Today’s adversaries have long been accelerating and evolving their operations. Now they are developing a business-like structure, refining and scaling their successful strategies, and exploring new technologies to cultivate a more efficient approach to cyberattacks. 2024 was the year of the enterprising adversary. The CrowdStrike Global Threat Report delivers critical … [Read more...] about CrowdStrike 2025 Global Threat Report: Beware the Enterprising Adversary
Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations
Feb 27, 2025Ravie LakshmananMalware / Threat Intelligence A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 as part of phishing emails masquerading as the country's National Taxation Bureau. The campaign, detected last month by Fortinet FortiGuard Labs, marks a departure from previous attack chains that have leveraged malicious game-related … [Read more...] about Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations
CrowdStrike Extends Real-Time Protection for Entra ID
CrowdStrike is excited to announce the general availability of CrowdStrike Falcon® Identity Protection for Microsoft Entra ID, unifying prevention, detection and response to identity-based attacks across hybrid environments. This builds on our existing protection for leading cloud-based identity providers, on-premises Active Directory, and SaaS applications. Threat actors … [Read more...] about CrowdStrike Extends Real-Time Protection for Entra ID
CrowdStrike Expands Support to Oracle Cloud Infrastructure
CrowdStrike is thrilled to announce a collaboration with Oracle that will bring the unified, AI-powered protection of CrowdStrike Falcon® Cloud Security support to Oracle Cloud Infrastructure (OCI). As OCI has become a strategic choice for organizations seeking enterprise-grade performance and security, this expansion improves the visibility and protection to defend against … [Read more...] about CrowdStrike Expands Support to Oracle Cloud Infrastructure
Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites
A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts across hundreds of websites with the goal of manipulating search results and fueling a spam ads campaign at scale. Security researcher Oleg Zaytsev, in a report shared with The Hacker News, said the campaign – dubbed 360XSS – affected over … [Read more...] about Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites
CrowdStrike & Intel Partner with MITRE for Hardware-Enabled Defense
CrowdStrike and Intel Corp. were key research sponsors and participants in the latest project from the MITRE Center for Threat-Informed DefenseThe PC Security Stack Mappings — Hardware-Enabled Defense initiative mapped Intel vPro® Security features, including Intel®Threat Detection Technology (Intel® TDT), to MITRE ATT&CK® adversarial behaviorsWith the CrowdStrike Falcon® … [Read more...] about CrowdStrike & Intel Partner with MITRE for Hardware-Enabled Defense
AI Threat Intelligence Roundup: February 2025
At Cisco, AI threat research is fundamental to informing the ways we evaluate and protect models. In a space that is dynamic and rapidly evolving, these efforts help ensure that our customers are protected against emerging vulnerabilities and adversarial techniques. This regular threat roundup shares useful highlights and critical intelligence from third-party threat … [Read more...] about AI Threat Intelligence Roundup: February 2025
LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram. LightSpy is the name given to a modular spyware that's capable of infecting both Windows and Apple systems with an aim to harvest data. It was first … [Read more...] about LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
Malicious code in fake GitHub repositories
Can you imagine a world where, every time you wanted to go somewhere, you had to reinvent the wheel and build a bicycle from scratch? We can’t either. Why reinvent something that already exists and works perfectly well? The same logic applies to programming: developers face routine tasks every day, and instead of inventing their own wheels and bicycles (which might even be not … [Read more...] about Malicious code in fake GitHub repositories
New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer
Feb 24, 2025Ravie LakshmananEndpoint Security / Vulnerability Cybersecurity researchers are warning of a new campaign that leverages cracked versions of software as a lure to distribute information stealers like Lumma and ACR Stealer. The AhnLab Security Intelligence Center (ASEC) said it has observed a spike in the distribution volume of ACR Stealer since January 2025. A … [Read more...] about New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer