at least March 2025, distributing malicious documents disguised as legitimate communications from…
-
Crypto-less Crypto Investment Scams: A California Case
Tags: access, apt, blockchain, breach, business, china, communications, control, crime, crypto, cybercrime, data, email, finance, group, intelligence, international, jobs, network, office, organized, scam, theft, tool, usaMy readers will know by now that I am addicted to PACER – the Public Access to Court Electronic Records. When I see headlines like this one, I am compelled to dive in and read every publicly released document related to the case. USAO Central California The headline last month was that Shengsheng He, a…

