π΅οΈββοΈ Feds Confirm Remote Killing of Volt Typhoon's SOHO Botnet π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The Chinabacked APT was using the botnet, made up of mostly endoflife, patchless routers from Cisco and Netgear, to set up shop inside US critical infrastructure.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Feds Confirm Remote Killing of Volt Typhoon's SOHO Botnet
The China-backed APT was using the botnet, made up of mostly end-of-life, patchless routers from Cisco and Netgear, to set up shop inside US critical infrastructure.
π΅οΈββοΈ 'Commando Cat' Is Second Campaign of the Year Targeting Docker π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The threat actor behind the campaign is still unknown, but it shares some similarities with other cyptojacking groups.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
'Commando Cat' Is Second Campaign of the Year Targeting Docker
The threat actor behind the campaign is still unknown, but it shares some similarities with other cyptojacking groups.
π΅οΈββοΈ ProcessUnity Introduces Industry's All-In-One Third-Party Risk Management Platform π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
ProcessUnity Introduces Industry's All-In-One Third-Party Risk Management Platform
ποΈ Cloudflare Breach: Nation-State Hackers Access Source Code and Internal Docs ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cloudflare has revealed that it was the target of a likely nationstate attack in which the threat actor leveraged stolen credentials to gain unauthorized access to its Atlassian server and ultimately access some documentation and a limited amount of source code. The intrusion, which took place between November 14 and 24, 2023, and detected on November 23, was carried out "with the goal of.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π VajraSpy: A Patchwork of espionage apps π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
ESET researchers discovered several Android apps carrying VajraSpy, a RAT used by the Patchwork APT group.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
VajraSpy: A Patchwork of espionage apps
ESET researchers discovered several Android apps that posed as messaging tools but carried VajraSpy, a RAT used by the Patchwork APT group
π¨ Charities offered latest insight into key cyber threats to help keep out attackers π¨
π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
Latest report published by the NCSC outlines key threats facing the UK charity sector.π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
π LockBit Reigns Supreme in Soaring Ransomware Landscape π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The last quarter of 2023 saw an 80 yearonyear increase in ransomware victim claims, according to ReliaQuest.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
LockBit Reigns Supreme in Soaring Ransomware Landscape
The last quarter of 2023 saw an 80% year-on-year increase in ransomware victim claims, according to ReliaQuest
ποΈ INTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPs ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
An INTERPOLled collaborative operation targeting phishing, banking malware, and ransomware attacks has led to the identification of 1,300 suspicious IP addresses and URLs. The law enforcement effort, codenamed Synergia, took place between September and November 2023 in an attempt to blunt the "growth, escalation and professionalization of transnational cybercrime." Involving 60 law.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Cloudflare Suffers Breach After Failing to Rotate Stolen Okta Credentials π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Cloudflare revealed suspected nationstate attackers compromised its systems and accessed source code using credentials stolen in the Okta breach.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Cloudflare Suffers Breach After Failing to Rotate Stolen Okta Credentials
Cloudflare revealed suspected nation-state attackers compromised its systems and accessed source code using credentials stolen in the Okta breach
π’ Researchers at UC San Diego reveal the most effective way to get stubborn employees to change their passwords π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The study involved monitoring email reminders and login prompts sent to almost 10,000 faculty and staff members.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Struggling with mandatory password change policies? Here's the most effective way to get stubborn employees to comply
The study involved monitoring email reminders and login prompts sent to almost 10,000 faculty and staff members
ποΈ Former CIA Engineer Sentenced to 40 Years for Leaking Classified Documents ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A former software engineer with the U.S. Central Intelligence Agency CIA has been sentenced to 40 years in prison by the Southern District of New York SDNY for transmitting classified documents to WikiLeaks and for possessing child pornographic material. Joshua Adam Schulte, 35, was originally charged in June 2018. He was found guilty in July 2022. On September 13, 2023, he was.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Cloudzy Elevates Cybersecurity: Integrating Insights from Recorded Future to Revolutionize Cloud Security ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cloudzy, a prominent cloud infrastructure provider, proudly announces a significant enhancement in its cybersecurity landscape. This breakthrough has been achieved through a recent consultation with Recorded Future, a leader in providing realtime threat intelligence and cybersecurity analytics. This initiative, coupled with an overhaul of Cloudzy's cybersecurity strategies, represents a major.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ The end of passwords β and how businesses will embrace it π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
What will the end of passwords look like in practice and what can businesses do to prepare?.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
The end of passwords β and how businesses will embrace it
What will the end of passwords look like in practice and what can businesses do to prepare?
π΅οΈββοΈ Cloudflare Falls Victim to Okta Breach, Atlassian Systems Cracked π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The cyberattackers, believed to be state sponsored, didn't get far into Cloudflare's global network, but not for lack of trying.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Cloudflare Falls Victim to Okta Breach, Atlassian Systems Cracked
The cyberattackers, believed to be state sponsored, didn't get far into Cloudflare's global network, but not for lack of trying.
ποΈ DirtyMoe Malware Infects 2,000+ Ukrainian Computers for DDoS and Cryptojacking ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Computer Emergency Response Team of Ukraine CERTUA has warned that more than 2,000 computers in the country have been infected by a strain of malware called DirtyMoe. The agency attributed the campaign to a threat actor it calls UAC0027. DirtyMoe, active since at least 2016, is capable of carrying out cryptojacking and distributed denialofservice DDoS attacks. In March.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ The 'Big Threeβ ransomware groups are losing their grip on the industry as gangs begin to fracture, study shows π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The ransomware landscape has become more diversified, with major players like LockBit losing ground to smaller, more dynamic collectives.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
The 'Big Threeβ ransomware groups are losing their grip on the industry as gangs begin to fracture, study shows
The ransomware landscape has become more diversified, with major players like LockBit losing ground to smaller, more dynamic collectives
π1
π Romance Scam Victims Surge in 2023 π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
New data from Lloyds found that romance scam victims increased by 22 in 2023, with the average amount lost per incident 6937.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Romance Scam Victims Surge in 2023
New data from Lloyds found that romance scam victims increased by 22% in 2023, with the average amount lost per incident Β£6937
𧨠Beat Robocallers at Their Game π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
Some scams make a telltale soundrinnng, rinnng! Yup, the dreaded robocall. But you can beat them at their game. Maybe its a call about renewing... The post Beat Robocallers at Their Game appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
How to Beat Robocallers at Their Game | McAfee Blog
Some scams make a telltale soundβrinnng, rinnng! Yup, the dreaded robocall. But you can beat them at their game. Maybe itβs a call about renewing an
π1
π΅οΈββοΈ Why Gen Z Is the New Force Reshaping OT Security π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Modernizing legacy operational technology OT systems to align with younger workers' technology habits, skills, and expectations can enhance security and resiliency.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Why Gen Z Is the New Force Reshaping OT Security
Modernizing legacy operational technology (OT) systems to align with younger workers' technology habits, skills, and expectations can enhance security and resiliency.
π Teen Dating App Wizz Removed from Apple and Google Stores for Sextortion Concerns π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The Tinderlike app has countered claims of being a hot spot for sextortion scammers.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Wizz Removed from Apple and Google Stores for Sextortion Concerns
The Tinder-like app has countered claims of being a hot spot for sextortion scammers
ποΈ Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Russian statesponsored actors have staged NT LAN Manager NTLM v2 hash relay attacks through various methods from April 2022 to November 2023, targeting highvalue targets worldwide. The attacks, attributed to an "aggressive" hacking crew called APT28, have set their eyes on organizations dealing with foreign affairs, energy, defense, and transportation, as well as those involved with.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1