π΅οΈββοΈ Microsoft Has Yet to Patch 7 Pwn2Own Zero-Days π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
A number of serious Windows bugs still haven't made their way into criminal circles, but that won't remain the case forever and time is running short before ZDI releases exploit details.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Microsoft Has Yet to Patch 7 Pwn2Own Zero-Days
A number of serious Windows bugs still haven't made their way into criminal circles, but that won't remain the case forever β and time is running short before ZDI releases exploit details.
ποΈ New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A new report from XM Cyber has found among other insights a dramatic gap between where most organizations focus their security efforts, and where the most serious threats actually reside. The new report, Navigating the Paths of Risk The State of Exposure Management in 2024, is based on hundreds of thousands of attack path assessments conducted by the XM Cyber.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have shed more light on a remote access trojan RAT known as Deuterbear used by the Chinalinked BlackTech hacking group as part of a cyber espionage campaign targeting the AsiaPacific region this year. "Deuterbear, while similar to Waterbear in many ways, shows advancements in capabilities such as including support for shellcode plugins, avoiding handshakes.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ LockBit leader revealed: What it means for ransomware π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
With LockBit's founder having been unveiled publicly and with international law enforcement still digging into detailed attack stats, the group is on high alert.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
LockBit leader revealed: What it means for ransomware
With LockBit's founder having been unveiled publicly and with international law enforcement still digging into detailed attack stats, the group is on high alert
π New Android Banking Trojan Mimics Google Play Update App π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A new banking Trojan targeting Android devices shows multifaceted capabilities.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New Android Banking Trojan Mimics Google Play Update App
A new banking Trojan targeting Android devices shows multifaceted capabilities
π§ How a new wave of deepfake-driven cybercrime targets businesses π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
As deepfake attacks on businesses dominate news headlines, detection experts are gathering valuable insights into how these attacks came into being and the vulnerabilities they exploit. Between 2023 and 2024, frequent phishing and social engineering campaigns led to account hijacking and theft of assets and data, identity theft, and reputational damage to businesses across industries. The post How a new wave of deepfakedriven cybercrime targets businesses appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
How a new wave of deepfake-driven cyber crime targets businesses
Dive into the world of deepfakes β how these attacks came into being and how to detect this dangerous synthesized content.
π¦Ώ Black Basta Ransomware Struck More Than 500 Organizations Worldwide π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Read about Black Basta ransomwares impact and how to mitigate it. Plus, learn about recent ransomware trends.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Black Basta Ransomware Struck More Than 500 Organizations Worldwide
Read about Black Basta ransomwareβs impact and how to mitigate it. Plus, learn about recent ransomware trends.
π UK Councils Warn of Data Breach After Attack on Medical Supplier π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Multiple UK councils have warned that residents personal data may have been compromised following a ransomware attack on NRS Healthcare.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
UK Councils Warn of Data Breach After Attack on Medical Supplier
Multiple UK councils have warned that residentsβ personal data may have been compromised following a ransomware attack on NRS Healthcare
π΅οΈββοΈ Whose Data Is It Anyway? Equitable Access in Cybersecurity π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Cybersecurity cannot be solely about defending against threats it must also empower organizations with their data.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Whose Data Is It Anyway? Equitable Access in Cybersecurity
Cybersecurity cannot be solely about defending against threats; it must also empower organizations with their data.
π΅οΈββοΈ CISOs and Their Companies Struggle to Comply With SEC Disclosure Rules π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Most companies still can't determine whether a breach is material within the four days mandated by the SEC, skewing incident response.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
CISOs and Their Companies Struggle to Comply With SEC Disclosure Rules
Most companies still can't determine whether a breach is material within the four days mandated by the SEC, skewing incident response.
π΅οΈββοΈ 400K Linux Servers Recruited by Resurrected Ebury Botnet π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Cryptocurrency theft and financial fraud are the new M.O. of the 15yearold malware operation that has hit organizations around the globe.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
400K Linux Servers Recruited by Resurrected Ebury Botnet
Cryptocurrency theft and financial fraud are the new M.O. of the 15-year-old malware operation that has hit organizations around the globe.
π Zeek 6.0.4 π
π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyberinfrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and openscience communities. This is the source code release.π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Packetstormsecurity
Zeek 6.0.4 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ποΈ Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The cryptojacking group known as Kinsing has demonstrated its ability to continuously evolve and adapt, proving to be a persistent threat by swiftly integrating newly disclosed vulnerabilities to exploit arsenal and expand its botnet. The findings come from cloud security firm Aqua, which described the threat actor as actively orchestrating illicit cryptocurrency mining.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
𧨠How to Protect Yourself on Social Networks π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
There are now over 5 billion active social media users worldwide, representing 62.3 of the global population. While social networks... The post How to Protect Yourself on Social Networks appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
How to Protect Yourself on Social Networks | McAfee Blog
There are now over 5 billion active social media users worldwide, representing 62.3% of the global population. While social networks serve as valuable
π΅οΈββοΈ SEC Adds New Incident Response Rules for Financial Sector π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Financial firms covered under new regulations will be required to establish a clear response and communications plan for customer data breaches.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
SEC Adds New Incident Response Rules for Financial Sector
Financial firms covered under new regulations will be required to establish a clear response and communications plan for customer data breaches.
π΅οΈββοΈ 10 Ways a Digital Shield Protects Apps and APIs π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Layers of protection can bring defenseindepth practices to distributed clouds and other modern network architectures.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
10 Ways a Digital Shield Protects Apps and APIs
Layers of protection can bring defense-in-depth practices to distributed clouds and other modern network architectures.
π΅οΈββοΈ Intel Discloses Max Severity Bug in Its AI Model Compression Software π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The improper input validation issue in Intel Neural Compressor enables remote attackers to execute arbitrary code on affected systems.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Intel Discloses Max Severity Bug in Its AI Model Compression Software
The improper input validation issue in Intel Neural Compressor enables remote attackers to execute arbitrary code on affected systems.
π1
π΅οΈββοΈ CISO Corner: What Cyber Labor Shortage?; Trouble Meeting SEC Disclosure Deadlines π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included DR's podcast on the CISO the SEC breaking down CISA's Secure by Design Pledge Singapore puts cloud providers on notice.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
CISO Corner: What Cyber Labor Shortage?; SEC Deadlines
Our reporting and industry perspectives for cybersecurity professionals focused on SecOps. Also: DR's new podcast; CISA's Secure by Design Pledge.
π΅οΈββοΈ CISOs Grapple With IBM's Unexpected Cybersecurity Software Exit π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
IBM's abrupt divestiture of QRadar SaaS underscores the consolidation of SIEM, XDR, and AI technologies into unified platforms.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
CISOs Grapple With IBM's Unexpected Cybersecurity Software Exit
IBM's abrupt divestiture of QRadar SaaS underscores the consolidation of SIEM, XDR, and AI technologies into unified platforms.
π The who, where, and how of APT attacks β Week in security with Tony Anscombe π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
The who, where, and how of APT attacks β Week in security with Tony Anscombe
This week, ESET experts released several research publications that shone the spotlight on a number of notable attacks and broader developments on the threat landscape
ποΈ Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The threat actors behind the Windowsbased Grandoreiro banking trojan have returned in a global campaign since March 2024 following a law enforcement takedown in January. The largescale phishing attacks, likely facilitated by other cybercriminals via a malwareasaservice MaaS model, target over 1,500 banks across the world, spanning more than 60 countries in Central and South.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity