π¦
Iranian State-Sponsored Hackers Have Become Access Brokers for Ransomware Gangsca π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Iranian statebacked actors operating under aliases like "Pioneer Kitten" are increasingly targeting critical infrastructure and expanding their activities into brokering access for ransomware affiliates. Key Takeaways A group of Iranian statesponsored hackers has evolved into access brokers for ransomware gangs, targeting critical U.S. and allies sectors like education, finance, healthcare, and defense. The FBI, CISA, and DC3 have issued a joint advisory highlighting the dual nature of these threat actors' activities, which include both monetizing network access and conducting espionage aligned with Iranian government interests. The hackers, known by names like "Pioneer Kitten" and "Lemon Sandstorm," are highly adaptive, continuously evolving their methods to exploit vulnera...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Iranian Hackers Acting As Ransomware Access Brokers
Iranian state-backed actors are targeting critical infrastructure and brokering access for ransomware affiliates, posing significant security risks.
ποΈ Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A 57yearold man from the U.S. state of Missouri has been arrested in connection with a failed data extortion campaign that targeted his former employer. Daniel Rhyne of Kansas City, Missouri, has been charged with one count of extortion in relation to a threat to cause damage to a protected computer, one count of intentional damage to a protected computer, and one count of wire fraud. He was.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π2
π’ Lockbit claims breach on Canadaβs largest school board: Is the group back with a vengeance? π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
A breach at the largest school board in Canada has been claimed by LockBit as the group rears its head once more.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
LockBit claims breach on Canadaβs largest school board: Is the group back with a vengeance?
A breach at the largest school board in Canada has been claimed by LockBit as the group rears its head once more
π’ Rubrik partners with Cisco to bolster cyber resilience π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Rubrik now integrates with Cisco XDR and is listed on the connectivity giants SolutionsPlus program.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
channelpro
Rubrik partners with Cisco to bolster cyber resilience
Rubrik now integrates with Cisco XDR and is listed on the connectivity giantβs SolutionsPlus program
π’ Everything we know about the TfL cyber attack so far π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Details of the incident are still emerging, but TfL says customer data doesn't appear to have been compromised.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
TfL reveals bank data on 5,000 customers exposed in cyber attack, arrest made following incident
London's public transport operator has warned some customer data may have been compromised
π¦Ώ The 6 Best Antivirus Software Options for Windows in 2024 π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Bitdefender GravityZone is best overall when it comes to our top choices for protection from malware like viruses, spyware, trojans, and bots.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
The 6 Best Antivirus Software Options for Windows in 2024
Bitdefender GravityZone is best overall when it comes to our top choices for protection from malware like viruses, spyware, trojans, and bots.
π¦Ώ 10 Topics Every Cybersecurity Awareness Training Program Should Cover π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
While the cybersecurity team plays a critical role in the fight against data breaches, a companys employees are often the first line of defense or failure. The numbers back this up IBMs 2024 data breach report shows cybersecurity employee training is the second most costeffective mitigation strategy, reducing the cost of the average data breach ...π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
10 Topics Every Cybersecurity Awareness Training Program Should Cover | TechRepublic
While the cybersecurity team plays a critical role in the fight against data breaches, a companyβs employees are often the first line of defense (or
ποΈ Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Mobile users in Brazil are the target of a new malware campaign that delivers a new Android banking trojan named Rocinante. "This malware family is capable of performing keylogging using the Accessibility Service, and is also able to steal PII from its victims using phishing screens posing as different banks," Dutch security company ThreatFabric said. "Finally, it can use all this exfiltrated.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Secrets Exposed: Why Your CISO Should Worry About Slack ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
In the digital realm, secrets API keys, private keys, username and password combos, etc. are the keys to the kingdom. But what if those keys were accidentally left out in the open in the very tools we use to collaborate every day? A Single Secret Can Wreak Havoc Imagine this It's a typical Tuesday in June 2024. Your dev team is kneedeep in sprints, Jira tickets are flying, and Slack is.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or access sensitive data by circumventing the operating system's permissionsbased model, which revolves around the Transparency, Consent, and Control TCC framework. "If successful, the adversary could gain any privileges already granted to the affected.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Three Plead Guilty to Running MFA Bypass Site π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Three British men are facing jail after pleading guilty to running an MFA bypass site dubbed OTP Agency.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Three Plead Guilty to Running MFA Bypass Site
Three British men are facing jail after pleading guilty to running an MFA bypass site dubbed βOTP Agencyβ
β€1
π Three Plead Guilty to Running MFA Bypass Site π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Three British men are facing jail after pleading guilty to running an MFA bypass site dubbed OTP Agency.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Three Plead Guilty to Running MFA Bypass Site
Three British men are facing jail after pleading guilty to running an MFA bypass site dubbed βOTP Agencyβ
π TfL Claims Cyber-Incident is Not Impacting Services π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Londons transport body, TfL, is playing down the impact of a cybersecurity incident on its services.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
TfL Claims Cyber-Incident is Not Impacting Services
Londonβs transport body, TfL, is playing down the impact of a cybersecurity incident on its services
π΅οΈββοΈ Improved Software Supply Chain Resilience Equals Increased Security π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Understanding through visibility, managing through governance, and anticipating through continuous deployment will better prepare organizations for the next supply chain attack.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Improved Software Supply Chain Resilience Equals Increased Security
Understanding through visibility, managing through governance, and anticipating through continuous deployment will better prepare organizations for the next supply chain attack.
π§ Cost of a data breach: Cost savings with law enforcement involvement π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
For those working in the information security and cybersecurity industries, the technical impacts of a data breach are generally understood. But for those outside of these technical functions, such as executives, operators and business support functions, explaining the real impact of a breach can be difficult. Therefore, explaining impacts in terms of quantifiable financial figures The post Cost of a data breach Cost savings with law enforcement involvement appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
Cost of a data breach: Cost savings with law enforcement involvement
Working with law enforcement during a data breach can help save costs. So why do many organizations avoid reaching out for help?
ποΈ Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and Belarus ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A hacktivist group known as Head Mare has been linked to cyber attacks that exclusively target organizations located in Russia and Belarus. "Head Mare uses more uptodate methods for obtaining initial access," Kaspersky said in a Monday analysis of the group's tactics and tools. "For instance, the attackers took advantage of the relatively recent CVE202338831 vulnerability in WinRAR, which.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have unpacked the inner workings of a new ransomware variant called Cicada3301 that shares similarities with the nowdefunct BlackCat aka ALPHV operation. "It appears that Cicada3301 ransomware primarily targets small to mediumsized businesses SMBs, likely through opportunistic attacks that exploit vulnerabilities as the initial access vector," cybersecurity.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Palo Alto's GlobalProtect VPN Spoofed to Deliver New Malware Variant π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A variant of the WikiLoader malware was observed being delivered via SEO poisoning and spoofing Palo Alto Networks GlobalProtect VPN software.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Palo Alto's GlobalProtect VPN Spoofed to Deliver New Malware Variant
A variant of the WikiLoader malware was observed being delivered via SEO poisoning and spoofing Palo Alto Networksβ GlobalProtect VPN software
π¦Ώ VMware ESXi Servers Targeted by New Ransomware Variant from Cicada3301 Group π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
A number of similarities between Cicada3301 and ALPHVBlackCat indicates that it could represent a rebrand or offshoot group.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
VMware ESXi Servers Targeted by New Ransomware Variant from Cicada3301 Group
A new double extortion ransomware variant targets VMware ESXi servers, security researchers have found.
π¦Ώ Google Removing Poor-Quality Android Apps From Play Store to Boost Engagement π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Included in the purge are static apps, those with limited functionality and content, and apps that crash, freeze, and dont offer an engaging user experience, the company said.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Google Removing Poor-Quality Android Apps From Play Store to Boost Engagement
Google began removing apps from the Play Store on Aug. 31 as part of its strategy to enhance app quality, security, and user experience.
βοΈ Sextortion Scams Now Include Photos of Your Home βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
An old but persistent email scam known as "sextortion" has a new personalized touch The missives, which claim that malware has captured webcam footage of recipients pleasuring themselves, now include a photo of the target's home in a bid to make threats about publishing the videos more frightening and convincing.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Sextortion Scams Now Include Photos of Your Home
An old but persistent email scam known as "sextortion" has a new personalized touch: The missives, which claim that malware has captured webcam footage of recipients pleasuring themselves, now include a photo of the target's home in a bid to makeβ¦
π±1