π΅οΈββοΈ Halliburton Data Stolen in Oil-Sector Cyberattack π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The energy kahuna said that operations were disrupted after an attack on its supporting business applications.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Halliburton Data Stolen in Oil-Sector Cyberattack
The energy kahuna said that operations were disrupted after an attack on its supporting business applications.
π΅οΈββοΈ Evolving npm Package Campaign Targets Roblox Devs, for Years π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Attackers have added aggressive social engineering to their arsenal, along with a novel Windowsmanipulating persistence mechanism that demands developer vigilance.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Evolving npm Package Campaign Targets Roblox Devs, for Years
Attackers have added aggressive social engineering to their arsenal, along with a novel Windows-manipulating persistence mechanism that demands developer vigilance.
π΅οΈββοΈ BlackCat Spin-off 'Cicada3301' Uses Stolen Creds on the Fly, Skirts EDR π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Malware authors have iterated on one of the premier encryptors on the market, building something even bigger and better.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
BlackCat Spin-off 'Cicada3301' Uses Stolen Creds on the Fly, Skirts EDR
Malware authors have iterated on one of the premier encryptors on the market, building something even bigger and better.
π’ Apple device management for beginners π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The next evolution of endpoint management and security.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Apple device management for beginners
The next evolution of endpoint management and security
π’ Alert issued for βVoldemortβ malware as dozens of organizations hit π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Proofpoint researchers say the Voldemort malware campaign appears to be aimed at cyber espionage.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Alert issued for βVoldemortβ malware as dozens of organizations hit
Proofpoint researchers say the Voldemort malware campaign appears to be aimed at cyber espionage
π’ Modern management: The future of MDM π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The next evolution of endpoint management and security.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Modern management: The future of MDM
The next evolution of endpoint management and security
π’ How not to conduct cyber awareness training: UCSC slammed for βtone deafβ Ebola phishing tests π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Phishing training at a university in California went wrong when its IT department distributed highly alarming emails.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
How not to conduct cyber awareness training: UCSC slammed for βtone deafβ Ebola phishing tests
Phishing training at a university in California went wrong when its IT department distributed highly alarming emails
π΅οΈββοΈ California Approves Privacy Bill Requiring Opt-Out Tools π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
This bill requires Web browsers to have an easytofind and use setting for consumers to send an optout preference signal by default to every site and app they interact with.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
California Approves Privacy Bill Requiring Opt-Out Tools
This bill requires Web browsers to have an easy-to-find (and use) setting for consumers to send an opt-out preference signal by default to every site and app they interact with.
π΅οΈββοΈ North Korean APT Exploits Novel Chromium, Windows Bugs to Steal Crypto π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
DPRK's innovative tack chains together previously unknown browser issues, then adds a rootkit to the mix to gain deep system access.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
North Korea's 'Citrine Sleet' APT Exploits Zero-Day Chromium Bug
Microsoft warned that the DPRK's latest innovative tack chains together previously unknown browser issues, then adds a rootkit to the mix to gain deep system access and steal crypto.
π¦Ώ Apptio: How Australians Are Navigating Economic Pressure Through Strategic IT Investments π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Many Australian companies are investing in new technology, but others are having a hard time justifying such investments given the current economic climate.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Apptio: How Australians Are Navigating Economic Pressure Through Strategic IT Investments
Australian companies are investing in new technology, but some are having difficulties justifying such investments given the current economic climate.
ποΈ The New Effective Way to Prevent Account Takeovers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Account takeover attacks have emerged as one of the most persistent and damaging threats to cloudbased SaaS environments. Yet despite significant investments in traditional security measures, many organizations continue to struggle with preventing these attacks. A new report, "Why Account Takeover Attacks Still Succeed, and Why the Browser is Your Secret Weapon in Stopping Them" argues that the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Clearview AI Faces β¬30.5M Fine for Building Illegal Facial Recognition Database ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Dutch Data Protection Authority Dutch DPA has imposed a fine of 30.5 million 33.7 million against facial recognition firm Clearview AI for violating the General Data Protection Regulation GDPR in the European Union E.U. by building an "illegal database with billions of photos of faces," including those of Dutch citizens. "Facial recognition is a highly intrusive technology that you.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Hackers Use Fake GlobalProtect VPN Software in New WikiLoader Malware Attack ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A new malware campaign is spoofing Palo Alto Networks' GlobalProtect VPN software to deliver a variant of the WikiLoader aka WailingCrab loader by means of a search engine optimization SEO campaign. The malvertising activity, observed in June 2024, is a departure from previously observed tactics wherein the malware has been propagated via traditional phishing emails, Unit 42 researchers.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π In plain sight: Malicious ads hiding in search results π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Sometimes theres more than just an enticing product offer hiding behind an ad.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
In plain sight: Malicious ads hiding in search results
Malvertising campaigns typically involve threat actors buying top ad space from search engines to lure potential victims into clicking on their malicious ads.
π Clearview AI Fined β¬30.5m by Dutch Watchdog Over Illegal Data Collection π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The USbased facial recognition data company may even have to pay up to 5.1m in penalties for noncompliance.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Clearview AI Fined β¬30.5m by Dutch Watchdog Over Illegal Data Collection
The US-based facial recognition data company may even have to pay up to β¬5.1m in penalties for non-compliance
π Initial Access Brokers Target $2bn Revenue Companies π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Cyberint claims that initial access brokers target companies with average revenue of nearly 2bn.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Initial Access Brokers Target $2bn Revenue Companies
Cyberint claims that initial access brokers target companies with average revenue of nearly $2bn
π APP Fraud Dominates as Scams Hit All-Time High π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
UKs Financial Ombudsman warns fraud and scams hit a record high in Q2 2024.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
APP Fraud Dominates as Scams Hit All-Time High
UKβs Financial Ombudsman warns fraud and scams hit a record high in Q2 2024
π¦
TA-FudModule Rootkit Targets Crypto, Linked to North Korean Citrine Sleet Group π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways A North Korean threat actor, Citrine Sleet, has been observed exploiting a zeroday vulnerability in Chromium, designated as CVE20247971, to achieve Remote Code Execution RCE. Citrine Sleet, also tracked by other security firms under the names AppleJeus, Labyrinth Chollima, UNC4736, and Hidden Cobra, is attributed to Bureau 121 of North Korea's Reconnaissance General Bureau. The group primarily focuses on financial institutions, especially those involved with cryptocurrency, aiming for financial gain. The group's tactics, techniques, and procedures TTPs have now been linked to the FudModule rootkit, which has also been associated with Diamond Sleet, another North Korean threat actor. Citrine Sleet creates fraudulent websites that mimic legitimate crypto...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
FudModule Rootkit Targets Crypto - Cyble
North Korean threat actor, Citrine Sleet, has been observed exploiting a zero-day vulnerability in Chromium, designated as CVE-2024-7971, to RCE.
β€1
π¦
CISA Warns of Critical ICS Vulnerabilities in Rockwell and Delta Electronics π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways CISA Alert CISA warns of critical ICS vulnerabilities in Rockwell Automation and Delta Electronics products. ThinManager ThinServer Flaws in Rockwell Automations ThinManager ThinServer versions 11.1.0 to 13.2.1 could allow systemlevel code execution. Affected sector Manufacturing. Delta DTN Soft Vulnerability in Deltas DTN Soft version 2.0.1 and prior enables remote code execution. Update to version 2.1. Affected sector Energy. FactoryTalk View SE A flaw in Rockwell Automations FactoryTalk View SE 13.0 allows unauthorized file modifications. Affected sectors Chemical, Energy, and others. Mitigation CISA advises minimizing ICS exposure, securing remote access, updating software, and implementing layered security measures. Overview On August ...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
CISA Warns Of Critical ICS Vulnerabilities In Rockwell And Delta Electronics - Cyble
High and severe vulnerabilities in ICS products from Rockwell Automation and Delta Electronics are the latest examples of the unique security risks posed by ICS devices and networks.
π’ White House outlines plans to finally secure the border gateway protocol π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The White House announces its plans to shore up the integrity of internet by boosting adoption of security measures to address frailties in the outdated border gateway protocol.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
White House outlines plans to finally secure the border gateway protocol
The plans will shore up safety by boosting adoption of security measures to address frailties in the outdated protocol.
π’ Compliance management for beginners π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Adhere to laws, meet safety standards, and implement security requirements.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Compliance management for beginners
Adhere to laws, meet safety standards, and implement security requirements
π1