π¦
#FreeDurov: Hacktivists Scramble on Telegram Supporting Pavelβs Release π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Executive Summary The arrest of Telegram's founder and CEO, Pavel Durov, on August 24, 2024, due to allegations that his messaging platform has been used for various illicit activities has sparked significant international attention and debate, particularly around issues of freedom of speech and the responsibilities of social media platforms. Conversely, the arrest has also incited the ire of several hacktivist groups in cyberspace because, for many in this community, Durov is more than just a tech entrepreneur he is the mastermind behind two pivotal communication platforms in their lives Vkontakte, Russias answer to Facebook, and the anonymous messaging app Telegram. Vkontakte played a significant role in fostering communication and forming groups within hacktivist collectives....π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
#FreeDurov: Hacktivists Rally For Pavel's Release
Telegram's founder, Pavel Durov, was arrested on August 24, 2024, sparking global debate on free speech, privacy, and social media responsibility.
π΅οΈββοΈ How Telecom Vulnerabilities Can Be a Threat to Cybersecurity Posture π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Telecombased attacks such as SMS toll fraud and 2FA hijacking have evolved into a mainstream concern for CISOs.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
How Telecom Vulnerabilities Can Be a Threat to Cybersecurity Posture
Telecom-based attacks such as SMS toll fraud and 2FA hijacking have evolved into a mainstream concern for CISOs.
π΅οΈββοΈ Dragos Expands Asset Visibility in Latest Platform Update π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The latest release of the Dragos Platform provide industrial and critical infrastructure organizations with complete and enriched view of their OT environment.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Dragos Expands Asset Visibility in Latest Platform Update
The latest release of the Dragos Platform provide industrial and critical infrastructure organizations with complete and enriched view of their OT environment.
π¦Ώ Volt Typhoon Hackers Exploit Zero-Day Vulnerability in Versa Director Servers Used by MSPs, ISPs π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
There are approximately 163 devices worldwide that are still exposed to attack via the CVE202439717 vulnerability.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Volt Typhoon Hackers Exploit Zero-Day Vulnerability in Versa Director Servers Used by MSPs, ISPs
The Volt Typhoon hacking group has been caught exploiting a zero-day vulnerability in Versa Director servers..
π1
π΅οΈββοΈ Brazilian Ad Fraud Network 'Camu' Hits 2B+ Daily Bid Requests π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The global Internet helps just about everything to scale more easily, including piracy and ad fraud.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Brazilian Ad Fraud Network 'Camu' Hits 2B+ Daily Bid Requests
The global Internet helps just about everything to scale more easily, including piracy and ad fraud.
π΅οΈββοΈ Top Travel Sites Have Some First-Class Security Issues to Clean Up π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Publicfacing vulnerabilities, cloud sprawl, access to backend servers are just a few of the challenges travel and hospitality companies must address.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Top Travel Sites Have Some First-Class Security Issues to Clean Up
Public-facing vulnerabilities, cloud sprawl, access to back-end servers are just a few of the challenges travel and hospitality companies must address.
π΅οΈββοΈ Exploited: CISA Highlights Apache OFBiz Flaw After PoC Emerges π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The vulnerability carries nearly the highest score possible on the CVSS scale, at 9.8, impacting a system used by major companies around the world.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Exploited: CISA Highlights Apache OFBiz Flaw After PoC Emerges
The vulnerability carries nearly the highest score possible on the CVSS scale, at 9.8, impacting a system used by major companies around the world.
π¦Ώ Threat Actors Exploit Microsoft Sway to Host QR Code Phishing Campaigns π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Threat actors are abusing Microsoft Sway to host QR Code phishing campaigns.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Threat Actors Exploit Microsoft Sway to Host QR Code Phishing Campaigns
Threat actors are abusing Microsoft Sway to host QR Code phishing campaigns.
π΅οΈββοΈ Cyber Insurance: A Few Security Technologies, a Big Difference in Premiums π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Ransomware attacks and emailbased fraud account for 80 to 90 of all claims processed by cyber insurers, but a handful of cybersecurity technologies can help prevent big damages.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Cyber Insurance: A Few Security Technologies, a Big Difference in Premiums
Ransomware attacks and email-based fraud account for 80% to 90% of all claims processed by cyber insurers, but a handful of cybersecurity technologies can help prevent big damages.
π΅οΈββοΈ Iran's 'Fox Kitten' Group Aids Ransomware Attacks on US Targets π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
In a joint advisory, CISA and the FBI described the activity as a likely attempt by the group to monetize access to networks it already has compromised.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Iran's 'Fox Kitten' Group Aids Ransomware Attacks on US Targets
In a joint advisory, CISA and the FBI described the activity as a likely attempt by the group to monetize access to networks it already has compromised.
π’ Everything you need to know about RansomHub, the new force in the digital extortion industry π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
A host of security agencies have issued a warning over RansomHub in recent months, but what's behind the group's rise to prominence?.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Everything you need to know about RansomHub, the new force in the digital extortion industry
A host of security agencies have issued a warning over RansomHub in recent months, but what's behind the group's rise to prominence?
π’ UK law firms are facing a torrent of cyber threats β hereβs why π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Cyber criminals are targeting the sensitive customer data UK law firms hold for ransomware attacks or blackmail.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
UK law firms are facing a torrent of cyber threats β hereβs why
Cyber criminals are targeting the sensitive customer data UK law firms hold for ransomware attacks or blackmail
π΅οΈββοΈ Check Point, Cisco Boost AI Investments With Latest Deals π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Cisco's deal to acquire Robust Intelligence will make it possible to use redteam algorithms to assess risk in AI models and applications, while Check Point's acquisition of Cyberint will add threat intelligence to its SOC platform.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Check Point, Cisco Boost AI Investments With Latest Deals
Cisco's deal to acquire Robust Intelligence will make it possible to use red-team algorithms to assess risk in AI models and applications, while Check Point's acquisition of Cyberint will add threat intelligence to its SOC platform.
π΅οΈββοΈ Commercial Spyware Vendors Have a Copycat in Top Russian APT π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Russia's Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using wateringhole tactics.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Commercial Spyware Vendors Have a Copycat in Top Russian APT
Russia's Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using watering-hole tactics.
π΅οΈββοΈ 'Voldemort' Malware Curses Orgs Using Global Tax Authorities π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The global malware campaign that must not be named? is targeting organizations by impersonating tax authorities, and using custom tools like Google Sheets for command and control.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
'Voldemort' Malware Curses Orgs Using Global Tax Authorities
The global malware campaign (that must not be named?) is targeting organizations by impersonating tax authorities, and using custom tools like Google Sheets for command and control.
π΅οΈββοΈ NASA Focuses on Cybersecurity of its Mission-Critical Software π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The software verification and validation efforts helps NASA improve the safety and costeffectiveness of its mission critical software. Cybersecurity is now part of the evaluation.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
NASA Focuses on Cybersecurity of Its Mission-Critical Software
The software verification and validation efforts helps NASA improve the safety and cost-effectiveness of its mission-critical software. Cybersecurity is now part of the evaluation.
π΅οΈββοΈ Why Identity Teams Need to Start Reporting to the CISO π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it's time identity security was owned by a leader with a security background, like the CISO.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Why Identity Teams Need to Start Reporting to the CISO
Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it's time identity security was owned by a leader with a security background, like the CISO.
π GNUnet P2P Framework 0.22.0 π
π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
GNUnet is a peertopeer framework with focus on providing security. All peertopeer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP IPv4 and IPv6, TCP IPv4 and IPv6, HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
packetstorm.news
Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers
ποΈ Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a commandandcontrol C2 mechanism. The activity, detected by Proofpoint starting August 5, 2024, impersonates tax authorities from governments in Europe, Asia, and the U.S., with the goal of targeting over 70 organizations worldwide by means of a bespoke tool called Voldemort that's equipped to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Iranian Hackers Set Up New Network to Target U.S. Political Campaigns ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent targeting of U.S. political campaigns. Recorded Future's Insikt Group has linked the infrastructure to a threat it tracks as GreenCharlie, an Irannexus cyber threat group that overlaps with APT42, Charming Kitten, Damselfly, Mint Sandstorm formerly.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Breaking Down AD CS Vulnerabilities: Insights for InfoSec Professionals ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The most dangerous vulnerability youve never heard of. In the world of cybersecurity, vulnerabilities are discovered so often, and at such a high rate, that it can be very difficult to keep up with. Some vulnerabilities will start ringing alarm bells within your security tooling, while others are far more nuanced, but still pose an equally dangerous threat. Today, we want to discuss one of.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity