mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

593
comptes actifs

#Sophos

0 message0 participant0 message aujourd’hui

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #44/2024 is out!

It includes the following and much more:

➝ Delta Air Lines Sues #CrowdStrike

#Wiz Targeted with #Deepfakes

#ChatGPT Safety Features Bypassed

➝ 15,000 stolen Cloud Service Credentials Found in an #AWS S3 Bucket

#Sophos Surveilled Chinese Hackers for Years;

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

infosec-mashup.santolaria.net/

X’s InfoSec Newsletter · [InfoSec MASHUP] 44/2024Par X’s InfoSec Newsletter

"Now one cybersecurity vendor is revealing how intensely—and for how long—it has battled with one group of hackers that have sought to exploit its products to their own advantage. For more than five years, the UK cybersecurity firm Sophos engaged in a cat-and-mouse game with one loosely connected team of adversaries who targeted its firewalls. The company went so far as to track down and monitor the specific devices on which the hackers were testing their intrusion techniques, surveil the hackers at work, and ultimately trace that focused, years-long exploitation effort to a single network of vulnerability researchers in Chengdu, China.

On Thursday, Sophos chronicled that half-decade-long war with those Chinese hackers in a report that details its escalating tit-for-tat. The company went as far as discreetly installing its own “implants” on the Chinese hackers' Sophos devices to monitor and preempt their attempts at exploiting its firewalls. Sophos researchers even eventually obtained from the hackers' test machines a specimen of “bootkit” malware designed to hide undetectably in the firewalls' low-level code used to boot up the devices, a trick that has never been seen in the wild."

wired.com/story/sophos-chengdu

Suite du fil

In one incident where #Sophos was called in to investigate, the attackers attempted to use an installer with one certificate to unhook our endpoint protection. When that didn't work, they used a different installer signed with a different certificate.

When the threat actors behind the RansomHub #ransomware want to attack a target, they go to some lengths to prevent EDR or endpoint protection software from ruining their day.

The latest blog from #Sophos #XOps investigates how they do that, using a tool we call #EDRKillShifter

news.sophos.com/en-us/edr-kill

Sophos News · Ransomware attackers introduce new EDR killer to their arsenalSophos discovers the threat actors behind RansomHub ransomware using EDRKillShifter in attacks