π¦
HexaLocker V2: Skuld Stealer Paving the Way prior to Encryption π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways HexaLocker was first discovered in mid2024, with version 2 introducing significant updates and enhanced functionalities. HexaLocker V2 includes a persistence mechanism that modifies registry keys to ensure continued execution after the affected system reboots. The updated version downloads Skuld Stealer, which extracts sensitive information from the victims system before encryption. Unlike its predecessor, HexaLocker V2 exfiltrates victim files before encrypting them, following the double extortion method of data theft and file encryption. HexaLocker V2 utilizes a combination of advanced encryption algorithms, including AESGCM for string encryption, Argon2 for key derivation, and ChaCha20 for file encryption. HexaLocker V2 replaces the TOXID communication me...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Hexalocker-v2-being-proliferated-by-Skuld-Stealer
CRIL analyzes the return of Hexalocker Ransomware in a new version that leverages the Skuld Stealer and other advanced capabilities.
π¦
Lithuaniaβs New Cyber Command is a Strategic Step Towards National and NATO Cybersecurity Resilience π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview On January 1, Lithuania marked a pivotal moment in its national defense strategy with the official launch of the Lithuanian Cyber Command LTCYBERCOM. Spearheaded by the Ministry of National Defence, this new military unit aims to enhance the country's cybersecurity posture while strengthening its collaboration with NATO and other international partners. A New Era in Cyber Defense with Lithuanian Cyber Command LTCYBERCOM is tasked with conducting cyberspace operations and managing strategic communications and information systems CIS. Its creation reflects Lithuanias recognition of the growing importance of cyberspace in modern warfare and national security. By consolidating cyber defense resources under one command, LTCYBERCOM ensures a unified and efficient approach ...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
π§ Cybersecurity trends: IBMβs predictions for 2025 π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Cybersecurity concerns in 2024 can be summed up in two letters AI or five letters if you narrow it down to gen AI. Organizations are still in the early stages of understanding the risks and rewards of this technology. For all the good it can do to improve data protection, keep up with compliance regulations The post Cybersecurity trends IBMs predictions for 2025 appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
Cybersecurity trends: IBMβs predictions for 2025
With AI and gen AI likely taking the cybersecurity spotlight in 2025, there are still more trends to consider as we look to the new year.
ποΈ New Banshee Stealer Variant Bypasses Antivirus with Appleβs XProtect-Inspired Encryption ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have uncovered a new, stealthier version of a macOSfocused informationstealing malware called Banshee Stealer. "Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple's XProtect," Check Point Research said in a new analysis shared with The Hacker News. "This development allows it to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ New AI Challenges Will Test CISOs & Their Teams in 2025 π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
CISOs need to recognize the new threats AI can present while also embracing AIpowered solutions to stay ahead of those threats.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
New AI Challenges Will Test CISOs & Their Teams in 2025
CISOs need to recognize the new threats AI can present β while also embracing AI-powered solutions to stay ahead of those threats.
π¦Ώ IPVanish VPN Review: Is It Really as Secure as Claimed? π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Read our comprehensive review of IPVanish VPN. Discover its features, pricing, and more to determine if it meets your online security and privacy needs.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
IPVanish VPN Review: Is it Really as Secure as Claimed?
Read our comprehensive review of IPVanish VPN. Discover its features, pricing, and more to determine if it meets your online security and privacy needs.
π Japan Faces Prolonged Cyber-Attacks Linked to Chinaβs MirrorFace π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Cyberattacks by Chinalinked MirrorFace targeted Japans national security information in major campaigns operating since 2019.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Japan Faces Prolonged Cyber-Attacks Linked to Chinaβs MirrorFace
Cyber-attacks by China-linked MirrorFace targeted Japanβs national security information in major campaigns operating since 2019
π PowerSchool Reportedly Pays Ransom to Prevent Student Data Leak π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A school district said that PowerSchool paid a ransom to prevent the attackers releasing data it accessed of students and teachers in North America.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
PowerSchool Reportedly Pays Ransom to Prevent Student Data Leak
A school district said that PowerSchool paid a ransom to prevent the attackers releasing data it accessed of students and teachers in North America
π3
π Fancy Product Designer Plugin Flaws Expose WordPress Sites π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Critical Fancy Product Designer plugin flaws risk remote code execution and SQL injection attacks on WordPress sites.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Fancy Product Designer Plugin Flaws Expose WordPress Sites
Critical Fancy Product Designer plugin flaws risk remote code execution and SQL injection attacks on WordPress sites
π1
π¦Ώ Whatβs Next for Open Source Software Security in 2025? π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Hidden dependencies, social engineering attacks, and the complexity of foundation models can all contribute tothe insecure use of opensource software in 2025.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Whatβs Next for Open Source Software Security in 2025?
Hidden dependencies and social engineering attacks can contribute to the insecure use of open-source software in 2025.
ποΈ Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a highseverity bug that an authenticated attacker could exploit to access sensitive data. "Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ Hacking Group 'Silk Typhoon' Linked to US Treasury Breach π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The attack used a stolen remote support SaaS API key to exfiltrate data from workstations in the Treasury Department's Office of Foreign Assets Control.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Hacking Group 'Silk Typhoon' Linked to US Treasury Breach
The attack used a stolen remote support SaaS API key to exfiltrate data from workstations in the Treasury Department's Office of Foreign Assets Control.
π΅οΈββοΈ Chinese APT Group Is Ransacking Japan's Secrets π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Since 2019, MirrorFace has been stealing information from myriad Japanese organizations to gain leverage over Japan in the event of hostilities between the two countries, experts said.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Chinese APT Group Is Ransacking Japan's Secrets
Since 2019, MirrorFace has been stealing information from myriad Japanese organizations to gain leverage over Japan in the event of hostilities between the two countries, experts said.
π΅οΈββοΈ Banshee 2.0 Malware Steals Apple's Encryption to Hide on Macs π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The most recent iteration of the open source infostealer skates by antivirus programs on Macs, using an encryption mechanism stolen from Apple's own antivirus product.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Banshee 2.0 Steals Apple's Encryption to Hide on Macs
The most recent iteration of the open source infostealer skates by antivirus programs on Macs, using an encryption mechanism stolen from Apple's own antivirus product.
π¦
Critical ICS Vulnerabilities Uncovered in Weekly Vulnerability Report π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview This week's ICS vulnerability report sheds light on multiple flaws detected between January 01, 2025, to January 07, 2025. The report offers crucial insights into the cybersecurity challenges faced by organizations. It draws attention to the vulnerabilities identified by the Cybersecurity and Infrastructure Security Agency CISA, which has issued multiple advisories highlighting the risks that need urgent mitigation. CISA's latest advisories target two specific vulnerabilities affecting a wide range of ICS devices and systems. These advisories are crucial, given that vulnerabilities in ICS systems can have serious consequences for the safety and efficiency of critical infrastructure. In total, 27 vulnerabilities were reported, affecting products from vendors such as ABB a...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
π Fake PoC Exploit Targets Security Researchers with Infostealer π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Trend Micro detailed how attackers are using a fake proofofconcept for a critical Microsoft vulnerability, designed to steal sensitive data from security researchers.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Fake PoC Exploit Targets Security Researchers with Infostealer
Trend Micro detailed how attackers are using a fake proof-of-concept for a critical Microsoft vulnerability, designed to steal sensitive data from security researchers
π’ 2024 was a record year for commercial cyber attacks π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Chinabacked attacks on IoT systems helped keep numbers high.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
2024 was a record year for commercial cyber attacks
China-backed attacks on IoT systems helped keep numbers high
π’ A critical Ivanti flaw is being exploited in the wild β hereβs what you need to know π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
A critical Ivanti flaw is being exploited in the wild β hereβs what you need to know
Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances
π’ Malwarebytes Teams review: A feature-rich cybersecurity suite for organizations without dedicated IT support π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
An easily understood package that takes the pain out of securing your IT estate and keeping it that way.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Malwarebytes Teams review: A feature-rich cybersecurity suite for organizations without dedicated IT support
An easily understood package that takes the pain out of securing your IT estate β and keeping it that way.
ποΈ Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Network segmentation remains a critical security requirement, yet organizations struggle with traditional approaches that demand extensive hardware investments, complex policy management, and disruptive network changes. Healthcare and manufacturing sectors face particular challenges as they integrate diverse endpoints from legacy medical devices to IoT sensors onto their production networks.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have detailed a nowpatched security flaw impacting Monkey's Audio APE decoder on Samsung smartphones that could lead to code execution. The highseverity vulnerability, tracked as CVE202449415 CVSS score 8.1, affects Samsung devices running Android versions 12, 13, and 14. "Outofbounds write in libsaped.so prior to SMR Dec2024 Release 1 allows remote.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity