π Falco 0.38.0 π
π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Packetstormsecurity
Falco 0.38.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π¦Ώ What Is ShrinkLocker? New Ransomware Targets Microsoft BitLocker Encryption Feature π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
The malware exploits Windows BitLocker to encrypt corporate files.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
What Is ShrinkLocker? New Ransomware Targets Microsoft BitLocker Encryption Feature
The ShrinkLocker ransomware exploits the BitLocker feature on enterprise PCs to encrypt the entire local drive and remove recovery options.
βοΈ βOperation Endgameβ Hits Malware Delivery Platforms βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the most popular cybercrime platforms for delivering ransomware and datastealing malware. Dubbed "the largest ever operation against botnets," the international effort is being billed as the opening salvo in an ongoing campaign targeting advanced malware "droppers" or "loaders" like IcedID, Smokeloader and Trickbot.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
βOperation Endgameβ Hits Malware Delivery Platforms
Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the most popular cybercrime platforms for delivering ransomware and data-stealing malware. Dubbed "the largest ever operationβ¦
ποΈ RedTail Crypto-Mining Malware Exploiting Palo Alto Networks Firewall Vulnerability ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security flaw impacting Palo Alto Networks firewalls to its exploit arsenal. The addition of the PANOS vulnerability to its toolkit has been complemented by updates to the malware, which now incorporates new antianalysis techniques, according to findings from web infrastructure and security.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π First American Reveals Data Breach Impacting 44,000 Individuals π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The cyberattack, which occurred in December 2023, forced First American to shut down some systems.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
First American Reveals Data Breach Impacting 44,000 Individuals
The cyber-attack, which occurred in December 2023, forced First American to shut down some systems
π΅οΈββοΈ Okta Warns Once Again of Credential-Stuffing Attacks π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
This time it's the identity management service provider's crossorigin authentication feature that's being targeted by adversaries.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Okta Warns Once Again of Credential-Stuffing Attacks
This time it's the identity management service provider's cross-origin authentication feature that's being targeted by adversaries.
π§ Important details about CIRCIA ransomware reporting π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
In March 2022, the Biden Administration signed into law the Cyber Incident Reporting for Critical Infrastructure Act of 2022 CIRCIA. This landmark legislation tasks the Cybersecurity and Infrastructure Security Agency CISA to develop and implement regulations requiring covered entities to report covered cyber incidents and ransomware payments. The CIRCIA incident reports are meant to enable The post Important details about CIRCIA ransomware reporting appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
Important details about CIRCIA ransomware reporting
CIRCIA and its newly published Notice of Proposed Rulemaking will have many implications for how organizations must report ransomware attacks.
ποΈ Cyber Espionage Alert: LilacSquid Targets IT, Energy, and Pharma Sectors ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A previously undocumented cyber espionagefocused threat actor named LilacSquid has been linked to targeted attacks spanning various sectors in the United States U.S., Europe, and Asia as part of a data theft campaign since at least 2021. "The campaign is geared toward establishing longterm access to compromised victim organizations to enable LilacSquid to siphon data of interest to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Europol-Led Operation Endgame Hits Botnet, Ransomware Networks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The operation targeted several significant malware droppers, including IcedID, SystemBC, Pikabot, Smokeloader and Bumblebee.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Europol-Led Operation Endgame Hits Botnet, Ransomware Networks
The operation targeted several significant malware droppers, including IcedID, SystemBC, Pikabot, Smokeloader and Bumblebee
ποΈ FlyingYeti Exploits WinRAR Vulnerability to Deliver COOKBOX Malware in Ukraine ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cloudflare on Thursday said it took steps to disrupt a monthlong phishing campaign orchestrated by a Russiaaligned threat actor called FlyingYeti targeting Ukraine. "The FlyingYeti campaign capitalized on anxiety over the potential loss of access to housing and utilities by enticing targets to open malicious files via debtthemed lures," Cloudflare's threat intelligence team Cloudforce One.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ CISA Alerts Federal Agencies to Patch Actively Exploited Linux Kernel Flaw ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday added a security flaw impacting the Linux kernel to the Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. Tracked as CVE20241086 CVSS score 7.8, the highseverity issue relates to a useafterfree bug in the netfilter component that permits a local attacker to elevate privileges.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ Cops Swarm Global Cybercrime Botnet Infrastructure in 2 Massive Ops π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Europol undertook dropper malware botnet takedown while US law enforcement dismantled a sprawling cybercrime botnet for hire.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Cops Swarm Global Cybercrime Botnet Infrastructure in 2 Massive Ops
Europol undertook dropper malware botnet takedown while US law enforcement dismantled a sprawling cybercrime botnet for hire.
π΅οΈββοΈ Flawed AI Tools Create Worries for Private LLMs, Chatbots π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Companies are looking to large language models to help their employees glean information from unstructured data, but vulnerabilities could lead to disinformation and, potentially, data leaks.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Flawed AI Tools Create Worries for Private LLMs, Chatbots
Companies are looking to large language models to help their employees glean information from unstructured data, but vulnerabilities could lead to disinformation and, potentially, data leaks.
π¦Ώ Proofpointβs CISO 2024 Report: Top Challenges Include Human Error & Risk π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
This new report also indicates an increasing attack surface as putting pressure on CISOs. One positive note is CISOs' improving relationships with board members.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk
This new report also indicates an increasing attack surface as putting pressure on CISOs. One positive note is CISOs' improving relationships with board members.
𧨠What You Need to Know About Election Security π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
As election season approaches, the importance of safeguarding our democratic processes has never been more critical. Ensuring election security is... The post What You Need to Know About Election Security appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
What You Need to Know About Election Security | McAfee
Voters are gearing themselves for the 2024 U.S. presidential elections. Whether youβre a new voter or a parent looking to guide your family members on exercising their right to vote, consumers can be certain about one thing: election security should be topβ¦
π AI in HR: Is artificial intelligence changing how we hire employees forever? π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
AI in HR: Is artificial intelligence changing how we hire employees forever?
Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?
ποΈ OpenAI, Meta, TikTok Disrupt Multiple AI-Powered Disinformation Campaigns ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations IO originating from China, Iran, Israel, and Russia that sought to abuse its artificial intelligence AI tools to manipulate public discourse or political outcomes online while obscuring their true identity. These activities, which were detected over the past three months, used its AI models to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
π #Infosec2024: Why Cybersecurity is Critical for the 2024 Paris Olympics π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The large volume of attendees mixed with interconnected infrastructure provides opportunities for threat actors to wreak havoc during the Paris Olympics.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
#Infosec2024: Why Cybersecurity is Critical for the 2024 Paris Olympics
The large volume of attendees mixed with interconnected infrastructure provides opportunities for threat actors to wreak havoc during the Paris Olympics
π BBC Pension Scheme Breached, Exposing Employee Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The BBC said that personally identifiable information of current and former employees has been breached following an incident affecting its pension scheme.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
BBC Pension Scheme Breached, Exposing Employee Data
The BBC said that personally identifiable information of current and former employees has been breached following an incident affecting its pension scheme
π’ Mass exploitation of edge services could become the defacto attack vector for hackers in 2024 - research π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The start of 2024 saw a relative decline in phishing attacks as security hygiene and endpoint defenses broadly improve.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Mass exploitation of edge services could become the de facto attack vector for hackers in 2024
The start of 2024 saw a relative decline in phishing attacks as security hygiene and endpoint defenses broadly improve
ποΈ Russian Hackers Target Europe with HeadLace Malware and Credential Harvesting ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Russian GRUbacked threat actor APT28 has been attributed as behind a series of campaigns targeting networks across Europe with the HeadLace malware and credentialharvesting web pages. APT28, also known by the names BlueDelta, Fancy Bear, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422, is an advanced persistent threat APT group affiliated with.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1