π #Infosec2024: Why Cybersecurity is Critical for the 2024 Paris Olympics π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The large volume of attendees mixed with interconnected infrastructure provides opportunities for threat actors to wreak havoc during the Paris Olympics.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
#Infosec2024: Why Cybersecurity is Critical for the 2024 Paris Olympics
The large volume of attendees mixed with interconnected infrastructure provides opportunities for threat actors to wreak havoc during the Paris Olympics
π BBC Pension Scheme Breached, Exposing Employee Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The BBC said that personally identifiable information of current and former employees has been breached following an incident affecting its pension scheme.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
BBC Pension Scheme Breached, Exposing Employee Data
The BBC said that personally identifiable information of current and former employees has been breached following an incident affecting its pension scheme
π’ Mass exploitation of edge services could become the defacto attack vector for hackers in 2024 - research π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The start of 2024 saw a relative decline in phishing attacks as security hygiene and endpoint defenses broadly improve.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Mass exploitation of edge services could become the de facto attack vector for hackers in 2024
The start of 2024 saw a relative decline in phishing attacks as security hygiene and endpoint defenses broadly improve
ποΈ Russian Hackers Target Europe with HeadLace Malware and Credential Harvesting ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Russian GRUbacked threat actor APT28 has been attributed as behind a series of campaigns targeting networks across Europe with the HeadLace malware and credentialharvesting web pages. APT28, also known by the names BlueDelta, Fancy Bear, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422, is an advanced persistent threat APT group affiliated with.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
ποΈ Beyond Threat Detection β A Race to Digital Security ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Digital content is a doubleedged sword, providing vast benefits while simultaneously posing significant threats to organizations across the globe. The sharing of digital content has increased significantly in recent years, mainly via email, digital documents, and chat. In turn, this has created an expansive attack surface and has made digital content the preferred carrier for cybercriminals.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ Data Privacy in the Age of GenAI π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Consumer data is still a prime target for threat actors, and organizational consumption of data must be aligned to protecting it. The new rights act seeks to do some of this, but it still needs tweaking.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Data Privacy in the Age of GenAI
Consumer data is still a prime target for threat actors, and organizational consumption of data must be aligned to protect it. The new rights act seeks to do some of this, but it still needs tweaking.
ποΈ Microsoft Warns of Surge in Cyber Attacks Targeting Internet-Exposed OT Devices ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Microsoft has emphasized the need for securing internetexposed operational technology OT devices following a spate of cyber attacks targeting such environments since late 2023. "These repeated attacks against OT devices emphasize the crucial need to improve the security posture of OT devices and prevent critical systems from becoming easy targets," the Microsoft Threat Intelligence team said.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π¦Ώ Top Tech Conferences & Events to Add to Your Calendar in 2024 π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
A great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our 2024 tech events guide.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Top Tech Conferences & Events to Add to Your Calendar in 2025
Discover the top tech conferences and events to add to your calendar in 2025, and stay updated on the latest trends and innovations.
π΅οΈββοΈ FlyingYeti APT Serves Up Cookbox Malware Using WinRAR π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The Russiaaligned FlyingYeti's phishing campaign exploited Ukrainian citizens' financial stress to spread Cookbox malware.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
FlyingYeti APT Serves Up Cookbox Malware Using WinRAR
The Russia-aligned FlyingYeti's phishing campaign exploited Ukrainian citizens' financial stress to spread Cookbox malware.
π’ Banking details of 30 million Santander customers exposed during breach allegedly up for sale on the dark web π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The ShinyHunters threat group claims to have financial data stolen during a data breach on 14 May after an attack on an unknown third party.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Banking details of 30 million Santander customers exposed during breach allegedly up for sale on the dark web
The ShinyHunters threat group claims to have financial data stolen during a data breach on 14 May after an attack on an unknown third party
π RansomLord Anti-Ransomware Exploit Tool 3.1 π
π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
RansomLord is a proofofconcept tool that automates the creation of PE files, used to compromise ransomware preencryption. This tool uses dll hijacking to defeat ransomware by placing PE files in the x32 or x64 directories where the program is run from.π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Packetstormsecurity
RansomLord Anti-Ransomware Exploit Tool 3.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π1
π jSQL Injection 0.97 π
π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Packetstormsecurity
jSQL Injection 0.97 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ποΈ Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S. ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
More than 600,000 small officehome office SOHO routers are estimated to have been bricked and taken offline following a destructive cyber attack staged by unidentified cyber actors, disrupting users' access to the internet. The mysterious event, which took place between October 25 and 27, 2023, and impacted a single internet service provider ISP in the U.S., has been codenamed Pumpkin.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ OpenAI Disrupts 5 AI-Powered, State-Backed Influence Ops π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Most of the operations were feckless efforts with little impact, but they illustrate how AI is changing the game for inauthentic content on both the adversary and defense sides.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
OpenAI Disrupts 5 AI-Powered, State-Backed Influence Ops
Most of the operations were feckless efforts with little impact, but they illustrate how AI is changing the game for inauthentic content on both the adversary and defense sides.
π΅οΈββοΈ BBC Breach Puts 25K Pension Scheme Members at Risk π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Though information such as dates of birth, email addresses, and home addresses were compromised, "the Beeb" assures individuals that financial information is still protected.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
BBC Breach Puts 25K Pension Scheme Members at Risk
Though information such as dates of birth, email addresses, and home addresses were compromised, "the Beeb" assures individuals that financial information is still protected.
π€―1
π΅οΈββοΈ LilacSquid APT Employs Open Source Tools, QuasarRAT π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The previously unknown threat actor uses tools similar to those used by North Korean APT groups, according to Cisco Talos.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
LilacSquid APT Employs Open Source Tools, QuasarRAT
The previously unknown threat actor uses tools similar to those used by North Korean APT groups, according to Cisco Talos.
π1
π¦Ώ International Malware Takedown Seized 100+ Servers π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Operation Endgame is an ongoing effort to disrupt botnets, malware droppers and malwareasaservice.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
International Malware Takedown Seized 100+ Servers
βOperation Endgameβ is an ongoing, law enforcement effort to disrupt botnets, malware droppers and malware-as-a-service.
𧨠Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
Authored by Dexter Shin Many government agencies provide their services online for the convenience of their citizens. Also, if this... The post Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud | McAfee Blog
Authored by Dexter Shin Many government agencies provide their services online for the convenience of their citizens. Also, if this service could be
π What happens when facial recognition gets it wrong β Week in security with Tony Anscombe π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
A woman in London has been misidentified as a shoplifter by a facial recognition system amid fresh concerns over the technology's accuracy and reliability.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
What happens when facial recognition gets it wrong β Week in security with Tony Anscombe
A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability
ποΈ AI Company Hugging Face Notifies Users of Suspected Unauthorized Access ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Artificial Intelligence AI company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform earlier this week. "We have suspicions that a subset of Spaces secrets could have been accessed without authorization," it said in an advisory. Spaces offers a way for users to create, host, and share AI and machine learning ML applications. It also functions as a.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ As Allies, Kenya & US Aim to Bolster Digital Security in Africa π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect the country's fastgrowing digital economy.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
As Allies, Kenya & US Aim to Bolster Digital Security in Africa
Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect the country's fast-growing digital economy.