ποΈ INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
INTERPOL on Tuesday said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from April 1 to August 31, 2024, targeting phishing, ransomware, and information stealer infrastructure. "Of the approximately 30,000 suspicious IP addresses identified, 76 per cent were taken down and 59.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Google Cloud to Mandate Multifactor Authentication by 2025 π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Google wants to ensure a smooth transition towards required MFA across all Google Cloud accounts with a phased rollout running throughout 2025.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Google Cloud to Mandate Multifactor Authentication by 2025
Google wants to ensure a smooth transition towards required MFA across all Google Cloud accounts with a phased rollout running throughout 2025
π’ Google Cloud will make MFA mandatory by the end of 2025 β hereβs what you need to know π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Admins and federated users will be required to use MFA to sign in by the end of 2025 in a move Google Cloud says will bolster cyber resilience.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Google Cloud will make MFA mandatory by the end of 2025 β hereβs what you need to know
Admins and federated users will be required to use MFA to sign in by the end of 2025 in a move Google Cloud says will bolster cyber resilience
π΅οΈββοΈ Attackers Breach IT-Based Networks Before Jumping to ICS/OT Systems π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
SANS recently published its 2024 State of ICS.OT Cybersecurity report, highlighting the skills of cyber professionals working in critical infrastructure, budget estimates, and emerging technologies. The report also looked at the most common types of attack vectors used against ICTOT networks.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Attackers Breach IT-Based Networks Before Jumping to ICS/OT Systems
SANS's "2024 State of ICS.OT Cybersecurity report" highlights the skills of cyber professionals working in critical infrastructure, budget estimates, emerging technologies, and the most common types of attack vectors used against ICT/OT networks.
π΅οΈββοΈ How to Outsmart Stealthy E-Crime and Nation-State Threats π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
In a time of increasingly sophisticated crossdomain attacks, relying solely on automated solutions isn't enough.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
How to Outsmart Stealthy E-Crime and Nation-State Threats
In a time of increasingly sophisticated cross-domain attacks, relying solely on automated solutions isn't enough.
π¦Ώ What Is a VPN? Definition, How It Works, and More π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
A VPN virtual private network encrypts your internet traffic and protects your online privacy. Find out how it works and why you should use it.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
What Is a VPN? Definition, How It Works, and More
A VPN (virtual private network) encrypts your internet traffic and protects your online privacy. Find out how it works and why you should use it.
π§ What Telegramβs recent policy shift means for cyber crime π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Since its launch in August 2013, Telegram has become the goto messaging app for privacyfocused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain marketplace. In the case of the latter, Telegram cannot be linked to the users real The post What Telegrams recent policy shift means for cyber crime appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
What Telegramβs recent policy shift means for cyber crime
Will Telegramβs recent data policy shift spark an exodus of cyber criminals from the platform? Hereβs what cybersecurity experts need to know.
ποΈ New Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers are warning that a commandandcontrol CC framework called Winos is being distributed within gamingrelated applications like installation tools, speed boosters, and optimization utilities. "Winos 4.0 is an advanced malicious framework that oers comprehensive functionality, a stable architecture, and efficient control over numerous online endpoints to execute.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ 9 Steps to Get CTEM on Your 2025 Budgetary Radar ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Budget season is upon us, and everyone in your organization is vying for their slice of the pie. Every year, every department has a pet project that they present as absolutely essential to profitability, business continuity, and quite possibly the future of humanity itself. And no doubt that some of these actually may be mission critical. But as cybersecurity professionals, we understand that.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π IRISSCON: Organizations Still Falling Victim to Predictable Cyber-Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Organizations remain unprepared to defend against known and predictable attacks like ransomware.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
IRISSCON: Organizations Still Falling Victim to Predictable Cyber-Attacks
Organizations remain unprepared to defend against known and predictable attacks like ransomware
π Winos4.0 Malware Found in Game Apps, Targets Windows Users π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Winos4.0 malware, derived from Gh0strat, targets Windows users via gamerelated applications, enabling remote control of affected systems.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Winos4.0 Malware Found in Game Apps, Targets Windows Users
Winos4.0 malware, derived from Gh0strat, targets Windows users via game-related applications, enabling remote control of affected systems
π Massive Nigerian Cybercrime Bust Sees 130 Arrested π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The Nigerian police have arrested 113 foreign individuals and their 17 Nigerian collaborators for their alleged involvement in highlevel cybercrimes.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Massive Nigerian Cybercrime Bust Sees 130 Arrested
The Nigerian police have arrested 113 foreign individuals and their 17 Nigerian collaborators for their alleged involvement in high-level cybercrimes
π Sales Director π
π Read more.
π Via "UnderDefense"
----------
ποΈ Seen on @cibsecurity
The post Sales Director appeared first on UnderDefense.π Read more.
π Via "UnderDefense"
----------
ποΈ Seen on @cibsecurity
UnderDefense
Sales Director - UnderDefense
π¦
Google Fixes Critical Zero-Day Vulnerabilities in Latest Android Security Update π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview In its latest security bulletin, Google has patched two actively exploited zeroday vulnerabilities in Android, marking a crucial step toward protecting users from likely spyware attacks. The November update addresses a total of 51 vulnerabilities, including a critical issue in Qualcomm components. Android users are strongly advised to install these updates to secure their devices against potential exploitation. Key Vulnerabilities in Focus CVE202443047 and CVE202443093 The two zerodaystracked as CVE202443047 and CVE202443093have been identified as exploited in targeted attacks. There are indications that the following may be under limited, targeted exploitation, Google said in its November Android Security Bulletin. These vulnerabilities have raised concerns du...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
π¦
GodFather Malware Expands Its Reach, Targeting 500 Banking And Crypto Applications Worldwide π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways Cyble Research and Intelligence Labs CRIL has identified a new variant of the GodFather malware, now targeting 500 banking and cryptocurrency apps. Initially focused on regions like the UK, US, Turkey, Spain, and Italy, GodFather has expanded its reach to include Japan, Singapore, Greece, and Azerbaijan. The GodFather malware has transitioned the Java code implementation to the Native code for its malicious activities. In its latest version, the GodFather malware uses limited permissions, relying heavily on Accessibility services to capture credentials from targeted applications. This updated variant also includes new commands that enable the malware to automate gestures on infected devices, mimicking user actions. The Threat ActorTA behind GodFather malwa...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
π Cyber-Attack on Microlise Disrupts DHL and Serco Tracking Services π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A cyberattack targeting telematics provider Microlise has disrupted tracking services for key clients like DHL and Serco.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Cyber-Attack on Microlise Disrupts DHL and Serco Tracking Services
A cyber-attack targeting telematics provider Microlise has disrupted tracking services for key clients like DHL and Serco
π΅οΈββοΈ Chinese Gamers Targeted in Winos4.0 Framework Scam π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Campaigns like Silver Fox and Void Arachne are deploying the framework, using social media and messaging platforms to lure in victims.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Chinese Gamers Targeted in Winos4.0 Framework Scam
Campaigns like Silver Fox and Void Arachne are deploying the framework, using social media and messaging platforms to lure in victims.
β€1
π΅οΈββοΈ German Law Could Protect Researchers Reporting Vulns π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The draft amendment also includes prison time for those who access systems to maliciously spy or intercept data.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
German Law Could Protect Researchers Reporting Vulns
The draft amendment also includes prison time for those who access systems to maliciously spy or intercept data.
π¦Ώ AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
AIenhanced malicious attacks are a top concern for 80 of executives, and for good reason, as there is a lot of evidence that bad actors are exploiting the technology.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
AI-Assisted Attacks Top Cyber Threat for Third Consecutive Quarter, Gartner Finds
Cyber attacks that are staged using artificial intelligence (AI) are the biggest risk for enterprises for the third consecutive quarter, according to a new Gartner report.
π¦Ώ Increasing Awareness of DNS Hijacking: A Growing Cyber Threat π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Read more about DNS hijacking and how organizations can prevent it.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Increasing Awareness of DNS Hijacking: A Growing Cyber Threat
DNS hijacking is a growing threat that can redirect users to malicious sites. However, using passive DNS monitoring can help to protect data.
π1
ποΈ VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi. "Leveraging Microsoft SaaS services including Teams, SharePoint, Quick Assist, and OneDrive the attacker exploited the trusted infrastructures of previously compromised organizations to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity