Remove tag threat-horizons
article thumbnail

Attackers use Google Calendar RAT to abuse Calendar service as C2 infrastructure

Security Affairs

Google warns of multiple threat actors that are leveraging its Calendar service as a command-and-control (C2) infrastructure. Google warns of multiple threat actors sharing a public proof-of-concept (PoC) exploit, named Google Calendar RAT, that relies on Calendar service to host command-and-control (C2) infrastructure.

article thumbnail

China-linked APT41 group spotted using open-source red teaming tool GC2

Security Affairs

Google Threat Analysis Group (TAG) team reported that the China-linked APT41 group used the open-source red teaming tool Google Command and Control ( GC2 ) in an attack against an unnamed Taiwanese media organization. ” reads the Threat Horizons April 2023 Threat Horizons Report published by Google.”The

Media 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korea-linked Zinc group posed as Samsung recruiters to target security firms

Security Affairs

North Korea-linked threat actors posed as Samsung recruiters in a spear-phishing campaign aimed at employees at South Korean security firms. North Korea-linked APT group posed as Samsung recruiters is a spear-phishing campaign that targeted South Korean security companies that sell anti-malware solutions, Google TAG researchers reported.

Malware 129
article thumbnail

Security Affairs newsletter Round 371 by Pierluigi Paganini

Security Affairs

Oracle spent 6 months to fix ‘Mega’ flaws in the Fusion Middleware Multiple malicious packages in PyPI repository found stealing AWS secrets Attackers exploited a zero-day in Mitel VOIP devices to compromise a network Threat actors continue to exploit Log4Shell in VMware Horizon Systems Vulnerabilities in the Jacuzzi SmartTub app could allow to access (..)

article thumbnail

Security Affairs newsletter Round 416 by Pierluigi Paganini – International edition

Security Affairs

Abandoned Eval PHP WordPress plugin abused to backdoor websites CISA adds MinIO, PaperCut, and Chrome bugs to its Known Exploited Vulnerabilities catalog At least 2 critical infrastructure orgs breached by North Korea-linked hackers behind 3CX attack American Bar Association (ABA) suffered a data breach,1.4

Spyware 79
article thumbnail

Are You Paying for Crytpominers to Use Your Cloud?

SecureWorld News

In cybersecurity, threats are like mosquitoes on a humid August evening. For end users, threat intelligence is key to improving the configuration of environments and defenses. Which is something Google is hoping to help make easier with its new Threat Horizons report. So how are malicious threat actors gaining access?

article thumbnail

Data Loss Prevention: Best Practices for Secure Data Management

Centraleyes

However, the evolving threat landscape necessitates a shift toward more comprehensive data loss prevention methods considering data in various states—whether at rest, in motion, or in use. Regular assessments and adjustments based on emerging threat landscapes contribute to the longevity of the DLP framework.