π¦
Threat Actor profile: SideCopy π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Since early 2019, Operation SideCopy has remained active, exclusively targeting Indian defense forces and armed forces personnel. The malware modules associated with this Threat Actor are continually evolving, with updated versions released following reconnaissance of victim data. Threat Actors behind Operation SideCopy closely monitor malware detections and promptly update modules upon detection by antivirus software. Notably, nearly all command and control CC infrastructure is attributed to Contabo GmbH, and network infrastructure has similarities with the Transparent Tribe advanced persistent threat APT group. Figure 1 Cyble Vision Threat Library Country of Origin SideCopy originates from Pakistan and operates as an APT group. Targeted Country SideCopy primarily ...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
π Voter Registration System Taken Offline in Coffee County Cyber-Incident π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Coffee County has discovered malicious cyberactivity on its IT systems, and it reportedly severed its connection to Georgias state voter registration system.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Voter Registration System Taken Offline in Coffee County Cyber-Incident
Coffee County has discovered malicious cyber-activity on its IT systems, and it reportedly severed its connection to Georgiaβs state voter registration system
π’ Donβt let your network become a security blind spot π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Networks represent critical pieces of IT infrastructure and make up the backbone of every modern organization, but are often overlooked when it comes to tightening defenses.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Donβt let your network become a security blind spot
Networks represent critical pieces of IT infrastructure and make up the backbone of every modern organization, but are often overlooked when it comes to tightening defenses
π΅οΈββοΈ Addressing Risk Caused by Innovation π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
By embracing a proactive approach to cyberrisk management, companies can better detect, prevent, and mitigate cyber threats while integrating the latest stateoftheart technology.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Addressing Risk Caused by Innovation
By embracing a proactive approach to cyber-risk management, companies can better detect, prevent, and mitigate cyber threats while integrating the latest state-of-the-art technology.
π΅οΈββοΈ How to Red Team GenAI: Challenges, Best Practices, and Learnings π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Red teaming is a crucial part of proactive GenAI security that helps map and measure AI risks.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
How to Red Team GenAI: Challenges, Best Practices, and Learnings
Red teaming is a crucial part of proactive GenAI security that helps map and measure AI risks.
ποΈ China-Linked 'Muddling Meerkat' Hijacks DNS to Map Internet on Global Scale ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated domain name system DNS activities in a likely effort to evade security measures and conduct reconnaissance of networks across the world since October 2019. Cloud security firm Infoblox described the threat actor as likely affiliated with the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
𧨠How to Protect Your Personal Data π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
All your online activity creates a trail of data. And that data tells a story. The story of you. The... The post How to Protect Your Personal Data appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
How to Protect Your Personal Data | McAfee Blog
All your online activity creates a trail of data. And that data tells a story. The story of you. The websites, apps, and services you use throughout the
π Judge0 Sandbox Vulnerabilities Expose Systems to Takeover Risk π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Tanto Security uncovered three vulnerabilities which could allow attackers to execute sandbox escapes and gain root permissions on host machines.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Judge0 Sandbox Vulnerabilities Expose Systems to Takeover Risk
Tanto Security uncovered three vulnerabilities which could allow attackers to execute sandbox escapes and gain root permissions on host machines
π΅οΈββοΈ 'Muddling Meerkat' Poses Nation-State DNS Mystery π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Likely Chinalinked adversary has blanketed the Internet with DNS mail requests over the past five years via open resolvers, furthering Great Firewall of China ambitions. But the exact nature of its activity is unclear.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Muddling Meerkat Poses Nation-State DNS Mystery
Likely China-linked adversary has blanketed the Internet with DNS mail requests over the past five years via open resolvers, furthering Great Firewall of China ambitions. But the exact nature of its activity is unclear.
π Study Reveals Alarming Levels of USPS Phishing Traffic π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The top malicious domains attracted over 100,000 hits each, according to Akamai Security.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Study Reveals Alarming Levels of USPS Phishing Traffic
The top malicious domains attracted over 100,000 hits each, according to Akamai Security
ποΈ Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023 ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Google on Monday revealed that almost 200,000 app submissions to its Play Store for Android were either rejected or remediated to address issues with access to sensitive data such as location or SMS messages over the past year. The tech giant also said it blocked 333,000 bad accounts from the app storefront in 2023 for attempting to distribute malware or for repeated policy violations. "In 2023,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
𧨠The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with... The post The Darkgate Menace Leveraging Autohotkey Attempt to Evade Smartscreen appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen | McAfee Blog
Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with DarkGate malware.
π΅οΈββοΈ 13.4M Kaiser Insurance Members Affected by Data Leak to Online Advertisers π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Tracking code used for keeping tabs on how members navigated through the healthcare giant's online and mobile sites was oversharing a concerning amount of information.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Kaiser Insurance Leaks 13.4M Members' Data to Online Advertisers
Tracking code used for keeping tabs on how members navigated through the healthcare giant's online and mobile sites was oversharing a concerning amount of information.
π€―1
π΅οΈββοΈ Okta: Credential-Stuffing Attacks Spike via Proxy Networks π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Okta warns users that the attack requests are made through an anonymizing service like Tor or various commercial proxy networks.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Okta: Credential-Stuffing Attacks Spike via Proxy Networks
Okta warns users that the attack requests are made through an anonymizing service like Tor or various commercial proxy networks.
π΅οΈββοΈ Cybersecurity Is Becoming More Diverse β¦ Except by Gender π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
While other professions are making up ground, cybersecurity still lags behind in female representation, thanks to a lack of respect and inclusion.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Cybersecurity Is Becoming More Diverse β¦ Except by Gender
While other professions are making up ground, cybersecurity still lags behind in female representation, thanks to a lack of respect and inclusion.
π΅οΈββοΈ ESET PROTECT Portfolio Now Includes New MDR Tiers and Features π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
ESET PROTECT Portfolio Now Includes New MDR Tiers and Features
βοΈ FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
The U.S. Federal Communications Commission FCC today levied fines totaling nearly 200 million against the four major carriers including ATT, Sprint, TMobile and Verizon for illegally sharing access to customers' location information without consent.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data
The U.S. Federal Communications Commission (FCC) today levied fines totaling nearly $200 million against the four major carriers -- including AT&T, Sprint, T-Mobile and Verizon -- for illegally sharing access to customers' location information without consent.
π€¬1
ποΈ New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024 ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.K. National Cyber Security Centre NCSC is calling on manufacturers of smart devices to comply with new legislation that prohibits them from using default passwords, effective April 29, 2024. "The law, known as the Product Security and Telecommunications Infrastructure act or PSTI act, will help consumers to choose smart devices that have been designed to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
π Why space exploration is important for Earth and its future: Q&A with David Eicher π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
We caught up with Astronomy magazine editorinchief David Eicher to talk about key challenges facing our planet, the benefits of space exploration, and the possibility of life beyond Earth.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Why space exploration is important for Earth and its future: Q&A with David Eicher
Astronomy magazine editor-in-chief David Eicher shares his thoughts about key challenges facing our planet, the importance of space exploration for humanity, and the possibility of life beyond Earth
π Google Blocks 2.3 Million Apps From Play Store Listing π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Google blocked millions of policyviolating apps from being listed on Play in 2023 and banned 333,000 bad accounts.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Google Blocks 2.3 Million Apps From Play Store Listing
Google blocked millions of policy-violating apps from being listed on Play in 2023 and banned 333,000 bad accounts
β€1
π FCC Fines Carriers $200m For Selling User Location Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Some of Americas biggest wireless carriers illegally sold customer location, says FCC.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
FCC Fines Carriers $200m For Selling User Location Data
Some of Americaβs biggest wireless carriers illegally sold customer location, says FCC