π΅οΈββοΈ Windows Quick Assist Anchors Black Basta Ransomware Gambit π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
When abused by threat actors with sophisticated socialengineering chops, remoteaccess tools demand that enterprises remain sharp in both defense strategy and employeeawareness training.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Windows Quick Assist Anchors Black Basta Ransomware Gambit
When abused by threat actors with sophisticated social-engineering chops, remote-access tools demand that enterprises remain sharp in both defense strategy and employee-awareness training.
π¦Ώ Ciscoβs Splunk Acquisition Should Help Security Pros See Threats Sooner in Australia and New Zealand π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Ciscos Splunk acquisition was finalised in March 2024. Splunks Craig Bates says the combined offering could enhance observability and put data to work for security professionals in an age of AI threat defence.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Ciscoβs Splunk Acquisition Should Help Security Pros See Threats Sooner in Australia and New Zealand
Enhanced observability and unified data could make Ciscoβs Splunk acquisition an asset to cyber security pros in Australia and New Zealand, according to Splunkβs Craig Bates.
π Wireshark Analyzer 4.2.5 π
π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Wireshark is a GTKbased network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercialquality analyzer for Unix and Win32 and to give Wireshark features that are missing from closedsource sniffers. This is the source code release.π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Packetstormsecurity
Wireshark Analyzer 4.2.5 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Packet Fence 13.2.0 π
π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
PacketFence is a network access control NAC system. It is actively maintained and has been deployed in numerous largescale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NACoriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registrationbased and scheduled vulnerability scans.π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Packetstormsecurity
Packet Fence 13.2.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π SIPPTS 4.0 π
π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. It is programmed in Python script and it allows us to check the security of a VoIP server using SIP protocol, over UDP, TCP and TLS protocols.π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Packetstormsecurity
SIPPTS 4.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ποΈ North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The North Korealinked Kimsuky hacking group has been attributed to a new social engineering attack that employs fictitious Facebook accounts to targets via Messenger and ultimately delivers malware. "The threat actor created a Facebook account with a fake identity disguised as a public official working in the North Korean human rights field," South Korean cybersecurity company Genians.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π½ Artificial Intelligence Threatens Global Employment π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
The International Monetary Fund IMF Managing Director, Kristalina Georgieva, has sounded the alarm about the potentially disruptive impact of artificial intelligence AI on the global workforce. Speaking at a conference in London, Georgieva predicted a coming tsunami of job losses, driven by the rapid advancement of AI technologies. Georgievas warning.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Be4Sec
Artificial Intelligence Threatens Global Employment
The International Monetary Fund (IMF) Managing Director, Kristalina Georgieva, has sounded the alarm about the potentially disruptive impact of artificial intelligence (AI) on the global workforce.β¦
π 53,000 Employees' Social Security Numbers Exposed in Nissan Data Breach π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Car manufacturer Nissan revealed that over 53,000 of its North America employees had their social security numbers accessed by a ransomware attacker.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
53,000 Employees' Social Security Numbers Exposed in Nissan Data Breach
Car manufacturer Nissan revealed that over 53,000 of its North America employees had their social security numbers accessed by a ransomware attacker
π SugarGh0st RAT Variant Used in Targeted AI Industry Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Proofpoint said the attackers modified registry key names for persistence.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
SugarGh0st RAT Variant Used in Targeted AI Industry Attacks
Proofpoint said the attackers modified registry key names for persistence
π1
π Windows Quick Assist Exploited in Ransomware Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Microsoft warned Storm1811 started vishing attacks in April to gain access to target devices.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Windows Quick Assist Exploited in Ransomware Attacks
Microsoft warned Storm-1811 started vishing attacks in April to gain access to target devices
π1
π¦
New Antidot Android Banking Trojan Masquerading as Fake Google Play Updates π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways A new Android Banking Trojan, Antidot, masquerading as a Google Play update application, displays fake Google Play update pages in multiple languages, indicating a wide range of targets. Antidot incorporates a range of malicious features, including overlay attacks and keylogging, allowing it to compromise devices and harvest sensitive information. Antidot maintains communication with its Command and Control CC server through WebSocket, enabling realtime, bidirectional interaction for executing commands. The malware executes a wide range of commands received from the CC server, including collecting SMS messages, initiating USSD requests, and even remotely controlling device features such as the camera and screen lock. Antidot implemented VNC using MediaPr...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
New Antidot Trojan Disguised As Fake Google Play Updates
Discover the 'Antidot' Android Banking Trojan: a fake Google Play update that steals credentials using overlay attacks and remote control techniques.
ποΈ New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Researchers have discovered a new security vulnerability stemming from a design flaw in the IEEE 802.11 WiFi standard that tricks victims into connecting to a less secure wireless network and eavesdrop on their network traffic. The SSID Confusion attack, tracked as CVE202352424, impacts all operating systems and WiFi clients, including home and mesh networks that are based on.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ Asian Threat Actors Use New Techniques to Attack Familiar Targets π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Generative AI and software supply chain attacks are being exploited to disrupt, manipulate, and steal.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Asian Threat Actors Use New Techniques to Attack Familiar Targets
Generative AI and software supply chain attacks are being exploited to disrupt, manipulate, and steal.
π΅οΈββοΈ GE Ultrasound Gear Riddled With Bugs, Open to Ransomware & Data Theft π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Thankfully, GE ultrasounds aren't Internetfacing. Exploiting most of the bugs to cause serious damage to patients would require physical device access.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
GE Ultrasound Gear Riddled With Bugs, Open to Ransomware & Data Theft
Thankfully, GE ultrasounds aren't Internet-facing. Exploiting most of the bugs to cause serious damage to patients would require physical device access.
π΅οΈββοΈ Santander Falls Victim to Data Breach Involving Third-Party Provider π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The company reports that customers based in Chile, Spain, and Uruguay were the primary victims of the breach, alongside some former employees of the global bank.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Santander Falls Victim to Data Breach Involving Third-Party Provider
The company reports that customers based in Chile, Spain, and Uruguay were the primary victims of the breach, alongside some former employees of the global bank.
π΅οΈββοΈ Addressing the Cybersecurity Vendor Ecosystem Disconnect π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
How security teams can bridge the gap between shortterm profits and longterm business needs.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Addressing the Cybersecurity Vendor Ecosystem Disconnect
How security teams can bridge the gap between short-term profits and long-term business needs.
π½ Daily Leaks β Canada & China π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
In a Telegram group, two important data advertised by threat actors. The first one is 13 million pieces of Canadian homeowners PII. It is claimed that the data includes first name, last name, street Address, address 2, city, province, postal code, phone, income, age, sex, home ownership, language, family status,.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Be4Sec
Daily Leaks β Canada & China
In a Telegram group, two important data advertised by threat actors. The first one is 13 million pieces of Canadian homeownersβ PII. It is claimed that the data includes first name, last name, streβ¦
π’ Hackers are targeting Windows Quick Assist remote desktop features to deploy ransomware π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Remote access tools such as Windows Quick Assist continue to be a key target for threat actors, with Microsoft issuing another warning about the risk of ransomware attacks.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ποΈ CISA Warns of Actively Exploited D-Link Router Vulnerabilities - Patch Now ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday added two security flaws impacting DLink routers to its Known Exploited Vulnerabilities KEV catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows CVE2014100005 A crosssite request forgery CSRF vulnerability impacting DLink DIR600 routers that allows an.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ Why siloed thinking could be undermining your zero trust strategy π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Despite the majority of businesses now moving towards a zero trust strategy, a siloed view of security means many are unable to fully embrace everything the technology has to offer.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Why siloed thinking could be undermining your zero trust strategy
Despite the majority of businesses now moving towards a zero trust strategy, a siloed view of security means many are unable to fully embrace everything the technology has to offer
π¦Ώ Restore Damaged Files & Save Your Business for Only $50 π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Regardless of how badly your files, or their formats, are damaged, EaseUS Fixo can restore your office files, videos and photos, even in batches. Get a lifetime subscription for 49.99 at TechRepublic Academy.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Restore Damaged Files & Save Your Business for Only $50
Regardless of how badly your files, EaseUS Fixo can restore them, even in batches. Get a lifetime subscription for $49.99.