𧨠The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with... The post The Darkgate Menace Leveraging Autohotkey Attempt to Evade Smartscreen appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen | McAfee Blog
Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with DarkGate malware.
π΅οΈββοΈ 13.4M Kaiser Insurance Members Affected by Data Leak to Online Advertisers π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Tracking code used for keeping tabs on how members navigated through the healthcare giant's online and mobile sites was oversharing a concerning amount of information.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Kaiser Insurance Leaks 13.4M Members' Data to Online Advertisers
Tracking code used for keeping tabs on how members navigated through the healthcare giant's online and mobile sites was oversharing a concerning amount of information.
π€―1
π΅οΈββοΈ Okta: Credential-Stuffing Attacks Spike via Proxy Networks π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Okta warns users that the attack requests are made through an anonymizing service like Tor or various commercial proxy networks.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Okta: Credential-Stuffing Attacks Spike via Proxy Networks
Okta warns users that the attack requests are made through an anonymizing service like Tor or various commercial proxy networks.
π΅οΈββοΈ Cybersecurity Is Becoming More Diverse β¦ Except by Gender π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
While other professions are making up ground, cybersecurity still lags behind in female representation, thanks to a lack of respect and inclusion.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Cybersecurity Is Becoming More Diverse β¦ Except by Gender
While other professions are making up ground, cybersecurity still lags behind in female representation, thanks to a lack of respect and inclusion.
π΅οΈββοΈ ESET PROTECT Portfolio Now Includes New MDR Tiers and Features π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
ESET PROTECT Portfolio Now Includes New MDR Tiers and Features
βοΈ FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
The U.S. Federal Communications Commission FCC today levied fines totaling nearly 200 million against the four major carriers including ATT, Sprint, TMobile and Verizon for illegally sharing access to customers' location information without consent.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data
The U.S. Federal Communications Commission (FCC) today levied fines totaling nearly $200 million against the four major carriers -- including AT&T, Sprint, T-Mobile and Verizon -- for illegally sharing access to customers' location information without consent.
π€¬1
ποΈ New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024 ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.K. National Cyber Security Centre NCSC is calling on manufacturers of smart devices to comply with new legislation that prohibits them from using default passwords, effective April 29, 2024. "The law, known as the Product Security and Telecommunications Infrastructure act or PSTI act, will help consumers to choose smart devices that have been designed to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
π Why space exploration is important for Earth and its future: Q&A with David Eicher π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
We caught up with Astronomy magazine editorinchief David Eicher to talk about key challenges facing our planet, the benefits of space exploration, and the possibility of life beyond Earth.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Why space exploration is important for Earth and its future: Q&A with David Eicher
Astronomy magazine editor-in-chief David Eicher shares his thoughts about key challenges facing our planet, the importance of space exploration for humanity, and the possibility of life beyond Earth
π Google Blocks 2.3 Million Apps From Play Store Listing π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Google blocked millions of policyviolating apps from being listed on Play in 2023 and banned 333,000 bad accounts.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Google Blocks 2.3 Million Apps From Play Store Listing
Google blocked millions of policy-violating apps from being listed on Play in 2023 and banned 333,000 bad accounts
β€1
π FCC Fines Carriers $200m For Selling User Location Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Some of Americas biggest wireless carriers illegally sold customer location, says FCC.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
FCC Fines Carriers $200m For Selling User Location Data
Some of Americaβs biggest wireless carriers illegally sold customer location, says FCC
π’ LightSpy malware has made a comeback, and this time it's coming after your macOS devices π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The LightSpy malware is back, and this time threat actors are targeting macOS devices with improved detectionevasion techniques.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
LightSpy malware has made a comeback, and this time it's coming after your macOS devices
The LightSpy malware is back, and this time threat actors are targeting macOS devices with improved detection-evasion techniques
π1
ποΈ U.S. Government Releases New AI Security Guidelines for Critical Infrastructure ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial intelligence AIrelated threats. "These guidelines are informed by the wholeofgovernment effort to assess AI risks across all sixteen critical infrastructure sectors, and address threats both to and from, and involving AI systems," the Department of Homeland Security DHS.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
ποΈ Considerations for Operational Technology Cybersecurity ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Operational Technology OT refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes, and events. Unlike traditional Information Technology IT systems, OT systems directly impact the physical world. This unique characteristic of OT brings additional cybersecurity considerations not typically present in conventional IT security.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π3
π’ Stealthy malware: The threats hiding in plain sight π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
As malicious software becomes increasingly difficult to detect, businesses must act to counter the stealthy malware threat.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Stealthy malware: The threats hiding in plain sight
As malicious software becomes increasingly difficult to detect, businesses must act to counter the stealthy malware threat
π§ AI cybersecurity solutions detect ransomware in under 60 seconds π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Worried about ransomware? If so, its not surprising. According to the World Economic Forum, for large cyber losses 1 million, the number of cases in which data is exfiltrated is increasing, doubling from 40 in 2019 to almost 80 in 2022. And more recent activity is tracking even higher. Meanwhile, other dangers are appearing on The post AI cybersecurity solutions detect ransomware in under 60 seconds appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
AI cybersecurity solutions detect ransomware in under 60 seconds
As cyber criminals make use of AI tools, cybersecurity pros have to keep up. New security solutions may offer an exciting edge against ransomware attacks.
π Millions of Malicious Containers Found on Docker Hub π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
According to JFrog, approximately 25 of all repositories lack useful functionality and serve as vehicles for spam and malware.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Millions of Malicious Containers Found on Docker Hub
According to JFrog, approximately 25% of all repositories lack useful functionality and serve as vehicles for spam and malware
π Disinformation: EU Opens Probe Against Facebook and Instagram Ahead of Election π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Metas moderation failings could allow coordinated disinformation campaigns to thrive in the runup to the EU election.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Disinformation: EU Opens Probe Against Facebook and Instagram Ahead of Election
Metaβs moderation failings could allow coordinated disinformation campaigns to thrive in the run-up to the EU election
π Ransom Payments Surge by 500% to an Average of $2m π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Sophos found that the average ransom payment was 2m in 2023, with 63 of ransom demands 1m or more.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ransom Payments Surge by 500% to an Average of $2m
Sophos found that the average ransom payment was $2m in 2023, with 63% of ransom demands $1m or more
βοΈ Man Who Mass-Extorted Psychotherapy Patients Gets Six Years βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
A 26yearold Finnish man was sentenced to more than six years in prison today after being convicted of hacking into an online psychotherapy clinic, leaking tens of thousands of patient therapy records, and attempting to extort the clinic and patients.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Man Who Mass-Extorted Psychotherapy Patients Gets Six Years
A 26-year-old Finnish man was sentenced to more than six years in prison today after being convicted of hacking into an online psychotherapy clinic, leaking tens of thousands of patient therapy records, and attempting to extort the clinic and patients.
ποΈ Millions of Malicious 'Imageless' Containers Planted on Docker Hub Over 5 Years ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious "imageless" containers over the past five years, once again underscoring how opensource registries could pave the way for supply chain attacks. "Over four million of the repositories in Docker Hub are imageless and have no content except for the repository.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
π΅οΈββοΈ The 6 Data Security Sessions You Shouldn't Miss at RSAC 2024 π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Themed "The Art of Possible," this year's conference celebrates new challenges and opportunities in the age of AI.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
The 6 Data Security Sessions You Shouldn't Miss at RSAC 2024
Themed "The Art of Possible," this year's conference celebrates new challenges and opportunities in the age of AI.