Tag: intelligence
-
TA397 Hackers Exploits Scheduled Tasks to Deploy Malware on Targeted Systems
A recent in-depth analysis by Proofpoint Threat Research has shed light on the sophisticated operations of TA397, also known as Bitter, a suspected state-backed threat actor highly likely aligned with Indian intelligence interests. Identified as an espionage-focused group, TA397 has been actively targeting entities across Europe and Asia, particularly those with connections to China, Pakistan,…
-
UNC6040 APT Hackers Steals Salesforce data Without Exploit Any Vulnerabilities
Tags: apt, cyber, cyberattack, data, exploit, google, group, hacker, intelligence, phishing, software, threat, vulnerabilityThe financially motivated threat cluster UNC6040, tracked by Google Threat Intelligence Group (GTIG), has been orchestrating a series of voice phishing (vishing) campaigns specifically aimed at compromising Salesforce environments of multinational corporations. Unlike traditional cyberattacks that leverage software vulnerabilities, UNC6040 relies entirely on manipulating human behavior, impersonating IT support personnel to deceive employees predominantly in…
-
Investigatory powers: Guidelines for police and spies could also help businesses with AI
Computer Weekly talks to Duffy Calder, technology advisor to the UK’s investigatory powers commissioner, about privacy, intrusion and artificial intelligence First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366625073/Investigatory-powers-Guidelines-for-police-and-spies-could-also-help-businesses-with-AI
-
When AI Turns Against Us FireTail Blog
Jun 04, 2025 – Lina Romero – Artificial Intelligence is the biggest development in tech of the 21st century. But although AI is continuing to develop at a breakneck pace, many of us still don’t understand all the risks and implications for cybersecurity. And this issue is only growing more complicated and critical. Now more…
-
Ukraine’s military intelligence agency stole 4.4GB of highly classified internal data from Tupolev
Ukraine’s GUR hacked the Russian aerospace and defense company Tupolev, stealing 4.4GB of highly classified internal data. Ukraine’s military intelligence agency GUR (aka HUR) claims the hack of the Russian aerospace and defense company Tupolev. According to Kyiv Post, Ukraine’s Military Intelligence compromised the United Aircraft Company (UAC) Tupolev division, which is a key developer…
-
Microsoft Launches Free Security Program for European Governments
Tags: ai, china, cyber, cybersecurity, government, intelligence, microsoft, ransomware, russia, threatMicrosoft is offering European countries a new cybersecurity program for free to help them defend against threats from nation-states like China and Russia, ransomware gangs, and AI-powered cyber threats through greater intelligence sharing, investments, and partnerships. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/microsoft-launches-free-security-program-for-european-governments/
-
Ukraine claims it hacked Tupolev, Russia’s strategic warplane maker
The Main Intelligence Directorate (GUR) of Ukraine’s Ministry of Defense claims it hacked the Russian aerospace and defense company Tupolev, which develops Russia’s supersonic strategic bombers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ukraine-claims-it-hacked-tupolev-russias-strategic-warplane-maker/
-
Microsoft outlines three-pronged European cyber strategy
Microsoft chair Brad Smith outlines an expansive cyber programme targeting governments across Europe with enhanced threat intelligence and support First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366625190/Microsoft-outlines-three-pronged-European-cyber-strategy
-
Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App
Google has disclosed details of a financially motivated threat cluster that it said “specialises” in voice phishing (aka vishing) campaigns designed to breach organizations’ Salesforce instances for large-scale data theft and subsequent extortion.The tech giant’s threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with First…
-
Ukraine’s military intelligence claims cyberattack on Russian strategic bomber maker
Ukraine said it hacked into the internal systems of Russia’s state-owned aircraft manufacturer Tupolev, days after Ukraine launched a drone offensive that damaged planes made by company. First seen on therecord.media Jump to article: therecord.media/ukraine-military-russia-strategic-bomber
-
New Crocodilus Malware Grants Full Control Over Android Devices
The Mobile Threat Intelligence (MTI) team identified a formidable new player in the mobile malware landscape: Crocodilus, an Android banking Trojan designed for device takeover. Initially observed in test campaigns with limited live instances, this malware has rapidly evolved, demonstrating a surge in active campaigns and sophisticated development. A Rising Threat in the Android Ecosystem…
-
Cybersecurity’s ‘rare earth’ skills: Scarce, high-value, and critical for future defense
Tags: ai, attack, business, ciso, computing, crypto, cryptography, cyber, cybersecurity, data, defense, detection, intelligence, jobs, programming, risk, skills, strategy, supply-chain, technology, threat, trainingAdvanced threat hunting expertise Like the rarest elements, professionals who can proactively identify novel threats and adversary techniques before they cause damage are scarce and extremely valuable. Why are these skills rare? Many factors have led to this scenario:Complex skill requirements: Effective threat hunters need a unique combination of skills, including deep cyber knowledge, programming…
-
One hacker, many names: Industry collaboration aims to fix cyber threat label chaos
Tags: advisory, attack, blizzard, china, corporate, country, crowdstrike, cyber, cybersecurity, group, guide, hacker, india, intelligence, international, microsoft, risk, russia, threatBuilding a translation guide, not a standard: The collaboration is analyst-driven, focusing on harmonizing known adversary profiles through direct cooperation between the companies’ threat research teams. Already, the effort has led to alignment on more than 80 threat actors, confirming connections that had previously been uncertain.The companies describe their effort as creating a “Rosetta Stone”…
-
Zscaler Unveils AI And Security Updates: Five Things To Know
Zscaler announced new capabilities for protecting the use of AI, as well as around AI-powered application management and network intelligence, in connection with its 2025 Zenith Live conference. First seen on crn.com Jump to article: www.crn.com/news/security/2025/zscaler-unveils-ai-and-security-updates-five-things-to-know
-
ThreatPlattformen ein Kaufratgeber
Tags: ai, attack, automation, breach, cisa, cloud, crowdstrike, cyber, cyberattack, dark-web, deep-fake, dns, edr, exploit, finance, firewall, gartner, identity, incident response, intelligence, mail, malware, monitoring, network, open-source, phishing, risk, siem, soar, soc, threat, tool, vulnerability, zero-dayThreat-Intelligence-Plattformen erleichtern es, Bedrohungen zu durchdringen und wirksame Abwehrmaßnahmen zu ergreifen.Der erste Schritt zu einem soliden Enterprise-Security-Programm besteht darin, eine geeignete Threat-Intelligence-Plattform (TIP) auszuwählen. Fehlt eine solche Plattform, haben die meisten Security-Teams keine Möglichkeit, Tool-Komponenten miteinander zu integrieren und angemessene Taktiken und Prozesse zu entwickeln, um Netzwerke, Server, Applikationen und Endpunkte abzusichern. Aktuelle Bedrohungstrends machen…
-
Qualcomm Fixes Three Adreno GPU Flaws Abused in Android Attacks
Qualcomm issued patches for three zero-day vulnerabilities in its Adreno GPUs that Google threat intelligence researchers said were being exploited in “limited, targeted” attacks against Android devices. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/qualcomm-fixes-three-adreno-gpu-flaws-abused-in-android-attacks/
-
Survey Surfaces Rise on Cyberattacks Fueled by AI
An annual survey of 1,021 cybersecurity and IT professionals finds the number of breaches increased 17% in the past year, with well over half (58%) now seeing a surge in ransomware attacks that appear to have been created using artificial intelligence (AI). Conducted by the market research firm Vitreous World on behalf of Gigamon, a..…
-
Sysdig Reveals Discovery of Cyberattack Aimed at Tool to Build AI Apps
Sysdig today disclosed an example of how a tool for training artificial intelligence (AI) models was compromised by a cyberattack that led to the injection of malicious code and the downloading of cryptominers. The Sysdig Threat Research Team (TRT) discovered an attack aimed at a misconfigured instance of Open WebUI, a tool widely used by..…
-
BKA enthüllt Identität von Trickbot-Anführer
Tags: cybercrime, germany, hacker, infrastructure, intelligence, international, leak, malware, ransomware, tool, ukraine, usaInternational gesucht: Hacker-Boss soll sich in Russland verstecken Hinweise erbeten.Der Anführer der berüchtigten russischen Cybercrime-Gruppe Trickbot, die seit mindestens 2016 weltweit massive Schäden anrichtet, wurde enttarnt: Vitalii Nikolaevich Kovalev, auch bekannt unter dem Pseudonym ‘Stern”, soll der Kopf der Bande sein, die auch unter dem Namen Wizard Spider bekannt ist.Verantwortlich für die Enthüllung ist das…
-
Ransomware-Bande erpresst Volkswagen
Tags: access, authentication, cyberattack, dark-web, data, extortion, germany, group, hacker, intelligence, ransomware, threatIm Darknet ist ein Hinweis auf einen Datendiebstahl bei der Volkswagen Gruppe aufgetaucht.Die Volkswagen Gruppe mit Sitz in Wolfsburg zählt weltweit zu den größten Autokonzernen und ist damit ein attraktives Ziel für Cyberkriminelle. Die Ransomware-Bande Stormous veröffentlichte kürzlich einen Darknet-Post mit angeblich geleakten Volkswagen-Daten. Wie die Threat-Intelligence-Experten von FalconFeeds berichten, soll es sich dabei unter…
-
Infosecurity 2025: NCA cyber intelligence head spells out trends
Will Lyne, head of cyber intelligence at the National Crime Agency, sketches out cyber criminal trends as ransomware and other attack varieties become democratised beyond Russophone, skilled software developers First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366625059/Infosecurity-2025-NCA-cyber-intelligence-head-spells-out-trends
-
How Artificial Intelligence Phishing Detection Is Reshaping K12 Email Protection
Using Artificial Intelligence Phishing Detection to Outsmart Today’s Email Threats in K12 Phishing emails are no longer riddled with spelling mistakes and shady links. Today’s threats are socially engineered, personalized, and increasingly difficult to detect”, especially in school environments where staff and students rely heavily on email for daily communication. But there’s good news: artificial…
-
How Artificial Intelligence Phishing Detection Is Reshaping K12 Email Protection
Using Artificial Intelligence Phishing Detection to Outsmart Today’s Email Threats in K12 Phishing emails are no longer riddled with spelling mistakes and shady links. Today’s threats are socially engineered, personalized, and increasingly difficult to detect”, especially in school environments where staff and students rely heavily on email for daily communication. But there’s good news: artificial…
-
US intelligence employee arrested for alleged double-dealing of classified info
The 28-year-old, who’d been employed by the Defense Intelligence Agency since 2019, specialized in insider threats and had top secret security clearance, officials said. First seen on cyberscoop.com Jump to article: cyberscoop.com/dia-employee-arrested-nathan-vilas-laatsch/
-
Preview: Hot Sessions at Infosecurity Europe 2025 in London
Ransomware, Quantum Computing, Geopolitics, GenAI and More on the Agenda Infosecurity Europe is set to return June 3 to London. Hot topics at this year’s event include everything from quantum computing, geopolitics and artificial intelligence, to supply chain attacks, insider threats and the cybercrime juggernaut that continues to be ransomware. First seen on govinfosecurity.com Jump…
-
DeepSeek Upgrade Edges Model Closer to AI’s Frontline
New Open-Source Model Rivals OpenAI, While Treading Beijing’s Red Line. Artificial intelligence startup DeepSeek released Thursday an updated version of its flagship reasoning model months after its Chinese origin sent shockwaves through industry. The model is a glimpse into high-performance systems being trained and deployed under norms governed by Beijing. First seen on govinfosecurity.com Jump…

