Russian Group Forest Blizzard Deploying GooseEgg Tool to Exploit CVE-2022-38028
A Russian threat group known as Forest Blizzard has been using a custom tool called GooseEgg to exploit a Windows Print Spooler
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
A Russian threat group known as Forest Blizzard has been using a custom tool called GooseEgg to exploit a Windows Print Spooler
Europol and a collection of UK law enforcement agencies have disrupted the LabHost phishing platform, which targeted victims
The XZ Utils backdoor was a very subtle operation that took several years to pull off, and while some of the technical details are
Mike Hanley, CSO of GitHub, recently joined Dennis Fisher on the Decipher podcast to discuss the White House open source security summit in January, the Log4j response, and the challenges of helping millions of developers secure their projects.
A China-linked threat actor is using a highly sophisticated backdoor called Daxin that implements its own communication protocol and has been deployed against military and critical infrastructure targets.
Mike Hanley, CSO at GitHub and former VP of security at Duo Security, joins Dennis Fisher to talk about the open source security summit at the White House, the Log4j response, and how the tech industry can support the open source community.
U.S. agencies are warning that the Iranian-backed APT group MuddyWater is targeting organizations in many industries in North America and elsewhere.
The Russian Sandworm threat actor has been deploying a new piece of malware called Cyclops Blink, warns CISA and NSA.