ποΈ LiteSpeed Cache Plugin Vulnerability Poses Significant Risk to WordPress Websites ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A highseverity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could allow an unauthenticated threat actor to elevate their privileges and perform malicious actions. The vulnerability, tracked as CVE202450550 CVSS score 8.1, has been addressed in version 6.5.2 of the plugin. "The plugin suffers from an unauthenticated privilege escalation vulnerability.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Government Sector Suffers 236% Surge in Malware Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Malwarerelated attacks against global government organizations increased 236 yearonyear in Q1 2024, according to SonicWall.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Government Sector Suffers 236% Surge in Malware Attacks
Malware-related attacks against global government organizations increased 236% year-on-year in Q1 2024, according to SonicWall
π’ Two notorious infostealer malware operations were just knocked offline π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Infrastructure linked to two major infostealer malware strains has been seized in a joint law enforcement operation.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Two notorious infostealer malware operations were just knocked offline
Infrastructure linked to two major infostealer malware strains has been seized in a joint law enforcement operation
π΅οΈββοΈ North Korea's Andariel Pivots to 'Play' Ransomware Games π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The prominent statesponsored advanced persistent threat APT, aka Jumpy Pisces, appears to be moving away from its primary cyberespionage motives and toward wreaking widespread disruption and damage.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
North Korea's Andariel Pivots to 'Play' Ransomware
The prominent state-sponsored advanced persistent threat (APT), aka Jumpy Pisces, appears to be moving away from its primary cyber-espionage motives and toward wreaking widespread disruption and damage.
π΅οΈββοΈ Noma Launches With Plans to Secure Data, AI Life Cycle π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Application security teams from Fortune 500 companies are already using Noma's life cycle platform, which offers organizations data and AI supply chain security, AI security posture management, and AI threat detection and response.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Noma Launches With Plans to Secure Data, AI Lifecycle
Application security teams from Fortune 500 companies are already using Noma's life cycle platform, which offers organizations data and AI supply chain security, AI security posture management, and AI threat detection and response.
π΅οΈββοΈ The Case Against Abandoning CrowdStrike Post-Outage π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Kneejerk reactions to major vendor outages could do more harm than good.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
The Case Against Abandoning CrowdStrike Post-Outage
Knee-jerk reactions to major vendor outages could do more harm than good.
π1
π΅οΈββοΈ China Says Seabed Sentinels Are Spying, After Trump Taps π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
On the heels of a Chinese APT eavesdropping on phone calls made by Trump and Harris campaign staffers, Beijing says foreign nations have mounted an extensive seafaring espionage effort.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
China Says Seabed Sentinels Are Spying, After Trump Taps
On the heels of a Chinese APT eavesdropping on phone calls made by Trump and Harris campaign staffers, Beijing says foreign nations have mounted an extensive seafaring espionage effort.
π¦Ώ What is a Passkey? Definition, How It Works and More π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
A passkey is a security measure used to grant access to a protected system. This guide explains how it works, and provides more information on its uses and benefits.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
What is a Passkey? Definition, How It Works and More
A passkey is a security measure used to grant access to a protected system. This guide explains how it works, and provides more information on its uses and benefits.
π§ Quishing: A growing threat hiding in plain sight π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quickresponse QR codes are a good example of this in The post Quishing A growing threat hiding in plain sight appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
Quishing: A growing threat hiding in plain sight
In a rising trend called "quishing", scammers are using QR codes to direct users to malicious websites and carry out phishing attacks.
ποΈ New LightSpy Spyware Version Targets iPhones with Increased Surveillance Tactics ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that not only expands on its functionality, but also incorporates destructive capabilities to prevent the compromised device from booting up. "While the iOS implant delivery method closely mirrors that of the macOS version, the postexploitation and privilege escalation stages differ.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ LottieFiles Issues Warning About Compromised "lottie-player" npm Package ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
LottieFiles has revealed that its npm package "lottieplayer" was compromised as part of a supply chain attack, prompting it to release an updated version of the library. "On October 30th 620 PM UTC LottieFiles were notified that our popular open source npm package for the web player lottiefileslottieplayer had unauthorized new versions pushed with malicious code," the company said in a.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Canadian Government Data Stolen By Chinese Hackers π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A report by the Canadian Centre for Cyber Security described China as the most sophisticated cyber threat to Canada, also identified India as an emerging threat.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Canadian Government Data Stolen By Chinese Hackers
A report by the Canadian Centre for Cyber Security described China as the most sophisticated cyber threat to Canada, also identified India as an emerging threat
π North Korean Hackers Collaborate with Play Ransomware π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Palo Alto Networks Unit 42 has observed the firstever collaboration between North Koreanbacked Jumpy Pisces and Play ransomware.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
North Korean Hackers Collaborate with Play Ransomware
Palo Alto Networksβ Unit 42 has observed the first-ever collaboration between North Korean-backed Jumpy Pisces and Play ransomware
π Misconfigured Git Configurations Targeted in EMERALDWHALE Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
EMERALDWHALE breach allowed access to over 10,000 repositories and resulted in the theft of more than 15,000 cloud service credentials.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Misconfigured Git Configurations Targeted in Emeraldwhale Attack
Emeraldwhale breach allowed access to over 10,000 repositories and resulted in the theft of more than 15,000 cloud service credentials
π±1
π New Xiu Gou Phishing Kit Targets US, Other Countries with Mascot π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
New phishing kit Xiu Gou, featuring a unique doggo mascot, targets users in US, UK, Spain, Australia and Japan with 2000 scam websites.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New Xiu Gou Phishing Kit Targets US, Other Countries with Mascot
New phishing kit Xiu Gou, featuring a unique βdoggoβ mascot, targets users in US, UK, Spain, Australia and Japan with 2000+ scam websites
π¦
Cyble Sensors Detect New Attacks on LightSpeed, GutenKit WordPress Plugins π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview Cybles weekly sensor intelligence report for clients detailed new attacks on popular WordPress plugins, and IoT exploits continue to occur at very high rates. Two 9.8severity vulnerabilities in LightSpeed Cache and GutenKit are under attack, as WordPress and other CMS and publishing systems remain attractive targets for threat actors. Vulnerabilities in IoT devices and embedded systems continue to be targeted at alarming rates. In addition to older exploits, this week Cyble Vulnerability Intelligence researchers highlighted an older RDP vulnerability that may still be present in some OT networks. Given the difficulty of patching these systems, vulnerabilities may persist and require additional mitigations. Vulnerabilities in PHP, Linux systems, and Java and Python fra...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Cyble Sensors Detect Attacks On LightSpeed, GutenKit
LightSpeed Cache and GutenKit WordPress plugins are under attack, and IoT and VNC attacks accelerate in Cybleβs latest sensor intelligence report.
π΅οΈββοΈ Facebook Businesses Targeted in Infostealer Phishing Campaign π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The threat actors deceive their victims by impersonating the legal teams of companies, wellknown Web stores, and manufacturers.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Taiwanese Facebook Biz Pages Fall to Infostealer Campaign
The threat actors sway its victims by impersonating the legal teams of companies, well-known stores, and manufacturers.
π΅οΈββοΈ Cybersecurity Job Market Stagnates, Dissatisfaction Abounds π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The 2024 ISC2 Cybersecurity Workforce Study found that amid a tightening job market and dynamic cyberthreat environment, ongoing staffing and skills shortages are putting organizations at serious risk. Can AI move the needle in defenders' favor?.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Cybersecurity Job Market Stagnates, Dissatisfaction Abounds
The 2024 ISC2 Cybersecurity Workforce Study found that amid a tightening job market and dynamic cyber threat environment, ongoing staffing and skills shortages are putting organizations at serious risk. Can AI move the needle in defenders' favor?
π΅οΈββοΈ Canada Grapples With 'Second-to-None' PRC-Backed Threat Actors π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Chinese APTs lurked in Canadian government networks for five years and that's just one among a whole host of threats from Chinese bad actors.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Canada Faces 'Second-to-None' PRC-Backed Threat Actors
Chinese APTs lurked in Canadian government networks for five years β and that's just one among a whole host of threats from Chinese bad actors.
π¦Ώ Midnight Blizzard Escalates Spear-Phishing Attacks On Over 100 Organizations π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Russian hackers, known as Midnight Blizzard, launch targeted spearphishing on U.S. officials, exploiting RDP files to gain access to data.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Midnight Blizzard Escalates Spear-Phishing Attacks On Over 100 Organizations
Russian hackers, known as Midnight Blizzard, launch targeted spear-phishing on U.S. officials, exploiting RDP files to gain access to data.
ποΈ Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? Its a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and IT.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1π₯1