Protecting Privacy Build Trust

Protecting Privacy Build Trust
  • Contact Us

Uncategorized

on December 17, 2025 at 4:55 pm — UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager 

·       Cisco Talos recently discovered a campaign targeting Cisco AsyncOS Software for Cisco Secure Email Gateway, formerly known as Cisco Email Security Appliance (ESA), and Cisco Secure Email and Web Manager, formerly known as Cisco Content Security Management Appliance (SMA). ·       We assess with moderate confidence that the adversary, who we are tracking as UAT-9686, […]

on December 17, 2025 at 4:55 pm — UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager  Read More »

on August 20, 2025 at 1:00 pm — Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices 

Static Tundra is a Russian state-sponsored cyber espionage group linked to the FSB’s Center 16 unit that has been operating for over a decade, specializing in compromising network devices for long-term intelligence gathering operations. The group actively exploits a seven-year-old vulnerability (CVE-2018-0171), which was patched at the time of the vulnerability publications, in Cisco IOS

on August 20, 2025 at 1:00 pm — Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices  Read More »

on July 21, 2025 at 8:33 pm — ToolShell: Details of CVEs Affecting SharePoint Servers 

Cisco Talos is aware of the ongoing exploitation of CVE-2025-53770 and CVE-2025-53771 in the wild. These are path traversal vulnerabilities affecting SharePoint Server Subscription Edition, SharePoint Server 2016, and SharePoint Server 2019. According to Microsoft, these vulnerabilities do not affect SharePoint Online in Microsoft 365 and only apply to on-premises SharePoint servers.   Microsoft has also

on July 21, 2025 at 8:33 pm — ToolShell: Details of CVEs Affecting SharePoint Servers  Read More »

on July 17, 2025 at 10:00 am — MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities 

In April 2025 Cisco Talos identified a Malware-as-a-Service (MaaS) operation that utilized Amadey to deliver payloads.  The MaaS operators used fake GitHub accounts to host payloads, tools and Amadey plug-ins, likely as an attempt to bypass web filtering and for ease of use.   Several operator tactics, techniques and procedures (TTPs) overlap with a SmokeLoader phishing

on July 17, 2025 at 10:00 am — MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities  Read More »

on June 5, 2025 at 10:00 am — Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine 

Cisco Talos observed a destructive attack on a critical infrastructure entity within Ukraine, using a previously unknown wiper we are calling “PathWiper”.  The attack was instrumented via a legitimate endpoint administration framework, indicating that the attackers likely had access to the administrative console, that was then used to issue malicious commands and deploy PathWiper across

on June 5, 2025 at 10:00 am — Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine  Read More »

on May 22, 2025 at 10:00 am — UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware 

Cisco Talos has observed exploitation of CVE-2025-0994, a remote-code-execution vulnerability in Cityworks, a popular asset management system.   The Cybersecurity and Infrastructure Security Agency (CISA) and Trimble have both released advisories pertaining to this vulnerability, with Trimble’s advisory specifically listing indicators of compromise (IOCs) related to the intrusion exploiting the CVE.   IOCs pertaining to intrusions discovered

on May 22, 2025 at 10:00 am — UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware  Read More »

singapore-cybersecurity-update-puts-cloud-providers-on-notice-–-test

Singapore Cybersecurity Update Puts Cloud Providers on Notice – TEST

Robert Lemos writes: Lawmakers in Singapore updated the nation’s cybersecurity regulations on May 7, giving more power to the agency responsible for enforcing the rules, adopting definitions of computer systems that include cloud infrastructure, and requiring that critical information infrastructure (CII) operators report any cybersecurity incident to the government. The Cyber Security Act amendment takes

Singapore Cybersecurity Update Puts Cloud Providers on Notice – TEST Read More »

sg:-app-managing-student-devices-in-127-schools-hacked;-names-and-e-mail-addresses-leaked:-moe-–-test

Sg: App managing student devices in 127 schools hacked; names and e-mail addresses leaked: MOE – TEST

Lok Jian Wen reports: The names and e-mail addresses of parents and teachers of 127 primary and secondary schools were leaked after a mobile platform on students’ personal learning devices was hacked, said the Ministry of Education (MOE) on April 19. The Mobile Guardian app, which is installed on personal learning devices including Chromebook laptops

Sg: App managing student devices in 127 schools hacked; names and e-mail addresses leaked: MOE – TEST Read More »

911-s5-botnet-dismantled-and-its-administrator-arrested-in-coordinated-international-operation-–-test

911 S5 Botnet Dismantled and Its Administrator Arrested in Coordinated International Operation – TEST

A court-authorized international law enforcement operation led by the U.S. Justice Department disrupted a botnet used to commit cyber attacks, large-scale fraud, child exploitation, harassment, bomb threats, and export violations. As part of this operation, YunHe Wang, 35, a People’s Republic of China national and St. Kitts and Nevis citizen-by-investment, was arrested on May 24

911 S5 Botnet Dismantled and Its Administrator Arrested in Coordinated International Operation – TEST Read More »