home.social

#midnightblizzard — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #midnightblizzard, aggregated by home.social.

  1. Russian hacker group Cozy Bear (aka #MidnightBlizzard, APT29) is back, using wine-tasting invites to phish EU diplomats. The bait? A new wave of WineLoader malware. 🍷🎣

    Read: hackread.com/cozy-bear-wine-lu

    #CyberSecurity #APT29 #WineLoader #Russia #EU

  2. Russian hacker group Cozy Bear (aka , APT29) is back, using wine-tasting invites to phish EU diplomats. The bait? A new wave of WineLoader malware. 🍷🎣

    Read: hackread.com/cozy-bear-wine-lu

  3. Russian hacker group Cozy Bear (aka #MidnightBlizzard, APT29) is back, using wine-tasting invites to phish EU diplomats. The bait? A new wave of WineLoader malware. 🍷🎣

    Read: hackread.com/cozy-bear-wine-lu

    #CyberSecurity #APT29 #WineLoader #Russia #EU

  4. Russian hacker group Cozy Bear (aka #MidnightBlizzard, APT29) is back, using wine-tasting invites to phish EU diplomats. The bait? A new wave of WineLoader malware. 🍷🎣

    Read: hackread.com/cozy-bear-wine-lu

    #CyberSecurity #APT29 #WineLoader #Russia #EU

  5. Russian hacker group Cozy Bear (aka #MidnightBlizzard, APT29) is back, using wine-tasting invites to phish EU diplomats. The bait? A new wave of WineLoader malware. 🍷🎣

    Read: hackread.com/cozy-bear-wine-lu

    #CyberSecurity #APT29 #WineLoader #Russia #EU

  6. Microsoft has notified more customers that Russian cybercriminals have stolen their emails in a recent breach. Initially thought to involve only a few executive emails, the breach has now been revealed to affect more customers. The Russian hackers, known as Midnight Blizzard, also accessed sensitive US government data.

    #CyberSecurity #DataBreach #MicrosoftHack #RussianHackers #NationalSecurity #MidnightBlizzard #InfoSec #TechNews #EmailSecurity

  7. 🪆 Microsoft from the 90s is back

    「 Some of these clients had already known they were affected by the breach. Others were hearing it for the first time now that Microsoft has had more time to assess the damage, a sign that the hack has had broader repercussions than initially thought. Microsoft declined to say which customers received notices 」

    bloomberg.com/news/articles/20

    #Microsoft #MidnightBlizzard #Russia #Infosec

  8. Hoppla!

    #Fernwartungssoftware #TeamViewer kompromittiert

    am 27.06.2024 wurde bekannt, dass der Fernwartungs-Anbieter "TeamViewer" am 26.06.2024 Anzeichen für eine Kompromittierung seiner internen IT-Systeme durch einen professionelle Cyber-Angreifer festgestellt hat.  

    Nach aktuellen Informationen könnte es sich bei dem Angreifer um die gleiche Gruppierung handeln, die für einen sogenannten "#Lieferkettenangriff" ein US-amerikanisches Unternehmen im Jahr 2020 verantwortlich gemacht wird. Beim damaligen Angriffs sind über eine #Management-Software des Anbieters tausende Kunden des Anbieters kompromittiert wurden.

    golem.de/news/teamviewer-gehac #Nerdkram #MidnightBlizzard

  9. Microsoft ties executive pay to security following multiple failures and breaches - Enlarge / A PC running Windows 11. (credit: Microsoft)

    It's be... - arstechnica.com/?p=2021673 #midnightblizzard #securitybreach #storm-0558 #microsoft #biz#azure #tech

  10. Splunk provides a detailed analysis of the tactics, techniques, and procedures (TTPs) employed by APT29 in the campaign targeting German political parties with the new WINELOADER backdoor. APT29, aka Midnight Blizzard and Cozy Bear, is publicly attributed to Russian Foreign Intelligence Service (SVR). IOC and Yara rules provided.🔗 splunk.com/en_us/blog/security

    #APT29 #MidnightBlizzard #CozyBear #threatintel #WINELOADER #threatintel #IOC #Russia #cyberespionage

  11. Splunk provides a detailed analysis of the tactics, techniques, and procedures (TTPs) employed by APT29 in the campaign targeting German political parties with the new WINELOADER backdoor. APT29, aka Midnight Blizzard and Cozy Bear, is publicly attributed to Russian Foreign Intelligence Service (SVR). IOC and Yara rules provided.🔗 splunk.com/en_us/blog/security

    #APT29 #MidnightBlizzard #CozyBear #threatintel #WINELOADER #threatintel #IOC #Russia #cyberespionage

  12. Splunk provides a detailed analysis of the tactics, techniques, and procedures (TTPs) employed by APT29 in the campaign targeting German political parties with the new WINELOADER backdoor. APT29, aka Midnight Blizzard and Cozy Bear, is publicly attributed to Russian Foreign Intelligence Service (SVR). IOC and Yara rules provided.🔗 splunk.com/en_us/blog/security

    #APT29 #MidnightBlizzard #CozyBear #threatintel #WINELOADER #threatintel #IOC #Russia #cyberespionage

  13. Splunk provides a detailed analysis of the tactics, techniques, and procedures (TTPs) employed by APT29 in the campaign targeting German political parties with the new WINELOADER backdoor. APT29, aka Midnight Blizzard and Cozy Bear, is publicly attributed to Russian Foreign Intelligence Service (SVR). IOC and Yara rules provided.🔗 splunk.com/en_us/blog/security

    #APT29 #MidnightBlizzard #CozyBear #threatintel #WINELOADER #threatintel #IOC #Russia #cyberespionage

  14. Splunk provides a detailed analysis of the tactics, techniques, and procedures (TTPs) employed by APT29 in the campaign targeting German political parties with the new WINELOADER backdoor. APT29, aka Midnight Blizzard and Cozy Bear, is publicly attributed to Russian Foreign Intelligence Service (SVR). IOC and Yara rules provided.🔗 splunk.com/en_us/blog/security

    #APT29 #MidnightBlizzard #CozyBear #threatintel #WINELOADER #threatintel #IOC #Russia #cyberespionage

  15. Microsoft says Kremlin-backed hackers accessed its source and internal systems - Enlarge (credit: Getty Images)

    Microsoft said that Kremlin-bac... - arstechnica.com/?p=2008953 #midnightblizzard #sourcecode #microsoft #security #biz#apts