π΅οΈββοΈ Siemens Working on Fix for Device Affected by Palo Alto Firewall Bug π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Growing attacks targeting the flaw prompted CISA to include it in the known exploited vulnerabilities catalog earlier this month.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Siemens Working on Fix for Device Affected by Palo Alto Firewall Bug
Growing attacks targeting the flaw prompted CISA to include it in the known exploited vulnerabilities catalog earlier this month.
π1
π΅οΈββοΈ Hackers Create Legit Phishing Links With Ghost GitHub, GitLab Comments π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
An utterly innocuous feature in popular Git CDNs allows anyone to conceal malware behind brand names, without those brands being any the wiser.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Hackers Create Legit Phishing Links With Ghost GitHub, GitLab Comments
An utterly innocuous feature in popular Git CDNs allows anyone to conceal malware behind brand names, without those brands being any the wiser.
ποΈ CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys hosted on Content Delivery Network CDN cache domains since at least February 2024. Cisco Talos has attributed the activity with moderate confidence to a threat actor tracked as CoralRaider, a suspected Vietnameseorigin.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ Microsoft issues warning over βGooseEggβ tool used in Russian hacking campaigns π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Microsoft researchers have observed the tool being used to help install backdoors and move across networks.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Microsoft issues warning over βGooseEggβ tool used in Russian hacking campaigns
Microsoft researchers have observed the tool being used to help install backdoors and move across networks
π’ Euro police chiefs rekindle end-to-end encryption battle amid continued rollouts π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Endtoend encryption plans are putting users in danger and making it harder to fight crime, police claim, but tech industry stakeholders disagree.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Euro police chiefs rekindle end-to-end encryption battle amid continued rollouts
End-to-end encryption plans are putting users in danger and making it harder to fight crime, police claim, but tech industry stakeholders disagree
π’ Hackers have found yet another way to trick devs into downloading malware from GitHub π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Threat actors have developed a new way to covertly embed malicious files into legitimate repositories on both GitHub and GitLab using the comment section.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Hackers have found yet another way to trick devs into downloading malware from GitHub
Threat actors have developed a new way to covertly embed malicious files into legitimate repositories on both GitHub and GitLab using the comment section
ποΈ eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency miners like XMRig through a longstanding threat codenamed GuptiMiner targeting large corporate networks. Cybersecurity firm Avast said the activity is the work of a threat actor with possible connections to a North Korean hacking group dubbed .π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Fifth of CISOs Admit Staff Leaked Data Via GenAI π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
One in five UK organizations have had corporate data exposed via generative AI, says RiverSafe.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Fifth of CISOs Admit Staff Leaked Data Via GenAI
One in five UK organizations have had corporate data exposed unwittingly by employees using generative AI
π North Korean Hackers Target Dozens of Defense Companies π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
North Korean hackers ran a yearlong cyberespionage campaign against South Korean defense companies.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
North Korean Hackers Target Dozens of Defense Companies
Pyongyang hackers ran a year-long cyber-espionage campaign against South Korean defense companies
ποΈ Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Security vulnerabilities uncovered in cloudbased pinyin keyboard apps could be exploited to reveal users' keystrokes to nefarious actors. The findings come from the Citizen Lab, which discovered weaknesses in eight of nine apps from vendors like Baidu, Honor, iFlytek, OPPO, Samsung, Tencent, Vivo, and Xiaomi. The only vendor whose keyboard app did not have any security.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ CISO Perspectives on Complying with Cybersecurity Regulations ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the security controls, policies, and activities they include. For CISOs and their teams, that means compliance is a timeconsuming, highstakes process that demands strong organizational and.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ Do you know your dataβs worth? π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Data underpins our lives, but many businesses do not appreciate the true value of their data and fail to adequately secure it. Heres what needs to change.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
channelpro
Do you know your dataβs worth?
Data underpins our lives, but many businesses do not appreciate the true value of their data and fail to adequately secure it. Hereβs what needs to change
π Leeds Talent Pool Attracts BlueVoyant's First UK Security Operations Center π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The proximity of organizations headquarters, like Asdas and NHS Englands, prompted BlueVoyant to choose Leeds as the location for its first UK SOC.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Leeds Talent Pool Attracts BlueVoyant's First UK Security Operations Center
The proximity of organizationsβ headquarters, like Asdaβs and NHS Englandβs, prompted BlueVoyant to choose Leeds as the location for its first UK SOC
π Security Leaders Braced for Daily AI-Driven Attacks by Year-End π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Netacea research found that 93 of security leaders expect to face daily AIdriven attacks by the end of 2024, with 65 predicting that offensive AI will be the norm for cybercriminals.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Security Leaders Braced for Daily AI-Driven Attacks by Year-End
Netacea research found that 93% of security leaders expect to face daily AI-driven attacks by the end of 2024, with 65% predicting that offensive AI will be the norm for cybercriminals
π¦
LOCKBIT Blackβs Legacy: Unraveling the DragonForce Ransomware Connection π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways Cyble Research Intelligence Labs CRIL identified a DragonForce ransomware binary based on LOCKBIT Black ransomware, suggesting the threat actors behind DragonForce used a leaked builder of LOCKBIT Black ransomware to generate their binary. In September 2022, an X Twitter user shared the download link for the LockBit ransomware builder, which allows threat actors to customize ransomware payloads according to their preferences. A comparison between binaries generated using the Leaked Builder of LOCKBIT ransomware and DragonForce ransomware revealed significant similarities, indicating the DragonForce ransomware binary was likely created using the leaked builder of LOCKBIT ransomware. DragonForce ransomware surfaced in November 2023. It utilizes double extortio...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
LockBit Black & DragonForce: Unraveling The Link
CRIL uncovers DragonForce ransomware's links to leaked LOCKBIT builder, revealing double extortion tactics and over 25 global victims
π΅οΈββοΈ Fortify AI Training Datasets From Malicious Poisoning π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Just like you should check the quality of the ingredients before you make a meal, it's critical to ensure the integrity of AI training data.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Fortify AI Training Datasets From Malicious Poisoning
Just like you should check the quality of the ingredients before you make a meal, it's critical to ensure the integrity of AI training data.
π§ Researchers develop malicious AI βwormβ targeting generative AI systems π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Researchers have created a new, neverseenbefore kind of malware they call the Morris II worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988. The worm demonstrates the potential dangers of AI security threats and The post Researchers develop malicious AI worm targeting generative AI systems appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
Researchers develop malicious AI βwormβ targeting generative AI systems
Researchers created a never-before-seen "Morris II" worm, which spreads through popular AI services, infecting new systems and stealing data.
π΅οΈββοΈ Patch Now: CrushFTP Zero-Day Cloud Exploit Targets US Orgs π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
An exploit for the vulnerability allows unauthenticated attackers to escape a virtual file system sandbox to download system files and potentially achieve RCE.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Patch Now: CrushFTP Zero-Day Cloud Exploit Targets US Orgs
An exploit for the vulnerability allows attackers to escape a virtual file system sandbox to download system files and potentially achieve RCE.
ποΈ U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Treasury Department's Office of Foreign Assets Control OFAC on Monday sanctioned two firms and four individuals for their involvement in malicious cyber activities on behalf of the Iranian Islamic Revolutionary Guard Corps Cyber Electronic Command IRGCCEC from at least 2016 to April 2021. This includes the front companies Mehrsam Andisheh Saz Nik MASN and Dadeh.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered an ongoing attack campaign that's leveraging phishing emails to deliver malware called SSLoad. The campaign, codenamed FROZENSHADOW by Securonix, also involves the deployment of Cobalt Strike and the ConnectWise ScreenConnect remote desktop software. "SSLoad is designed to stealthily infiltrate systems, gather sensitive.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π US Sanctions Iranian "Fronts" for Cyber-Attacks on American Entities π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The US Treasury announced sanctions on two companies and four individuals for cyber campaigns conducted on behalf of the Iranian government.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
US Sanctions Iranian "Fronts" for Cyber-Attacks on American Entities
The US Treasury announced sanctions on two companies and four individuals for cyber campaigns conducted on behalf of the Iranian government