π Novel Phishing Method Used in Android/iOS Financial Fraud Campaigns π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
ESET detected a new phishing technique using progressive web applications PWAs as part of a largescale mobile financial scam.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Novel Phishing Method Used in Android/iOS Financial Fraud Campaigns
ESET detected a new phishing technique using progressive web applications (PWAs) as part of a large-scale mobile financial scam
π¦
Surge in Software Supply Chain Attacks Demands Heightened Third-Party Vigilance π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways Attacks on the software supply chain have occurred at a rate of at least one every two days in 2024. U.S. companies and IT providers have been by far the most frequent targets, accounting for onethird of all software supply chain attacks. The UK, Australia, Germany, India and Japan have also been frequent targets, as have the aerospace defense, healthcare and manufacturing sectors. These attacks are particularly damaging and costly because of their multiplication factor on downstream victims and trusted access to customer environments. Even when the codebase isnt breached, customer databases contain critical information for threat actors to use in phishing, spoofing and credential attacks. A defenseindepth approach is required to reduce risk, based on...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Rise In Supply Chain Attacks Calls For More Vigilance
Supply chain cyberattacks surged in 2024, targeting US IT firms and global sectors like healthcare and defense. Zero trust and resilience are vital.
ποΈ GiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A maximumseverity security flaw has been disclosed in the WordPress GiveWP donation and fundraising plugin that exposes more than 100,000 websites to remote code execution attacks. The flaw, tracked as CVE20245932 CVSS score 10.0, impacts all versions of the plugin prior to version 3.14.2, which was released on August 7, 2024. A security researcher, who goes by the online alias villu164,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
ποΈ CERT-UA Warns of New Vermin-Linked Phishing Attacks with PoW Bait ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Computer Emergency Response Team of Ukraine CERTUA has warned of new phishing attacks that aim to infect devices with malware. The activity has been attributed to a threat cluster it tracks as UAC0020, which is also known as Vermin. The exact scale and scope of the attacks are presently unknown. The attack chains commence with phishing messages with photos of alleged prisoners of war .π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Most Ransomware Attacks Now Happen at Night π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Malwarebytes report warns security teams to be on high alert for ransomware attacks at night.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Most Ransomware Attacks Now Happen at Night
Malwarebytes report warns security teams to be on high alert for ransomware attacks at night
π¦Ώ The 6 Best Malware Removal Software Providers for 2024 π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Compare the top six malware removal software for 2024. Bitdefender leads, with Norton and Malwarebytes as strong contenders.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
The 6 Best Malware Removal Software Providers for 2024
Compare the top six malware removal software for 2024. Bitdefender leads, with Norton and Malwarebytes as strong contenders.
β€1
ποΈ It's Time To Untangle the SaaS Ball of Yarn ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
It's no great revelation to say that SaaS applications have changed the way we operate, both in our personal and professional lives. We routinely rely on cloudbased and remote applications to conduct our basic functions, with the result that the only true perimeter of our networks has become the identities with which we log into these services. Unfortunately as is so often the case our.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Styx Stealer Creator's OPSEC Fail Leaks Client List and Profit Details ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
In what's a case of an operational security OPSEC lapse, the operator behind a new information stealer called Styx Stealer leaked data from their own computer, including details related to the clients, profit information, nicknames, phone numbers, and email addresses. Styx Stealer, a derivative of the Phemedrone Stealer, is capable of stealing browser data, instant messenger sessions from.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ New macOS Malware TodoSwift Linked to North Korean Hacking Groups ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have uncovered a new macOS malware strain dubbed TodoSwift that they say exhibits commonalities with known malicious software used by North Korean hacking groups. "This application shares several behaviors with malware we've seen that originated in North Korea DPRK specifically the threat actor known as BlueNoroff such as KANDYKORN and RustBucket," Kandji security.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π CISA to Get New Headquarters as $524M Contract Awarded π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The building, located in Washington, DC, will be the new home of the US Cybersecurity and Infrastructure Security.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
CISA to Get New Headquarters as $524M Contract Awarded
The building, located in Washington, DC, will be the new home of the US Cybersecurity and Infrastructure Security
π Healthcare Hit by a Fifth of Ransomware Incidents π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Healthcare has been the most targeted sector according to Barracuda analysis of 200 reported ransomware incidents from August 2023 to July 2024.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Healthcare Hit by a Fifth of Ransomware Incidents
Healthcare has been the most targeted sector according to Barracuda analysis of 200 reported ransomware incidents from August 2023 to July 2024
π Most Ransomware Attacks Now Happen at Night π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Malwarebytes report warns security teams to be on high alert for ransomware attacks at night.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Most Ransomware Attacks Now Happen at Night
Malwarebytes report warns security teams to be on high alert for ransomware attacks at night
π Microchip Technology Says IT Incident Impacted Operations π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
US chip firm Microchip reveals operational disruption stemming from cyber incident.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Microchip Technology Says IT Incident Impacted Operations
US chip firm Microchip reveals operational disruption stemming from cyber incident
π’ The top API risks of 2024 and how to mitigate them π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
While APIs are the backbone of online applications, they can offer a backdoor to sensitive information making API monitoring by IT teams an absolute imperative.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
The top API risks of 2024 and how to mitigate them
While APIs are the backbone of online applications, they can offer a backdoor to sensitive information β making API monitoring by IT teams an absolute imperative
π’ NIS2 is a double-edged sword for the IT channel π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
NIS2 presents demanding new compliance obligations for channel partners, but it's vital if they are going to build the resilience they need in today's threat landscape.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
channelpro
NIS2 is a double-edged sword for the IT channel
NIS2 presents demanding new compliance obligations for channel partners, but it's vital if they are going to build the resilience they need in today's threat landscape
π’ Toyotaβs cyber woes continue as latest breach marks fifth major IT incident in two years π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Toyota is once again in the headlines after a hacker collective claimed to have exfiltrated 240GB of sensitive data from the car manufacturers internal systems.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Toyotaβs cyber woes continue as latest breach marks fifth major IT incident in two years
Toyota is once again in the headlines after a hacker collective claimed to have exfiltrated 240GB of sensitive data from the car manufacturerβs internal systems
π’ Ransomware gangs are rolling in cash, with hackers taking home $459.8 million in the first half of 2024 alone π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Ransomware criminals are ramping up attacks globally and reaping the financial rewards.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Ransomware gangs are rolling in cash, with hackers taking home $459.8 million in the first half of 2024 alone
Ransomware criminals are ramping up attacks globally and reaping the financial rewards
π Australia Calls Off Clearview AI Investigation Despite Lack of Compliance π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Australias data protection watchdog has decided to stop its investigation into US facial recognition company Clearview AI.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Australia Calls Off Clearview AI Investigation Despite Lack of Compliance
Australiaβs data protection watchdog has decided to stop its investigation into US facial recognition company Clearview AI
π Oregon Zoo Warns Over 100,000 Customers of Payment Card Compromise π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Oregon Zoo revealed that an unauthorized actor potentially obtained payment card information used in transactions over six months.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Oregon Zoo Warns Over 100,000 Customers of Payment Card Compromise
Oregon Zoo revealed that an unauthorized actor potentially obtained payment card information used in transactions over six months
π¦Ώ More than 3 in 4 Tech Leaders Worry About SaaS Security Threats, New Survey Reveals π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
The average enterprise uses 130 different SaaS applications today, up from 80 in 2020, according to Onymos.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
More than 3 in 4 Tech Leaders Worry About SaaS Security Threats, New Survey Reveals
A new survey found that 78% of tech leaders are worried about SaaS security threats β and their concerns could worsen as more SaaS apps find their way into the enterprise.
π New MoonPeak RAT Linked to North Korean Threat Group UAT-5394 π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The MoonPeak RAT as used by UAT5394 showed a possible connection to North Korean threat Kimsuky.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New MoonPeak RAT Linked to North Korean Threat Group UAT-5394
The MoonPeak RAT as used by UAT-5394 showed a possible connection to North Korean threat Kimsuky
π1