Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud



Designed for long-term access, the framework targets cloud and container environments with loaders, implants, and rootkits.
The post VoidLink Linux Malware Framework Targets Cloud Environments appeared first on SecurityWeek.
Amid continued trade and geopolitical volatility between Europe and the US, Amazon Web Services is making its European Sovereign Cloud generally available today and plans to expand so-called Local Zones.β¦
Only a dozen new advisories have been published this Patch Tuesday by industrial giants.Β
The post ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Aveva, Phoenix Contact appeared first on SecurityWeek.

Hackers stole the personal and reservation information of people with a Eurail pass and those who made a seat reservation with the company.
The post Traveler Information Stolen in Eurail Data Breach appeared first on SecurityWeek.
From a quintuple-encryption ransomware attack to zany dark web schemes and AI fails, Sophos X-Ops looks back at some of our favorite weirdest incidents from the last few years β and the serious lessons behind them
Categories: Threat Research
Tags: Ransomware, Hive, Lockbit, BlackCat, LLM, AI, Money Laundering
Categories: Products & Services
Tags: Ransomware, Enterprise, Solutions, The State of Ransomware
Categories: Sophos Insights
Tags: Year in Review, security news
Categories: Sophos Insights
Tags: Sophos, Year in Review
Categories: Sophos Insights
Tags: Firewall, Ransomware
The fake human verification process led to infostealer and ransomware infections
Categories: Threat Research
Tags: clickfix, Featured, GOLD FEATHER, human verification, infostealer, qilin, Ransomware, StealC
Winter is coming β so it must be time for Sophos X-Opsβ report on this yearβs MITRE ATT&CK Enterprise Evaluations
Categories: Threat Research
Tags: ATT&CK, Emulation, Featured, MITRE, MUSTANG PANDA, scattered spider, Sophos X-Ops
The availability of exploit code will likely lead to more widespread opportunistic attacks
Tags: Threat Research, Featured, vulnerability, react2shell
A month with no Critical-severity Windows bugs is overshadowed by a mass of Mariner mop-up
Categories: X-ops
Tags: threat research, featured, Microsoft, Patch Tuesday, zero days
A brand-new Linux malware named VoidLink targets victims' cloud infrastructure with more than 30 plugins that allow attackers to perform a range of illicit activities, from silent reconnaissance and credential theft to lateral movement and container abuse.Β β¦
Researchers have demonstrated remotely controlling a wheelchair over Bluetooth. CISA has issued an advisory.
CISA said the WHILL wheelchairs did not enforce authentication for Bluetooth connections, allowing an attacker who is in Bluetooth range of the targeted device to pair with it. The attacker could then control the wheelchairβs movements, override speed restrictions, and manipulate configuration profiles, all without requiring credentials or user interaction.

The developer security company has raised a total of more than $84 million in funding.
The post Aikido Security Raises $60 Million at $1 Billion Valuation appeared first on SecurityWeek.
A judge has ruled that the plaintiffs failed to demonstrate intent to defraud investors.Β
The post Investor Lawsuit Over CrowdStrike Outage Dismissed appeared first on SecurityWeek.