Silicon Angle
DHS releases analysis of ELECTRICFISH malware
Infosecurity Magazine
“This type of connection, using a custom protocol instead of existing protocols like HTTP, is what we refer to as hidden tunnels and is used for command and control of remote systems, as well as for data exfiltration,” said Chris Morales, head of security analytics at Vectra.
US Issues Warning Over Recent Cyberattacks Targeting Cloud Services
Silicon Angle
Google: Attacker ‘Likely’ Had Access to Android Zero-Day Vulnerabilities
SC Magazine
CISA: Hackers Bypassed MFA to Access Cloud Service Accounts
Security Magazine