π¦
Brokewell: A New Android Banking Trojan Targeting Users In Germany π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways A new Android Banking Trojan, "Brokewell", was identified as distributing via a fake Chrome Update phishing site. The malware's development is attributed to the developer, "Baron Samedit," who manages the "Brokewell Cyber Labs" project. Utilizing Gitea, the malware developer hosts the Brokewell Android Loader project repository and shares underground forum links related to their profile. Brokewell Android Banking Trojan initially targets users in Germany but demonstrates potential expansion with references in multiple languages. Leveraging the Accessibility service, the malware implements key features such as keylogging, overlay attack, and cookie stealing. In its early development phase, the malware is expected to evolve with additional features and ex...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Brokewell: New Android Trojan Targeting Germany Users
Cybel uncovers the 'Brokewell' Android Banking Trojan targeting German users with overlay attacks, keylogging, and screen recording. Stay updated on threats.
𧨠How to Protect Your Smartphone from SIM Swapping π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
You consider yourself a responsible person when it comes to taking care of your physical possessions. Youve never left your wallet in... The post How to Protect Your Smartphone from SIM Swapping appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
How to Protect Your Smartphone from SIM Swapping | McAfee Blog
You consider yourself a responsible person when it comes to taking care of your physical possessions. Youβve never left your wallet in a taxi or lost an
π΅οΈββοΈ Godfather Banking Trojan Spawns 1.2K Samples Across 57 Countries π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Mobile malwareasaservice operators are upping their game by automatically churning out hundreds of unique samples on a whim.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Godfather Banking Trojan Spawns 1.2K Samples Across 57 Countries
Mobile malware-as-a-service operators are upping their game by automatically churning out hundreds of unique samples on a whim.
𧨠How to Avoid Romance Scams π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
Its the romance scam story that plays out like a segment on a true crime show. It starts with a... The post How to Avoid Romance Scams appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
How to Avoid Romance Scams | McAfee Blog
It starts with a simple DM on Instagram. It ends with an AI-generated con artist, thousands of dollars lost, and a harsh lesson in digital deception. The
π΅οΈββοΈ The Biggest 2024 Elections Threat: Kitchen-Sink Attack Chains π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Hackers can influence voters with media and breach campaigns, or try tampering with votes. Or they can combine these tactics to even greater effect.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
The Biggest 2024 Elections Threat: Kitchen-Sink Attack Chains
Hackers can influence voters with media, breach campaigns, or try tampering with votes. Or they can combine these tactics to even greater effect.
π΅οΈββοΈ FTC Issues $5.6M in Refunds to Customers After Ring Privacy Settlement π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The refunds will be made to individual affected customers through thousands of PayPal payments, available to be redeemed for a limited time.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
FTC Issues $5.6M in Ring Privacy Refunds to Customers
The refunds will be made to individual affected customers through thousands of PayPal payments, available to be redeemed for a limited time.
π΅οΈββοΈ FTC Issues $5.6M in Refunds to Customers After Ring Privacy Settlement π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The refunds will be made to individual affected customers through thousands of PayPal payments, available to be redeemed for a limited time.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
FTC Issues $5.6M in Ring Privacy Refunds to Customers
The refunds will be made to individual affected customers through thousands of PayPal payments, available to be redeemed for a limited time.
π΅οΈββοΈ 5 Attack Trends Organizations of All Sizes Should Be Monitoring π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Recent trends in breaches and attack methods offer a valuable road map to cybersecurity professionals tasked with detecting and preventing the next big thing.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
5 Attack Trends Organizations of All Sizes Should Be Monitoring
Recent trends in breaches and attack methods offer a valuable road map to cybersecurity professionals tasked with detecting and preventing the next big thing.
π΅οΈββοΈ Chinese Keyboard Apps Open 1B People to Eavesdropping π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Eight out of nine apps that people use to input Chinese characters into mobile devices have weakness that allow a passive eavesdropper to collect keystroke data.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Chinese Keyboard Apps Open 1B People to Eavesdropping
Eight out of nine apps that people use to input Chinese characters into mobile devices have security vulnerabilities that allow a passive eavesdropper to collect keystroke data.
π¦Ώ OpenAIβs GPT-4 Can Autonomously Exploit 87% of One-Day Vulnerabilities, Study Finds π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Researchers from the University of Illinois UrbanaChampaign found that OpenAIs GPT4 is able to exploit 87 of a list of vulnerabilities when provided with their NIST descriptions.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
OpenAIβs GPT-4 Can Autonomously Exploit 87% of One-Day Vulnerabilities, Study Finds
An LLM agent based on OpenAIβs GPT-4 is able to exploit 87% of a list of vulnerabilities when provided with their NIST descriptions.
β€1π₯°1
π΅οΈββοΈ PCI Launches Payment Card Cybersecurity Effort in the Middle East π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The payment card industry pushes for more security in financial transactions to help combat increasing fraud in the region.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
PCI Launches Payment Card Cybersecurity Effort in the Middle East
The payment card industry pushes for more security in financial transactions to help combat increasing fraud in the region.
ποΈ Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat actors are attempting to actively exploit a critical security flaw in the WPAutomatic plugin for WordPress that could allow site takeovers. The shortcoming, tracked as CVE202427956, carries a CVSS score of 9.9 out of a maximum of 10. It impacts all versions of the plugin prior to 3.9.2.0. "This vulnerability, a SQL injection SQLi flaw, poses a severe threat as.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π½ Dutch Chipmaker Nexperia Hit by Data Breach π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Dutch semiconductor manufacturer Nexperia has suffered a significant data breach, exposing sensitive information, including intellectual property. The companys servers were compromised, prompting Nexperia to take them offline and launch a fullscale investigation. The extent of the damage remains unclear, and Nexperia hasnt confirmed whether the attackers demanded ransom. However, the.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
be4sec
Dutch Chipmaker Nexperia Hit by Data Breach
Dutch semiconductor manufacturer Nexperia has suffered a significant data breach, exposing sensitive information, including intellectual property. The companyβs servers were compromised, promβ¦
π’ Flawed Cisco firewalls used to target government networks π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Cisco has published the details of a suspected statesponsored threat campaign leveraging two firewall zerodays to infect government networks.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Flawed Cisco firewalls used to target government networks
Cisco has published the details of a suspected state-sponsored threat campaign leveraging two firewall zero-days to infect government networks
π½ Russian Hackers Target Indiana Water Plant π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
A recent cyberattack on a wastewater treatment plant in Tipton, Indiana, has been claimed by the Cyber Army of Russia Reborn CARR, a Russianspeaking hacker group. The incident spotlights the ongoing vulnerability of critical infrastructure in smaller communities, even as the plant itself reportedly experienced minimal disruption. CARR has previously.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Be4Sec
Russian Hackers Target Indiana Water Plant
A recent cyberattack on a wastewater treatment plant in Tipton, Indiana, has been claimed by the Cyber Army of Russia Reborn (CARR), a Russian-speaking hacker group. The incident spotlights the ongβ¦
π Ring to Pay Out $5.6m in Refunds After Customer Privacy Breach π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The US Federal Trade Commission will send 5.6m worth of refunds to the spiedon customers of the Amazonowned home camera company.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ring to Pay Out $5.6m in Refunds After Customer Privacy Breach
The US Federal Trade Commission will send $5.6m worth of refunds to the spied-on customers of the Amazon-owned home camera company
ποΈ 10 Critical Endpoint Security Tips You Should Know ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
In today's digital world, where connectivity is rules all, endpoints serve as the gateway to a businesss digital kingdom. And because of this, endpoints are one of hackers' favorite targets. According to the IDC, 70 of successful breaches start at the endpoint. Unprotected endpoints provide vulnerable entry points to launch devastating cyberattacks. With IT.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ New 'Brokewell' Android Malware Spread Through Fake Browser Updates ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. "Brokewell is a typical modern banking malware equipped with both datastealing and remotecontrol capabilities built into the malware," Dutch security firm ThreatFabric said in an analysis published Thursday. The malware is said to be in active development,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Palo Alto Networks has shared remediation guidance for a recently disclosed critical security flaw impacting PANOS that has come under active exploitation. The vulnerability, tracked as CVE20243400 CVSS score 10.0, could be weaponized to obtain unauthenticated remote shell command execution on susceptible devices. It has been addressed in.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π₯1
π’ Everything you need to know about the Product Security and Telecommunications Infrastructure Act π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Coming into force on April 29th, the Product Security and Telecommunications Infrastructure Act aims to tighten up manufacturer security and protect users.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Everything you need to know about the Product Security and Telecommunications Infrastructure Act
Coming into force on April 29th, the Product Security and Telecommunications Infrastructure Act aims to tighten up manufacturer security and protect users
π΅οΈββοΈ Minimum Viable Compliance: What You Should Care About and Why π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Understand what security measures you have in place, what you need to keep secure, and what rules you have to show compliance with.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Minimum Viable Compliance: What You Should Care About and Why
Understand what security measures you have in place, what you need to keep secure, and what rules you have to show compliance with.