π΅οΈββοΈ Europol's Hunt Begins for Emotet Malware Mastermind π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
International law enforcement Operation Endgame shifts its crackdown to focus on individual adversaries.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Europol's Hunt Begins for Emotet Malware Mastermind
International law enforcement Operation Endgame shifts its crackdown to focus on individual adversaries.
π΅οΈββοΈ Russia Aims Cyber Operations at Summer Olympics π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
As always, Russian APTs are hoping to foment unrest by stoking existing societal divides and fears, this time around the Olympics and EU politics and, concerns remain around physical disruption.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Russia Aims Cyber Operations at Summer Olympics
As always, Russian APTs are hoping to foment unrest by stoking existing societal divides and fears, this time around the Olympics and EU politics; and, concerns remain around physical disruption.
π1
π΅οΈββοΈ Atlassian Confluence High-Severity Bug Allows Code Execution π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Because of the role the Confluence Server plays in managing documentation and knowledge data bases, the researchers recommend users upgrade to patch CVE202421683 as soon as possible.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Atlassian Confluence High-Severity Bug Allows Code Execution
Because of the role the Confluence Server plays in managing documentation and knowledge data bases, the researchers recommend users upgrade to patch CVE-2024-21683 as soon as possible.
π΅οΈββοΈ Ways iOS Sideloading Can Be More Secure π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Sideloading apps is now possible on iOS devices, forcing Apple to add some security features in an attempt to mitigate the dangers of loading unknown apps.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Ways iOS Sideloading Can Be More Secure
Sideloading apps is now possible on iOS devices, forcing Apple to add some security features in an attempt to mitigate the dangers of loading unknown apps.
ποΈ Oracle WebLogic Server OS Command Injection Flaw Under Active Attack ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday added a security flaw impacting the Oracle WebLogic Server to the Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. Tracked as CVE20173506 CVSS score 7.4, the issue concerns an operating system OS command injection vulnerability that could be exploited to obtain unauthorized.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ DarkGate Malware Replaces AutoIt with AutoHotkey in Latest Cyber Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cyber attacks involving the DarkGate malwareasaservice MaaS operation have shifted away from AutoIt scripts to an AutoHotkey mechanism to deliver the last stages, underscoring continued efforts on the part of the threat actors to continuously stay ahead of the detection curve. The updates have been observed in version 6 of DarkGate released in March 2024 by its developer RastaFarEye, who.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π The murky world of password leaks β and how to check if youβve been hit π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky unless you know where to look.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
The murky world of password leaks β and how to check if youβve been hit
Credential leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky β unless you know where to look.
π #Infosec2024: Conflicts Drive DDoS Attack Surge in EMEA π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Akamai research found DDoS attacks in EMEA surpassed North America in Q1 2024, with ongoing conflicts helping driving a surge of incidents in the region.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
#Infosec2024: Conflicts Drive DDoS Attack Surge in EMEA
Akamai research found DDoS attacks in EMEA surpassed North America in Q1 2024, with ongoing conflicts helping driving a surge of incidents in the region
π #Infosec2024: UK Businesses Faced with Month-Long Recoveries from Supply Chain Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A new BlackBerry survey reveals frequent software supply chain attacks in the UK, highlighting the need for improved security measures and robust guidance for software vendors.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
#Infosec2024: UK Businesses Faced with Month-Long Recoveries from Supply Chain Attacks
A new BlackBerry survey reveals frequent software supply chain attacks in the UK, highlighting the need for improved security measures and robust guidance for software vendors
π’ Disgruntled ex-employees are using βweaponizedβ data subject access requests to pester firms π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Some disgruntled staff are using DSARs as a means to pressure former employers into a financial settlement.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Disgruntled ex-employees are using βweaponizedβ data subject access requests to pester firms
Some disgruntled staff are using DSARs as a means to pressure former employers into a financial settlement
π¦Ώ 6 Best VPNs for the UK in 2024 π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
VPN capabilities and performance levels differ from place to place. Which VPNs are best for U.K. users and expats?.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
6 Best VPNs for the UK
What are the top VPNs in the U.K.? Here are the best U.K. VPNs users should be looking at and the key features they should consider during VPN selection.
π¦Ώ How to Start a Career in Cybersecurity π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Cybersecurity is a booming career path for professionals looking to enhance the value of their skillsets in the 2020s. This guide, written by Madeline Clarke for TechRepublic Premium, highlights the methods people can take to begin a career in cybersecurity, provides expert insights from industry professionals and discusses the varying factors surrounding this lucrative area ...π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
How to Start a Career in Cybersecurity | TechRepublic
Cybersecurity is a booming career path for professionals looking to enhance the value of their skillsets in the 2020s. This guide, written by Madeline
ποΈ Snowflake Warns: Targeted Credential Theft Campaign Hits Cloud Customers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cloud computing and analytics company Snowflake said a "limited number" of its customers have been singled out as part of a targeted campaign. "We have not identified evidence suggesting this activity was caused by a vulnerability, misconfiguration, or breach of Snowflakes platform," the company said in a joint statement along with CrowdStrike and Googleowned Mandiant. "We have not identified.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π #Infosec24: Deepfake Expert Warns of βAI Tax Havensβ π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Keynote speaker Henry Ajder warns that regulatory measures may be undermined if some countries ignore global rules.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
#Infosec24: Deepfake Expert Warns of βAI Tax Havensβ
Keynote speaker Henry Ajder warns that regulatory measures may be undermined if some countries ignore global rules
ποΈ The Next Generation of RBI (Remote Browser Isolation) ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The landscape of browser security has undergone significant changes over the past decade. While Browser Isolation was once considered the gold standard for protecting against browser exploits and malware downloads, it has become increasingly inadequate and insecure in today's SaaScentric world. The limitations of Browser Isolation, such as degraded browser performance and inability to tackle.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Hackers Use MS Excel Macro to Launch Multi-Stage Malware Attack in Ukraine ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A new sophisticated cyber attack has been observed targeting endpoints geolocated to Ukraine with an aim to deploy Cobalt Strike and seize control of the compromised hosts. The attack chain, per Fortinet FortiGuard Labs, involves a Microsoft Excel file that carries an embedded VBA macro to initiate the infection, "The attacker uses a multistage malware strategy to deliver the notorious 'Cobalt.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ NIST Commits to Vulnerability Plan, But Researchers' Concerns Remain π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The agency aims to burn down the backlog of vulnerabilities that need enrichment using additional funding and a thirdparty contract, but what's the longterm solution?.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
NIST Commits to Plan to Resume NVD Work
The agency aims to burn down the backlog of vulnerabilities waiting to be added to the National Vulnerabilities Database via additional funding, third-party contract, and partnership with CISA.
π #Infosec24: Enterprise Browser Touted as Solution to GenAI Privacy Risks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Island Technologies discusses the security and user experience benefits of the enterprise browser.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
#Infosec24: Enterprise Browser Touted as Solution to GenAI Privacy Risks
Island Technologies discusses the security and user experience benefits of the enterprise browser
π¦
UNC1151 Strikes Again: Unveiling Their Tactics Against Ukraineβs Ministry of Defence π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways Cyble Research and Intelligence Labs CRIL recently encountered a campaign using a malicious Excel document linked to the UNC1151 APT group. The UNC1151 APT group, originating from Belarus, is notorious for targeting Eastern European countries, including Ukraine, Lithuania, Latvia, Poland, and others. In the recent campaign, there are indications that the group is possibly targeting Ukraine, with a potential focus on the Ministry of Defence based on the lure document. Upon execution of the lure Excel document, which contains an embedded VBA Macro content that drops an LNK and a DLL loader file. Subsequently, running the LNK file initiates the DLL loader, potentially leading to a final payload infection. In last year's campaign, the Threat Actor TA obtaine...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
UNC1151 Strikes Again: Tactics Against Ukraineβs Defence
Explore Cyble's findings on UNC1151's new malware campaign targeting Ukraine's Ministry of Defence via malicious Excel documents.
π΅οΈββοΈ Perfecting the Proactive Security Playbook π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
It's more important than ever for organizations to prepare themselves and their cybersecurity postures against known and unknown threats.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Perfecting the Proactive Security Playbook
It's more important than ever for organizations to prepare themselves and their cybersecurity postures against known and unknown threats.
π New Multi-Stage Malware Targets Windows Users in Ukraine π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Discovered by FortiGuard Labs, the attack leverages an Excel file embedded with a VBA macro.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New Multi-Stage Malware Targets Windows Users in Ukraine
Discovered by FortiGuard Labs, the attack leverages an Excel file embedded with a VBA macro