ποΈ Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stealer as part of separate campaigns. "In both campaigns, attackers hid malicious code in images they uploaded to archive.org, a filehosting website, and used the same .NET loader to install their final payloads," HP Wolf Security said in its Threat Insights Report.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π DORA Compliance Costs Soar Past β¬1m for Many UK and EU Businesses π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Compliance with the Digital Operational Resilience Act DORA has cost many businesses over 1 million, according to research from Rubrik.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
DORA Compliance Costs Soar Past β¬1m for Many UK and EU Businesses
Compliance with the Digital Operational Resilience Act (DORA) has cost many businesses over β¬1 million, according to research from Rubrik
π New Hacking Group Leaks Configuration of 15,000 Fortinet Firewalls π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The leak likely comes from a zeroday exploit affecting Fortinets products.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New Hacking Group Leaks Configuration of 15,000 Fortinet Firewalls
The leak likely comes from a zero-day exploit affecting Fortinetβs products
π GoDaddy Accused of Serious Security Failings by FTC π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A proposed settlement order from the FTC will require GoDaddy to strengthen its security practices following multiple data breaches at the web hosting giant.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
GoDaddy Accused of Serious Security Failings by FTC
A proposed settlement order from the FTC will require GoDaddy to strengthen its security practices following multiple data breaches at the web hosting giant
π Hackers Use Image-Based Malware and GenAI to Evade Email Security π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
HP Wolf highlighted novel techniques used by attackers to bypass email protections, including embedding malicious code inside images and utilizing GenAI.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Hackers Use Image-Based Malware and GenAI to Evade Email Security
HP Wolf highlighted novel techniques used by attackers to bypass email protections, including embedding malicious code inside images and utilizing GenAI
π¦
Government Sector Bears the Brunt of Cyberattacks in Ukraine: Report π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview Ukraine's fight against cyberthreats has reached new heights, with its top cybersecurity agency releasing the 2024 annual cyberthreat landscape report detailing its efforts to protect critical infrastructure and government systems. The report, prepared by the State Cyber Defense Center under the State Service for Special Communications and Information Protection, outlines key findings, incident statistics, and strategies employed to counteract persistent cyber threats. Key Findings Ukraine processed a staggering 3 million security events in 2024, a reflection of the heightened activity in its cyber domain. Of these, over 1,000 incidents were confirmed as direct cyberthreats. The year saw a surge in advanced persistent threats APTs and statesponsored cyber esp...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Ukraineβs Cyberthreat Landscape 2024
Explore Ukraineβs 2024 cyberthreat landscape, uncovering government sector espionage, persistence, and operational disruption risks.
π¦
ICS Vulnerability Report: Hitachi Energy Network Management Flaw Scores a Perfect 10 π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview Critical vulnerabilities in Hitachi Energy UNEM Network Management Systems were among the highlights in Cybles weekly Industrial Control System ICS Vulnerability Intelligence Report, which also examined flaws in products from Delta Electronics, Schneider Electric and other ICS vendors. Cyble Research Intelligence Labs CRIL examined 16 vulnerabilities in the report for clients half of which affect Hitachi Energy FOXMANUN products based on ICS alerts by the Cybersecurity and Infrastructure Security Agency CISA between January 814. Of the 16 vulnerabilities, two are critical, nine are high severity, and five are medium severity. They span Communication, Critical Manufacturing, Chemical, Energy, Wastewater Systems and Commercial Facilities, and could lead to operation...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ Strategic Approaches to Threat Detection, Investigation & Response π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
By staying vigilant, agile, and prepared, organizations can turn TDIR from a defensive strategy into a proactive enabler of security and operational excellence.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Strategic Approaches to TDIR
By staying vigilant, agile, and prepared, organizations can turn threat detection, investigation, and response from a defensive strategy into a proactive enabler of security and operational excellence.
π Middle Eastern Real Estate Fraud Grows with Online Listings π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Middle East real estate scams are surging as fraudsters exploit online listings and bypassed due diligence checks.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Middle Eastern Real Estate Fraud Grows with Online Listings
Middle East real estate scams are surging as fraudsters exploit online listings and bypassed due diligence checks
π Trumpβs Truth Social Users Targeted by Rampant Scams Online π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Truth Social, launched by the Trump Media Technology Group in 2022, has become a hotspot for scams like phishing and investment fraud.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Trumpβs Truth Social Users Targeted by Rampant Scams Online
Truth Social, launched by the Trump Media & Technology Group in 2022, has become a hotspot for scams like phishing and investment fraud
π Biden Tightens Software Supply Chain Security Requirements Ahead of Trump Takeover π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The US Presidents second cybersecurity Executive Order will impose stricter security standards on software providers.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Biden Tightens Software Supply Chain Security Requirements Ahead of Trump Takeover
The US Presidentβs second cybersecurity Executive Order will impose stricter security standards on software providers
ποΈ Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Russian threat actor known as Star Blizzard has been linked to a new spearphishing campaign that targets victims' WhatsApp accounts, signaling a departure from its longstanding tradecraft in a likely attempt to evade detection. "Star Blizzard's targets are most commonly related to government or diplomacy both incumbent and former position holders, defense policy or international relations.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ Biden's Cybersecurity EO Leaves Trump a Comprehensive Blueprint for Defense π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
New order mandates securing the federal software supply chain and communications networks, as well as deploying AI tools to protect critical infrastructure from cyberattacks but will the Trump administration follow through?.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Biden's Cyber EO Gives Trump a Blueprint for Defense
New order mandates securing the federal software supply chain, communications networks, as well as deploying AI tools to protect critical infrastructure from cyberattacks β but will the Trump administration follow through?
π΅οΈββοΈ FTC Orders GoDaddy to Fix Inadequate Security Practices π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The FTC claims that the Web hosting company's security failures led to several major breaches in the past few years.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
FTC Orders GoDaddy to Fix Inadequate Security Practices
The FTC claims that the Web hosting company's security failures led to several major breaches in the past few years.
βοΈ Chinese Innovations Spawn Wave of Toll Phishing Via SMS βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Residents across the United States are being inundated with text messages purporting to come from toll road operators like EZPass, warning that recipients face fines if a delinquent toll fee remains unpaid. Researchers say the surge in SMS spam coincides with new features added to a popular commercial phishing kit sold in China that makes it simple to set up convincing lures spoofing toll road operators in multiple U.S. states.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Chinese Innovations Spawn Wave of Toll Phishing Via SMS
Residents across the United States are being inundated with text messages purporting to come from toll road operators like E-ZPass, warning that recipients face fines if a delinquent toll fee remains unpaid. Researchers say the surge in SMS spam coincidesβ¦
π΅οΈββοΈ Russian APT Phishes Kazakh Gov't for Strategic Intel π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
A highly targeted cyberintelligence campaign adds fuel to the increasingly complex relationship between the two former Soviet states.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Russian APT Phishes Kazakh Gov't for Strategic Intel
A highly targeted cyber-intelligence campaign adds fuel to the increasingly complex relationship between the two former Soviet states.
ποΈ European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Austrian privacy nonprofit None of Your Business noyb has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully transferring users' data to China. The advocacy group is seeking an immediate suspension of such transfers, stating the companies in question cannot shield user data.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π2
π Noyb Files GDPR Complaints Against TikTok and Five Chinese Tech Giants π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
AliExpress, Shein, Temu, TikTok, WeChat and Xiaomi are accused of operating unlawful data transfers to China.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Noyb Files GDPR Complaints Against TikTok and Five Chinese Tech Giants
AliExpress, Shein, Temu, TikTok, WeChat and Xiaomi are accused of operating unlawful data transfers to China
π DORA Takes Effect: Financial Firms Still Navigating Compliance Headwinds π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The EUs DORA regulation is in effect as of January 17, with mixed evidence around compliance levels among financial firms.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
DORA Takes Effect: Financial Firms Still Navigating Compliance Headwinds
The EUβs DORA regulation is in effect as of January 17, with mixed evidence around compliance levels among financial firms
π¦
Sliver Implant Targets German Entities with DLL Sideloading and Proxying Techniques π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways Cyble Research and Intelligence Labs CRIL has identified an ongoing cyberattack targeting organizations in Germany. The attack is initiated through a deceptive LNK file embedded within an archive. When executed by an unsuspecting user, this LNK file triggers cmd.exe to copy and run wksprt.exe, a legitimate executable. This executable sideloads a malicious DLL that employs DLL proxying, ensuring the host application continues to operate seamlessly while executing malicious shellcode in the background. The shellcode ultimately decrypts and executes the final payload Sliver, a wellknown opensource Red Teamadversary emulation framework. Once deployed, Sliver functions as an implant, enabling threat actors to establish communication with the compromised system and...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Sliver Implant Targets German Entities With DLL Sideloading
Learn how the Sliver implant uses DLL sideloading and proxying to target German entities. Explore the latest cyber threat techniques and defense strategies
π¦
AI Takes the Center Stage in Bidenβs Landmark Cybersecurity Order π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview Outgoing U.S. President Joe Biden issued an order yesterday outlining measures to improve government cybersecurity. The lengthy order includes suggestions to improve cloud and software security by building requirements into the federal acquisition process. It also orders federal agencies to adopt a number of cybersecurity technologies and practices and takes a forwardthinking approach to AI. As the culmination of efforts that began nearly four years ago in response to the Colonial Pipeline ransomware attack, the order is also valuable as a lessons learned document from an Administration that has had much to deal with in four years of dramatic cybersecurity events. Cloud, Software Security Goals Bidens final cybersecurity plan is also ambitious in its implementatio...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity