admin

admin

Did China Get an Inside Look at ToolShell?

In Brief: ToolShell’s Impact in South Africa and Rise of Online Fraud in the U.S. Anviksha More (AnvikshaMore) • July 31, 2025 Every week, Information Security Media Group compiles notable cybersecurity incidents from around the globe. This week’s report dives…

New Variants of SparrowDoor Backdoor Discovered in Cyberattacks on U.S. and Mexican Organizations

March 26, 2025
Malware / Vulnerability

The Chinese threat actor known as FamousSparrow has been implicated in a cyberattack targeting a U.S. trade group and a research institute in Mexico, leveraging its primary backdoor, SparrowDoor, along with ShadowPad. This activity, observed in July 2024, marks the first deployment of ShadowPad by the group, a malware commonly associated with Chinese state-sponsored attackers. ESET reported that “FamousSparrow introduced two new, undocumented versions of the SparrowDoor backdoor, one of which is modular.” These iterations show significant advancements, including the ability to execute commands in parallel. FamousSparrow was first identified by the Slovak cybersecurity firm in September 2021 during a series of attacks against hotels, governments, engineering firms, and law practices, utilizing the exclusive SparrowDoor implant. Subsequent reports have highlighted the adversarial group’s expanding footprint…

New Variants of SparrowDoor Backdoor Discovered in Cyberattacks on U.S. and Mexican Entities March 26, 2025 A notable cyber incident has linked the Chinese threat actor known as FamousSparrow to an attack on a U.S.-based trade organization and a research…

Data Breach at 2 Law Group Impacts 282,100 Patients

3rd Party Risk Management, Data Breach Notification, Data Security Firm Confirms Ransom Payment for Assurance of Data Deletion Following Cyber Incident Marianne Kolbasuk McGee (HealthInfoSec) • July 30, 2025 Image: Getty Images Two law firms situated in Florida, with additional…

Phishing Campaigns Employ Real-Time Email Validation for More Effective Credential Theft

April 14, 2025
Email Security / Cyber Attack

Cybersecurity experts are highlighting a new credential phishing method designed to ensure stolen information is linked to valid online accounts. Termed “precision-validating phishing” by Cofense, this strategy uses real-time email checks to target a select group of high-value individuals with counterfeit login screens. “This approach significantly increases the success rate for attackers by focusing solely on a curated list of verified email addresses,” the company stated. Unlike traditional “spray-and-pray” tactics that indiscriminately mass-distribute phishing emails, this advanced method elevates spear-phishing by interacting only with confirmed active and legitimate email accounts.

Phishing Campaigns Execute Real-Time Validations to Target High-Value Credentials April 14, 2025 Email Security / Cyber Attack Cybersecurity experts have identified an emerging credential phishing strategy that enhances the likelihood of stealing valid user information linked to legitimate online accounts.…

Why Palo Alto Is Investing $25 Billion in Identity Solutions

Access Management, Agentic AI, Identity & Access Management CyberArk Acquisition Enhances Palo Alto Networks’ Privileged Access Capabilities Michael Novinson (@MichaelNovinson) • July 30, 2025 Nikesh Arora, Chairman and CEO, Palo Alto Networks Nikesh Arora, CEO of Palo Alto Networks, announced…