
Nick Biasini
1.2K posts

Nick Biasini
@infosec_nick
Head of Outreach at Cisco Talos. These are my views not my employers. @[email protected]





The #Turla APT is back with a new backdoor, very similar to its previous "TinyTurla" tool. Read more about what this Russian state-sponsored actor is up to now cs.co/6018Vf8ls

"There is almost zero data being shared across the industry on this particular threat, and that is a massive problem," @TalosSecurity @infosec_nick said. The #spyware business is booming despite government crackdowns theregister.com/2024/02/07/spy… via @theregister



🔥NEW podcast advisory: @TalosSecurity researcher Nick Biasini on the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers @infosec_nick securityconversations.com/episode/cisco-…

We're releasing details of a threat actor called #AridViper targeting users in the #MiddleEast with #spyware. Although it is likely based out of Gaza, Talos has no evidence indicating or refuting this campaign is related in any way to the Israel-Hamas war. cs.co/6017uYU33

Talos assesses with high confidence that the #YoroTrooper threat actor likely consists of individuals from Kazakhstan. But that hasn't stopped them from covering their tracks and disguising their origins. More on this threat actor in our latest blog cs.co/6015u51At



#NorthKorea's Lazarus Group is back again, this time with two new remote access trojans. The attacker continues to use the same infrastructure, but is changing up their eventual payloads. More here: cs.co/6018PoxLp

Planning your visit to #BHUSA? 🎩 📆 Don't miss our session on August 9 at 11:30am PT with VP, AJ Shipley and @TalosSecurity's @infosec_nick to learn more about how #XDR offers a solution that can provide an advantage! 💻 Register here: cs.co/6019PVpB7 @BlackHatEvents




We recently saw threat actors exploiting a #Windows policy loophole that allows the signing and loading of cross-signed kernel-mode drivers with older signature timestamps. #Microsoft just released an advisory on this activity, but more on our blog here: cs.co/6011PzaVd

Adversaries are increasingly using compromised third-party accounts to infiltrate the software supply chain. We have more on this threat and the trends around vendor account compromise over on the Talos blog cs.co/6010Oa0Gg





We have new details on a #spyware tool called #Predator that's actively being sold and used to unknowingly track targeted users. Here's the full technical breakdown of how this tool works and why the use of "mercenary" spyware is on the rise cs.co/6016OWk3A