π΄ Steam Gaming Phish Showcases Browser-in-Browser Threat π΄
π Read
via "Dark Reading".
Attackers are using the recently emerged browser-in-the-browser phishing technique to steal accounts from Valve's popular gaming platform, but it's a warning shot to businesses.π Read
via "Dark Reading".
Dark Reading
Steam Gaming Phish Showcases Browser-in-Browser Threat
Attackers are using the recently emerged browser-in-the-browser phishing technique to steal accounts from Valve's popular gaming platform, but it's a warning shot to businesses.
π1
π OpenSSH 9.1p1 π
π Read
via "Packet Storm Security".
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.π Read
via "Packet Storm Security".
Packetstormsecurity
OpenSSH 9.1p1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ Workforce Data Privacy in the Modern Work Era π΄
π Read
via "Dark Reading".
It takes culture as well as individual and corporate responsibilities to ensure workforce data privacy and compliance.π Read
via "Dark Reading".
Darkreading
Workforce Data Privacy in the Modern Work Era
It takes culture as well as individual and corporate responsibilities to ensure workforce data privacy and compliance.
π΄ Former NSA Employee Faces Death Penalty for Selling Secrets π΄
π Read
via "Dark Reading".
Suspect allegedly thought he was swapping secrets with a foreign government for crypto β but it turned out to be an FBI agent.π Read
via "Dark Reading".
Darkreading
Former NSA Employee Faces Death Penalty for Selling Secrets
Suspect allegedly thought he was swapping secrets with a foreign government for crypto β but the contact turned out to be an FBI agent.
π΄ Aussie Telco Telstra Breached, Reportedly Exposing 30,000 Employees' Data π΄
π Read
via "Dark Reading".
The Telstra cyber incident comes just weeks after its main rival Optus suffered a major compromise of its customer database.π Read
via "Dark Reading".
Darkreading
Aussie Telco Telstra Breached, Reportedly Exposing 30,000 Employees' Data
The Telstra cyber incident comes just weeks after its main rival Optus suffered a major compromise of its customer database.
π΄ Microsoft Updates Mitigation for Exchange Server Zero-Days π΄
π Read
via "Dark Reading".
Researchers had discovered that Microsoft's original mitigation steps for the so-called "ProxyNotShell" flaws was easily bypassed.π Read
via "Dark Reading".
Darkreading
Microsoft Updates Mitigation for Exchange Server Zero-Days
Researchers had discovered that Microsoft's original mitigation steps for the so-called "ProxyNotShell" flaws was easily bypassed.
π΄ Exposure Management? Understanding the Attacker Takes Center Stage π΄
π Read
via "Dark Reading".
Announcing its exposure management platform, Tenable joins other companies in offering ways β such as attack surface management β to look at business networks through the eyes of attackers.π Read
via "Dark Reading".
Darkreading
Exposure Management? Understanding the Attacker Takes Center Stage
Announcing its exposure management platform, Tenable joins other companies in offering ways β such as attack surface management β to look at business networks through the eyes of attackers.
π΄ The Insecurities of Cybersecurity Success π΄
π Read
via "Dark Reading".
Becoming a big wheel doesn't have to cost your happiness, but grind culture makes that likely.π Read
via "Dark Reading".
Darkreading
The Insecurities of Cybersecurity Success
Becoming a big wheel doesn't have to cost your happiness, but grind culture makes that likely.
π΄ RatMilad Spyware Scurries onto Enterprise Android Phones π΄
π Read
via "Dark Reading".
A novel mobile malware found lurking behind a phone-spoofing app is being distributed via Telegram and a dedicated website, in a broad operation to monitor corporate victims.π Read
via "Dark Reading".
Darkreading
RatMilad Spyware Scurries onto Enterprise Android Phones
A novel mobile malware found lurking behind a phone-spoofing app is being distributed via Telegram and a dedicated website, in a broad operation to monitor corporate victims.
π΄ Why Don't CISOs Trust Their Employees? π΄
π Read
via "Dark Reading".
Executives fear "malicious insiders" as top cyber threat to companies, research shows. Reasonable steps to secure and monitor systems may prevent reputational damage but are not enough.π Read
via "Dark Reading".
Darkreading
Why Don't CISOs Trust Their Employees?
Executives fear "malicious insiders" as top cyber threat to companies, research shows. Reasonable steps to secure and monitor systems may prevent reputational damage but are not enough.
π΄ 7 Practical Considerations for Effective Threat Intelligence π΄
π Read
via "Dark Reading".
If your security team is considering, planning, building, or operating a threat intelligence capability, this advice can help.π Read
via "Dark Reading".
Dark Reading
7 Practical Considerations for Effective Threat Intelligence
If your security team is considering, planning, building, or operating a threat intelligence capability, this advice can help.
π1
π Wireshark Analyzer 4.0.0 π
π Read
via "Packet Storm Security".
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.π Read
via "Packet Storm Security".
Packetstormsecurity
Wireshark Analyzer 4.0.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ποΈ PHP package manager component Packagist vulnerable to compromise ποΈ
π Read
via "The Daily Swig".
Argument injection bug posed RCE riskπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
PHP package manager component Packagist vulnerable to compromise
Argument injection bug posed RCE risk
π΄ NetSPI Raises $410 Million in Growth Funding from KKR π΄
π Read
via "Dark Reading".
New investment to fuel the offensive security leader's record-breaking growth and innovation pipeline.π Read
via "Dark Reading".
Darkreading
NetSPI Raises $410 Million in Growth Funding from KKR
New investment to fuel the offensive security leader's record-breaking growth and innovation pipeline.
π2
β Scammers and rogue callers β can anything ever stop them? β
π Read
via "Naked Security".
Some thoughts for Cybersecurity Awareness Month: Is is worth reporting nuisance calls? Is it even worth reporting outright scams?π Read
via "Naked Security".
Naked Security
Scammers and rogue callers β can anything ever stop them?
Some thoughts for Cybersecurity Awareness Month: Is is worth reporting nuisance calls? Is it even worth reporting outright scams?
π1
β Romance scammer and BEC fraudster sent to prison for 25 years β
π Read
via "Naked Security".
Two years of scamming + $10 million leeched = 25 years in prison. Just in time for #Cybermonth.π Read
via "Naked Security".
Naked Security
BEC fraudster and romance scammer sent to prison for 25 years
Two years of scamming + $10 million leeched = 25 years in prison. Just in time for #Cybermonth.
π΄ Giving Away the Keys to Your Backups? Hereβs How to Keep Out Hackers π΄
π Read
via "Dark Reading".
As threat actors' sophistication has grown dramatically in the last few years, organizations haven't kept up with implementing the necessary countermeasure controls.π Read
via "Dark Reading".
Darkreading
Giving Away the Keys to Your Backups? Hereβs How to Keep Out Hackers
As threat actors' sophistication has grown dramatically in the last few years, organizations haven't kept up with implementing the necessary countermeasure controls.
β NetWalker ransomware affiliate sentenced to 20 years by Florida court β
π Read
via "Naked Security".
Judge tells the accused that if he hadn't pleaded guilty, "I would have given you life."π Read
via "Naked Security".
Naked Security
NetWalker ransomware affiliate sentenced to 20 years by Florida court
Judge tells the accused that if he hadnβt pleaded guilty, βI would have given you life.β
π΄ NullMixer Dropper Delivers a Multimalware Code Bomb π΄
π Read
via "Dark Reading".
In one shot, Trojan dropper NullMixer installs a suite of downloaders, banking Trojans, stealers, and spyware on victims' systems.π Read
via "Dark Reading".
Darkreading
NullMixer Dropper Delivers a Multimalware Code Bomb
In one shot, Trojan dropper NullMixer installs a suite of downloaders, banking Trojans, stealers, and spyware on victims' systems.
π΄ Secure Your Application Layer, Secure Your Business π΄
π Read
via "Dark Reading".
Users and malicious actors interact with your business through the application layer. Build trust in your software by securing this first line of defense.π Read
via "Dark Reading".
Darkreading
Secure Your Application Layer, Secure Your Business
Users and malicious actors interact with your business through the application layer. Build trust in your software by securing this first line of defense.
π΄ CISA: Multiple APT Groups Infiltrate Defense Organization π΄
π Read
via "Dark Reading".
Advanced attackers gained access to Microsoft Exchange services, conducted searches of email, and used an open source toolkit to collect data from the network for nearly a year.π Read
via "Dark Reading".
Darkreading
CISA: Multiple APT Groups Infiltrate Defense Organization
Advanced attackers gained access to Microsoft Exchange services, conducted searches of email, and used an open source toolkit to collect data from the network for nearly a year.