Kaspersky researchers have discovered new variants of the Eagerbee backdoor targeting ISPs and government entities in the Middle East. New attack components include a service injector for backdoor deployment and plugins for payload delivery, system access, and remote control. The malware gathers system information and supports SSL/TLS protocols. The orchestrator injects itself and sends commands to execute via plugins. It is linked with medium confidence to the CoughingDown threat group.

News – Masimo reports cyber incident affecting production sites – teiss
Masimo has reported a cyber incident that has impacted its production sites. The company is currently assessing the situation to understand the extent of the