π΄ 2018 State of Cyber Workforce π΄
π Read
via "Dark Reading: ".
Let's start with this eye-opener: The cybersecurity profession is facing a shortfall of 3 million workers worldwide.π Read
via "Dark Reading: ".
Dark Reading
2018 State of Cyber Workforce
Let's start with this eye-opener: The cybersecurity profession is facing a shortfall of 3 million workers worldwide.
π΄ UK, US to Sign Accord on AI, Cybersecurity Cooperation π΄
π Read
via "Dark Reading: ".
Royal Navy, US Navy, and tech industry leaders ready to commit to 'a framework for dialogue and cooperation' at inaugural meeting of the Atlantic Future Forum.π Read
via "Dark Reading: ".
Dark Reading
UK, US to Sign Accord on AI, Cybersecurity Cooperation
Royal Navy, US Navy, and tech industry leaders ready to commit to 'a framework for dialogue and cooperation' at inaugural meeting of the Atlantic Future Forum.
π΄ US Tops Global Malware C2 Distribution π΄
π Read
via "Dark Reading: ".
The United States hosts 35% of the world's command-and-control infrastructure, driving the frequency of host compromises.π Read
via "Dark Reading: ".
Darkreading
US Tops Global Malware C2 Distribution
The United States hosts 35% of the world's command-and-control infrastructure, driving the frequency of host compromises.
<b>⌨ Who Is Agent Tesla? ⌨</b>
<code>A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity β attracting more than 6,300 customers who pay monthly fees to license the software. Although Agent Tesla includes a multitude of features designed to help it remain undetected on host computers, the malwareβs apparent creator seems to have done little to hide his real-life identity.</code><code>The proprietors of Agent Tesla market their product at agenttesla-dot-com, selling access to the software in monthly licenses paid for via bitcoin, for prices ranging from $15 to $69 per month depending on the desired features.</code><code>Media</code><code>The Agent Tesla Web site emphasizes that the software is strictly βfor monitoring your personel [sic] computer.β The siteβs βaboutβ page states that Agent Tesla βis not a malware. Please, donβt use for computers which is not access permission.β To backstop this disclaimer, the site warns that any users caught doing otherwise will have their software licenses revoked and subscriptions canceled.</code><code>At the same time, the Agent Tesla Web site and its 24/7 technical support channel (offered via Discord) is replete with instances of support personnel instructing users on ways to evade antivirus software detection, use software vulnerabilities to deploy the product, and secretly bundle the program inside of other file types, such as images, text, audio and even Microsoft Office files.</code><code>Media</code><code>A description of some of the options posted to the Agent Tesla sales Web site.</code><code>In August 2018, computer security firm LastLine said it witnessed a 100 percent increase in Agent Tesla instances detected in the wild over just a three month period.</code><code>βActing as a fully-functional information stealer, it is capable of extracting credentials from different browsers, mail, and FTP clients,β LastLine wrote. βIt logs keys and clipboards data, captures screen and video, and performs form-grabbing (Instagram, Twitter, Gmail, Facebook, etc.) attacks.β</code><code>Media</code><code>Most of the options included in Agent Tesla revolve around stealth, persistence, evading security tools, spreading to other computers, or tampering with system settings.</code><code>I CAN HAZ TESLA</code><code>The earliest versions of Agent Tesla were made available for free via a Turkish-language WordPress site that oddly enough remains online (agenttesla.wordpress-dot-com), although its home page now instructs users to visit the current AgentTesla-dot-com domain. Not long after that WordPress site was erected, its author(s) began charging for the software, accepting payments via a variety of means, including PayPal, Bitcoin and even wire transfer to several bank accounts in Turkey.</code><code>MediaHistoric WHOIS Web site registration records maintained by Domaintools.com show that the current domain for the software β agenttesla-dot-com β was registered in 2014 to a young man from Antalya, Turkey named Mustafa can Ozaydin, and to the email address mcanozaydin@gmail.com. Sometime in mid-2016 the siteβs registration records were hidden behind WHOIS privacy services [full disclosure: Domaintools is a previous advertiser on KrebsOnSecurity].</code><code>That Gmail address is tied to a Youtube.com account for a Turkish individual by the same name who has uploaded exactly three videos over the past four years. In one of them, uploaded in October 2017 and titled βweb panel,β Mr. can Ozaydin demonstrates how to configure a Web site. At around 3:45 in the video, we can see the purpose of this demonstration is to show people one way to install an Agent Tesla control panel to keep track of systems infected with the malware.</code><code>Incidentally, the administrator of the 24/7 live support channel for Agent Tesla users at one point instructed customers to view this sameβ¦
<code>A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity β attracting more than 6,300 customers who pay monthly fees to license the software. Although Agent Tesla includes a multitude of features designed to help it remain undetected on host computers, the malwareβs apparent creator seems to have done little to hide his real-life identity.</code><code>The proprietors of Agent Tesla market their product at agenttesla-dot-com, selling access to the software in monthly licenses paid for via bitcoin, for prices ranging from $15 to $69 per month depending on the desired features.</code><code>Media</code><code>The Agent Tesla Web site emphasizes that the software is strictly βfor monitoring your personel [sic] computer.β The siteβs βaboutβ page states that Agent Tesla βis not a malware. Please, donβt use for computers which is not access permission.β To backstop this disclaimer, the site warns that any users caught doing otherwise will have their software licenses revoked and subscriptions canceled.</code><code>At the same time, the Agent Tesla Web site and its 24/7 technical support channel (offered via Discord) is replete with instances of support personnel instructing users on ways to evade antivirus software detection, use software vulnerabilities to deploy the product, and secretly bundle the program inside of other file types, such as images, text, audio and even Microsoft Office files.</code><code>Media</code><code>A description of some of the options posted to the Agent Tesla sales Web site.</code><code>In August 2018, computer security firm LastLine said it witnessed a 100 percent increase in Agent Tesla instances detected in the wild over just a three month period.</code><code>βActing as a fully-functional information stealer, it is capable of extracting credentials from different browsers, mail, and FTP clients,β LastLine wrote. βIt logs keys and clipboards data, captures screen and video, and performs form-grabbing (Instagram, Twitter, Gmail, Facebook, etc.) attacks.β</code><code>Media</code><code>Most of the options included in Agent Tesla revolve around stealth, persistence, evading security tools, spreading to other computers, or tampering with system settings.</code><code>I CAN HAZ TESLA</code><code>The earliest versions of Agent Tesla were made available for free via a Turkish-language WordPress site that oddly enough remains online (agenttesla.wordpress-dot-com), although its home page now instructs users to visit the current AgentTesla-dot-com domain. Not long after that WordPress site was erected, its author(s) began charging for the software, accepting payments via a variety of means, including PayPal, Bitcoin and even wire transfer to several bank accounts in Turkey.</code><code>MediaHistoric WHOIS Web site registration records maintained by Domaintools.com show that the current domain for the software β agenttesla-dot-com β was registered in 2014 to a young man from Antalya, Turkey named Mustafa can Ozaydin, and to the email address mcanozaydin@gmail.com. Sometime in mid-2016 the siteβs registration records were hidden behind WHOIS privacy services [full disclosure: Domaintools is a previous advertiser on KrebsOnSecurity].</code><code>That Gmail address is tied to a Youtube.com account for a Turkish individual by the same name who has uploaded exactly three videos over the past four years. In one of them, uploaded in October 2017 and titled βweb panel,β Mr. can Ozaydin demonstrates how to configure a Web site. At around 3:45 in the video, we can see the purpose of this demonstration is to show people one way to install an Agent Tesla control panel to keep track of systems infected with the malware.</code><code>Incidentally, the administrator of the 24/7 live support channel for Agent Tesla users at one point instructed customers to view this sameβ¦
π΄ Facebook Rumored to Be Hunting for Major Cybersecurity Acquisition π΄
π Read
via "Dark Reading: ".
Goal appears both a bid to bolster its own security and its tattered reputation for privacy, according to reporting by The Information.π Read
via "Dark Reading: ".
Dark Reading
Facebook Rumored to Be Hunting for Major Cybersecurity Acquisition
Goal appears both a bid to bolster its own security and its tattered reputation for privacy, according to reporting by The Information.
π΄ The Patching Paradox: A Path to Intelligent Vulnerability Management π΄
π Read
via "Dark Reading: ".
Imagine: You're out at sea, sailing through treacherous and uncharted waters. The tips of sharp rocks jutting from the waves give some forewarning of danger, but beneath the surface, twisting reefs and shallow sandbanks threaten to run you aground.π Read
via "Dark Reading: ".
Dark Reading
The Patching Paradox: A Path to Intelligent Vulnerability Management
Imagine: You're out at sea, sailing through treacherous and uncharted waters. The tips of sharp rocks jutting from the waves give some forewarning of danger, but beneath the surface, twisting reefs and shallow sandbanks threaten to run you aground.
π΄ What Keeps the CISO Awake at Night π΄
π Read
via "Dark Reading: ".
How to keep your CISO sleeping soundlyπ Read
via "Dark Reading: ".
Dark Reading
What Keeps the CISO Awake at Night
How to keep your CISO sleeping soundly
β Pirates! Donβt blame your illegal file sharing on family members β
π Read
via "Naked Security".
Stop blaming your piracy on your mum. You can no longer avoid liability by saying that a family member had access to your connection.π Read
via "Naked Security".
Naked Security
Pirates! Donβt blame your illegal file sharing on family members
Stop blaming your piracy on your mum. You can no longer avoid liability by saying that a family member had access to your connection.
β Why is Elon Musk promoting this Bitcoin scam? (Heβs not) β
π Read
via "Naked Security".
While scrolling through my Twitter feed I saw a Bitcoin scam so unabashed that it got me thinking.... do such scams really work?π Read
via "Naked Security".
Naked Security
Why is Elon Musk promoting this Bitcoin scam? (Heβs not)
While scrolling through my Twitter feed I saw a Bitcoin scam so unabashed that it got me thinkingβ¦. do such scams really work?
β Adult websites shuttered after 1.2 million user details exposed β
π Read
via "Naked Security".
It's not even close to the number of users affected by the massive Ashley Madison breach, but the results could be just as devastating to those who are affected.π Read
via "Naked Security".
Naked Security
Adult websites shuttered after 1.2 million user details exposed
Itβs not even close to the number of users affected by the massive Ashley Madison breach, but the results could be just as devastating to those who are affected.
β Thousands of Applications Vulnerable to RCE via jQuery File Upload β
π Read
via "The first stop for security news | Threatpost ".
The flaw has existed for eight years thanks to a security change in Apache.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Thousands of Applications Vulnerable to RCE via jQuery File Upload
The flaw has existed for eight years thanks to a security change in Apache.
π How sophisticated phishing grants attackers total control of your computer π
π Read
via "Security on TechRepublic".
Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guys-he used to be one.π Read
via "Security on TechRepublic".
TechRepublic
How sophisticated phishing grants attackers total control of your computer
Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guys-he used to be one.
π Cybersecurity predictions: More cyberattacks, social engineering, and scary IoT π
π Read
via "Security on TechRepublic".
Kevin Mitnick, founder, Mitnick Security Consulting, discusses emerging cybersecurity trends and how we can defend ourselves with TechRepublic's Dan Patterson.π Read
via "Security on TechRepublic".
TechRepublic
Cybersecurity predictions: More cyberattacks, social engineering, and scary IoT | TechRepublic
Kevin Mitnick, founder, Mitnick Security Consulting, discusses emerging cybersecurity trends and how we can defend ourselves with TechRepublic's Dan Patterson.
π How sophisticated phishing grants attackers total control of your computer π
π Read
via "Security on TechRepublic".
Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guysβhe used to be one.π Read
via "Security on TechRepublic".
TechRepublic
How sophisticated phishing grants attackers total control of your computer
Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guysβhe used to be one.
β Phishing is still the most commonly used attack on organizations, survey says β
π Read
via "Naked Security".
The survey found that the majority of cyberattacks - 75% - came from outsiders, while 25% were due to insiders.π Read
via "Naked Security".
Naked Security
Phishing is still the most commonly used attack on organizations, survey says
The survey found that the majority of cyberattacks β 75% β came from outsiders, while 25% were due to insiders.
β Patch now! Multiple serious flaws found in Drupal β
π Read
via "Naked Security".
Drupal website owners have some important patching homework to do.π Read
via "Naked Security".
Naked Security
Patch now! Multiple serious flaws found in Drupal
Drupal website owners have some important patching homework to do.
π How RATs infect computers with malicious software π
π Read
via "Security on TechRepublic".
Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guys-he used to be one.π Read
via "Security on TechRepublic".
TechRepublic
How RATs infect computers with malicious software
Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guys-he used to be one.
π Cybersecurity predictions: More cyberattacks, social engineering, and scary IoT π
π Read
via "Security on TechRepublic".
Kevin Mitnick, founder, Mitnick Security Consulting, discusses emerging cybersecurity trends and how we can defend ourselves with TechRepublic's Dan Patterson.π Read
via "Security on TechRepublic".
TechRepublic
Cybersecurity predictions: More cyberattacks, social engineering, and scary IoT
Kevin Mitnick, founder, Mitnick Security Consulting, discusses emerging cybersecurity trends and how we can defend ourselves with TechRepublic's Dan Patterson.
π΄ Good Times in Security Come When You Least Expect Them π΄
π Read
via "Dark Reading: ".
Not every cybersecurity endeavor can have a huge impact. But a small percentage of your efforts can still produce results that blow you away.π Read
via "Dark Reading: ".
Dark Reading
Good Times in Security Come When You Least Expect Them
Not every cybersecurity endeavor can have a huge impact. But a small percentage of your efforts can still produce results that blow you away.
β Adult Website Hack Exposes 1.2M βWife Loverβ Fans β
π Read
via "The first stop for security news | Threatpost ".
A 40-year-old, easily cracked encryption method was used to protect the 98MB database of user information.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Adult Website Hack Exposes 1.2M βWife Loverβ Fans
A 40-year-old, easily cracked encryption method was used to protect the 98MB database of user information.
π΄ IoT Bot Landscape Expands, Attacks Vary by Country π΄
π Read
via "Dark Reading: ".
New report finds 1,005 new user names and passwords beyond Mirai's original default list two years ago.π Read
via "Dark Reading: ".
Dark Reading
IoT Bot Landscape Expands, Attacks Vary by Country
New report finds 1,005 new user names and passwords beyond Mirai's original default list two years ago.