From Ford data security speculation to the VisionDirect data breach, the Threatpost editors talk about this week’s biggest stories.
The Russian-speaking threat group is changing up its tactics.
The modular malware seems to be in a testing phase, but TA505’s interest made researchers take note.
Microsoft’s November Patch Tuesday fixes include mitigation against a zero-day vulnerability leaving Windows 7, Server 2008 and Server 2008 R2 open to attack.
The critical vulnerability, which was patched earlier in September, has put ColdFusion servers at risk.
Two samples have already been added to the malware zoo, indicating a new openness from the federal government when it comes to cyber.
After being exposed, the APT made minor adjustments in their tactics to stay off the security radar.
A custom malware used in a five-pronged APT espionage campaign was largely built from the defunct Comment Crew’s proprietary code.
Evidence shows that three of the most destructive incidents seen in modern cyber-history are the work of one APT.
This is the second local privilege-escalation zero-day this APT group has exploited.