Showing only posts by Jessica Lyons. Show all posts.

T-Mobile US CSO: Spies jumped from one telco to another in a way 'I've not seen in my career'

Source

Security chief talks to El Reg as Feds urge everyone to use encrypted chat interview While Chinese-government-backed spies maintained access to US telecommunications providers' networks for months – and in some cases still haven't been booted out – T-Mobile US thwarted successful attacks on its systems "within a single-digit number of …

Salt Typhoon's surge extends far beyond US telcos

Source

Plus, a brand-new backdoor, GhostSpider, is linked to the cyber spy crew's operations The reach of the China-linked Salt Typhoon gang extends beyond telecommunications giants in the United States, and its arsenal includes several backdoors – including a brand-new malware dubbed GhostSpider – according to Trend Micro researchers.... [...]

T-Mobile US takes a victory lap after stopping cyberattacks: 'Other providers may be seeing different outcomes'

Source

Funny what putting more effort and resources into IT security can do Attackers - possibly China's Salt Typhoon cyber-espionage crew - compromised an unnamed wireline provider's network and used this access to try to break into T-Mobile US systems multiple times over the past few weeks, according to its Chief Security …

1,000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole

Source

PAN-PAN! Intruders inject web shell backdoors, crypto-coin miners, more Updated Thousands of Palo Alto Networks firewalls were compromised by attackers exploiting two recently patched security bugs. The intruders were able to deploy web-accessible backdoors to remotely control the equipment as well as cryptocurrency miners and other malware.... [...]

Here's what happens if you don't layer network security – or remove unused web shells

Source

TL;DR: Attackers will break in and pwn you, as a US government red team demonstrated The US Cybersecurity and Infrastructure Agency often breaks into critical organizations' networks – with their permission, of course – to simulate real-world cyber attacks and thereby help improve their security. In one of those recent …

« newer articles | page 6 | older articles »