π¦
Critical Advisory on RansomHub Ransomware: A Comprehensive Analysis and Mitigation Guide π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways RansomHub ransomware emerged in February 2024 and has rapidly become a significant threat, targeting a wide range of sectors, including critical infrastructure like water treatment, healthcare, and government services. RansomHub uses a doubleextortion model, encrypting data and exfiltrating it to demand ransoms. Victims must pay not only to regain access to their encrypted data but also to prevent the public release of stolen information. Cybles Vision platform reported that the ransomware employs sophisticated techniques, such as exploiting zeroday vulnerabilities like Zerologon and using advanced data exfiltration methods. It utilizes tools for scanning networks, mapping potential targets, and evading detection. RansomHub affiliates gain access through phish...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Critical Advisory On RansomHub Ransomware - Cyble
Cybersecurity agencies reveal new advisory for the RansomHub ransomware, detailing its double-extortion tactics, advanced techniques, and global impact.
π¦
ManticoraLoader: New Loader Announced from the Developers of AresLoader π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble Research Intelligence Labs CRIL has discovered the announcement of a new malwareasaservice named ManticoraLoader in the underground. The threat actors behind the group DeadXInject have been offering the service in underground forums and on their Telegram channel since August 8, 2024. The same threat actors are behind the development of the infamous AresLoader and, as reported by CRIL, were observed to be targeting Citrix users in April 2023. Previously, researchers attributed the same threat group to the development of AiDLocker ransomware in late 2022. Figure 1 TAs advertisement on the Telegram Channel. In a detailed post under the alias 'DarkBLUP'previously used to advertise AresLoader on the XSS forumthe threat actors outlined the functionalities, operational logic,...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
ManticoraLoader: New Tool By AresLoader Developers
Cyble Research & Intelligence Labs (CRIL) has discovered the announcement of a new malware-as-a-service named βManticoraLoaderβ in the underground.
ποΈ North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zeroday by North Korean actors in a campaign designed to deliver the FudModule rootkit. The development is indicative of the persistent efforts made by the nationstate adversary, which had made a habit of incorporating rafts of Windows zeroday exploits into its arsenal in recent months.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ Ransomware Gangs Pummel Southeast Asia π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Successful ransomware attacks against organizations in Asia continue at peak levels in 2024 following a wave of highprofile data breaches last year.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Ransomware Gangs Pummel Southeast Asia
Successful ransomware attacks against organizations in Asia continue at peak levels in 2024 following a wave of high-profile data breaches last year.
ποΈ Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developersβ Systems ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once again underscoring how threat actors continue to exploit the trust in the opensource ecosystem to deliver malware. "By mimicking the popular 'noblox.js' library, attackers have published dozens of packages designed to steal sensitive data and compromise systems," Checkmarx.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π¦Ώ TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
ποΈ Webinar: Learn to Boost Cybersecurity with AI-Powered Vulnerability Management ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and attackers are becoming more sophisticated. In this highstakes game, security leaders need every advantage they can get. That's where Artificial Intelligence AI comes in. AI isn't just a buzzword it's a gamechanger for vulnerability management. AI is poised to revolutionize vulnerability.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Next-Generation Attacks, Same Targets - How to Protect Your Users' Identities ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note on August 29, the FBI and CISA issued a joint advisory as part of their ongoing StopRansomware effort to help organizations protect against ransomware. The latest advisory, AA24242A, describes a new cybercriminal group and its attack methods. It also details three important actions to take today to mitigate.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Cicada3301 Ransomware Group Emerges From the Ashes of ALPHV π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Truesec claims new Cicada3301 ransomwareasaservice group could have ties to ALPHVBlackCat and Brutus.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Cicada3301 Ransomware Group Emerges From the Ashes of ALPHV
Truesec claims new Cicada3301 ransomware-as-a-service group could have ties to ALPHV/BlackCat and Brutus
π Scores of Organizations Hit By Novel Voldemort Malware π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Proofpoint has uncovered a new cyberespionage campaign deploying new malware dubbed Voldemort.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Scores of Organizations Hit By Novel Voldemort Malware
Proofpoint has uncovered a new cyber-espionage campaign deploying new malware dubbed βVoldemortβ
π¦Ώ The 6 Best Small Business VPNs for 2024 π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Looking for the best VPN services for SMBs? Here's a comprehensive guide covering the top options for secure remote access and data protection on a budget.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
The 6 Best Small Business VPNs for 2024
If youβre looking for a small business VPN, solutions like NordLayer, Surfshark VPN or Proton VPN are among the best choices when it comes to protecting company data.
π¦Ώ Passkey Adoption Is Accelerating in APAC β Except for Australia π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Australian banks and government agencies are not rushing to adopt passkey authentication methods, despite the added security benefits.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Passkey Adoption Is Accelerating in APAC β Except for Australia
Australian banks and government are not rushing to adopt passkey authentication methods, despite the added security benefits. Learn why they lag in embracing this crucial technology.
π Verkada Facing $3m Penalty After Hackers Viewed Sensitive Video Footage π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The US FTC has proposed a 2.95m fine for security camera firm Verkada for alleged security failings that allowed hackers to access customers' video footage.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Verkada Facing $3m Penalty After Hackers Viewed Sensitive Video Footage
The US FTC has proposed a $2.95m fine for security camera firm Verkada for alleged security failings that allowed hackers to access customers' video footage
π South Korea Police Investigates Telegram Over Deepfake Porn π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The Asian countrys law enforcement suspects the instant messaging app of abetting deepfake sex crimes.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
South Korea Police Investigates Telegram Over Deepfake Porn
The Asian countryβs law enforcement suspects the instant messaging app of abetting deepfake sex crimes
π3
π’ Managing security in a diverse cloud environment π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Observability and a consistent, centralized security strategy are dayone demands for any multi or hybrid cloud organization.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Managing security in a diverse cloud environment
Observability and a consistent, centralized security strategy are day-one demands for any multi or hybrid cloud organization
π’ The history β and future β of automation in security π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Automation has transformed the security sector, from its early beginnings to its pivotal role today, but where are things headed?.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
The history β and future β of automation in security
Automation has transformed the security sector, from its early beginnings to its pivotal role today, but where are things headed?
π1
π’ How businesses can align their security strategy with their cloud strategy π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Aligning cloud and security strategies is essential for businesses to mitigate risks, enhance resilience, and ensure robust data protection in an era of rapid cloud adoption and evolving cyber threats.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Cloud Pro
How businesses can align their security strategy with their cloud strategy
Aligning cloud and security strategies is essential for businesses to mitigate risks, enhance resilience, and ensure robust data protection in an era of rapid cloud adoption and evolving cyber threats
π tcpdump 4.99.5 π
π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
tcpdump allows you to dump the traffic on a network. It can be used to print out the headers andor contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
packetstorm.news
Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers
βοΈ Owners of 1-Time Passcode Theft Service Plead Guilty βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Three men in the United Kingdom have pleaded guilty to operating otp.agency, a once popular online service that helped attackers intercept the onetime passcodes OTPs that many websites require as a second authentication factor in addition to passwords. Launched in November 2019, OTP Agency was a service for intercepting onetime passwords needed to log in to various websites. Scammers would enter the targets phone number and name, and the service would initiate an automated phone call to the target that alerts them about unauthorized activity on their account.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Owners of 1-Time Passcode Theft Service Plead Guilty
Three men in the United Kingdom have pleaded guilty to operating otp[.]agency, a once popular online service that helped attackers intercept the one-time passcodes (OTPs) that many websites require as a second authentication factor in addition to passwords.β¦
ποΈ RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception in February 2024, the U.S. government said. The victims span various sectors, including water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Irish Wildlife Park Warns Customers to Cancel Credit Cards Following Breach π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Fota Wildlife Park in Co Cork has told visitors to its website to cancel credit and debit cards, following a cyberattack.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Irish Wildlife Park Warns Customers to Cancel Credit Cards Following Breach
Fota Wildlife Park in Co Cork has told visitors to its website to cancel credit and debit cards, following a cyber-attack