Silk Typhoon Targeting IT Supply Chain in Multiple Sectors

Executive Summary Microsoft Threat Intelligence has identified a shift in tactics for Silk Typhoon, a Chinese state-sponsored espionage group, to target remote management tools and cloud applications for initial access. The group has now shifted to exploiting unpatched vulnerabilities in IT infrastructure to elevate privileges and move laterally into cloud environments, enabling data exfiltration and…

Read More

The Evolution of Account Takeover: Why Retail & Hospitality Must Adapt

Account Takeover (ATO) remains a persistent challenge in retail and hospitality, with attackers continuously refining their techniques.  Over the past 18 months, 6.2 million accounts have been compromised – including 55,000 in the last month alone. Despite advancements in security, automated bot-fueled attacks continue to bypass traditional defenses, costing businesses billions in fraud-related losses and…

Read More

FatalRAT Phishing Attacks Target APAC Industries Utilizing Chinese Cloud Services

Executive Summary Kaspersky ICS CERT has identified SalmonSlalom, a sophisticated cyber campaign targeting industrial organizations in the Asia-Pacific (APAC) region. The attack employs a multi-stage payload delivery system, utilizing legitimate Chinese cloud services such as Youdao Cloud Notes and myqcloud for hosting and command-and-control operations. The malware framework delivers FatalRAT, a remote access trojan (RAT),…

Read More

Retail & Hospitality ISAC Appoints Three New Regional Vice Chairs to Support Global Initiatives

VIENNA, VA (February 20, 2025) – The Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) today announced the appointment of three new regional vice chairs to strengthen its global engagement and member support. Marnie Wilking, VP and CSO at Booking.com, will serve as Vice Chair for the European, Middle East, and Africa region. Dave…

Read More

New FrigidStealer Infostealer by New Threat Actors infects Multiple Devices via Compromised Websites

Executive Summary Proofpoint has identified two new cybercriminal threat actors, TA2726 and TA2727, responsible for web inject campaigns that distribute malware through compromised websites, according to a recently published report. TA2726 and TA2727 actors operate traffic distribution services (TDS) to redirect users to fake update lures, leading to the installation of malware on Windows, MacOS, and…

Read More