ποΈ The High-Stakes Disconnect For ICS/OT Security ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Why does ICSOT need specific controls and its own cybersecurity budget today? Because treating ICSOT security with an IT security playbook isnt just ineffectiveits high risk. In the rapidly evolving domain of cybersecurity, the specific challenges and needs for Industrial Control Systems ICS and Operational Technology OT security distinctly stand out from traditional IT security. ICSOT.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Multi-Cloud Adoption Surges Amid Rising Security Concerns π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A new report from Fortinet reveals increased adoption of multicloud strategies and hybrid implementations combining onpremises and public cloud infrastructure.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Multi-Cloud Adoption Surges Amid Rising Security Concerns
A new report from Fortinet reveals increased adoption of multi-cloud strategies and hybrid implementations combining on-premises and public cloud infrastructure
π Chinese PlugX Malware Deleted in Global Law Enforcement Operation π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The FBI deleted Chinese PlugX malware from thousands of devices in the US, using a technique developed by French cybersecurity firm Sekoia.io.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Chinese PlugX Malware Deleted in Global Law Enforcement Operation
The FBI deleted Chinese PlugX malware from thousands of devices in the US, using a technique developed by French cybersecurity firm Sekoia.io
π Illicit Crypto-Inflows Set to Top $51bn in a Year π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Chainalysis estimates threat actors made at least 51bn through crypto crime in 2024.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Illicit Crypto-Inflows Set to Top $51bn in a Year
Chainalysis estimates threat actors made at least $51bn through crypto crime in 2024
π¦
Fortinetβs Authentication Bypass Zero-Day: Mitigation Strategies and IoCs for Enhanced Security π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview Fortinet has disclosed a critical authentication bypass vulnerability affecting FortiOS and FortiProxy systems, identified as CVE202455591. With a CVSS score of 9.6, this vulnerability allows unauthenticated attackers to execute unauthorized code or commands, granting them superadmin privileges. The exploitation of this vulnerability has already been observed in the wild, stressing the urgency for affected organizations to act immediately. Key Details Vulnerability Summary CVE202455591 arises from a flaw in the Node.js websocket module, specifically within FortiOS and FortiProxy, where an alternate path or channel can bypass authentication mechanisms CWE288. This allows remote attackers to gain administrative access and compromise device configurations. Affe...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Fortinet Patches Authentication Bypass Zero-Day
Fortinet has disclosed a critical authentication bypass vulnerability affecting FortiOS and FortiProxy systems. Identified as CVE-2024-55591, bug grants βsuper-adminβ privileges.
π¦Ώ Enhancing Health Care Cybersecurity: Bridging HIPAA Gaps with Innovation π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
The proposed HIPAA Security Rule introduces mandatory measures to prevent malicious cyberattacks in health care.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Enhancing Health Care Cybersecurity: Bridging HIPAA Gaps with Innovation
The proposed HIPAA Security Rule introduces mandatory measures that reflect the growing sophistication of cyber threats in health care.
π¦Ώ CyberGhost VPN Review (2025): Features, Pricing, and Security π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
In this comprehensive review of CyberGhost VPN, we cover its features, pricing, security, and overall performance. Find out if this is the right VPN for you.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
CyberGhost VPN Review (2025): Features, Pricing, and Security
Is CyberGhost VPN truly fast, secure, and great for streaming? Explore its performance, privacy features, and streaming compatibility in our review.
ποΈ North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016 crowdfunding scam. The new evidence suggests that Pyongyangbased threamoret groups may have pulled off illicit moneymaking scams that predate the use of IT workers, SecureWorks Counter Threat Unit CTU said in a report shared with The Hacker.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ How the channel can simplify cybersecurity to build trust and agility for SMBs π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
There's an opportunity for the channel to move from tech resellers to trusted advisors on security and help alleviate the security burden on SMBs.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ChannelPro
How the channel can simplify cybersecurity to build trust and agility for SMBs
There's an opportunity for the channel to move from tech resellers to trusted advisors on security and help alleviate the security burden on SMBs
π΅οΈββοΈ CISA: Second BeyondTrust Vulnerability Added to KEV Catalog π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
BeyondTrust has patched all cloud instances of the vulnerability and has released patches for selfhosted versions.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
CISA: Second BeyondTrust Vulnerability Added to KEV Catalog
BeyondTrust has patched all cloud instances of the vulnerability and has released patches for self-hosted versions.
π΅οΈββοΈ Extension Poisoning Campaign Highlights Gaps in Browser Security π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Evidence suggests that some of the payloads and extensions may date as far back as April 2023.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Extension Poisoning Campaign Highlights Gaps in Browser Security
Evidence suggests that some of the payloads and extensions may date as far back as April 2023.
π΅οΈββοΈ North Korea's Lazarus APT Evolves Developer-Recruitment Attacks π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
"Operation 99" uses job postings to lure freelance software developers into downloading malicious Git repositories. From there, malware infiltrates developer projects to steal source code, secrets, and cryptocurrency.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
North Korea's Lazarus Evolves Developer-Recruitment Attacks
"Operation 99" uses job postings to lure freelance software developers into downloading malicious Git repositories. From there, malware infiltrates developer projects to steal source code, secrets, and cryptocurrency.
π΅οΈββοΈ OWASP's New LLM Top 10 Shows Emerging AI Threats π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Ultimately, there is no replacement for an intuitive, securityfocused developer working with the critical thinking required to drive down the risk of both AI and human error.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
OWASP's New LLM Top 10 Shows Emerging AI Threats
Ultimately, there is no replacement for an intuitive, security-focused developer working with the critical thinking required to drive down the risk of both AI and human error.
π¦Ώ UK Considers Banning Ransomware Payments π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
The proposed mandate intends to discourage criminals from targeting critical national infrastructure and public services, as there will be no financial motivation.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
UK Considers Banning Ransomware Payments
The U.K. government is considering banning ransomware payments to make critical industries βunattractive targets for criminals.β
π¦Ώ Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Microsofts monthly patches cover HyperV NT Kernel Integration VSPs, Git in Visual Studio, and more.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks
Microsoftβs monthly patches cover Hyper-V NT Kernel Integration VSPs, Git in Visual Studio, and more.
π CISA Launches Playbook to Boost AI Cybersecurity Collaboration π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
CISA launched the JCDC AI Cybersecurity Playbook to enhance collaboration on AI cybersecurity risks.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
CISA Launches Playbook to Boost AI Cybersecurity Collaboration
CISA launched the JCDC AI Cybersecurity Playbook to enhance collaboration on AI cybersecurity risks
π¦Ώ 5 Emerging AI Threats Australian Cyber Pros Must Watch in 2025 π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
AI cloning and deepfakes rank among the top challenges for Australian cybersecurity professionals in 2025.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
5 Emerging AI Threats Australian Cyber Pros Must Watch in 2025
AI cloning and deepfakes rank among the top challenges for Australian cybersecurity professionals in 2025.
β€1
ποΈ Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals and businesses advertising via Google Ads by attempting to phish for their credentials via fraudulent ads on Google. "The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages," Jrme Segura, senior director of.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99 ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The North Korealinked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for freelance Web3 and cryptocurrency work to deliver malware. "The campaign begins with fake recruiters, posing on platforms like LinkedIn, luring developers with project tests and code reviews," Ryan Sherstobitoff, senior vice president of Threat.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
π΅οΈββοΈ Attackers Hijack Google Advertiser Accounts to Spread Malware π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
It's an especially brazen form of malvertising, researchers say, striking at the heart of Google's business the tech giant says it's aware of the issue and is working quickly to address the problem.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
ποΈ Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Pythonbased backdoor to maintain persistent access to compromised endpoints and then leveraged this access to deploy the RansomHub ransomware throughout the target network. According to GuidePoint Security, initial access is said to have been facilitated by means of a JavaScript malware downloaded named.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity