π Aussie Pension Savers Hit with Wave of Credential Stuffing Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Cyberattacks on Australian superannuation funds leave some savers out of pocket.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Aussie Pension Savers Hit with Wave of Credential Stuffing Attacks
Cyber-attacks on Australian superannuation funds leave some savers out of pocket
ποΈ PoisonSeed Exploits CRM Accounts to Launch Cryptocurrency Seed Phrase Poisoning Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A malicious campaign dubbed PoisonSeed is leveraging compromised credentials associated with customer relationship management CRM tools and bulk email providers to send spam messages containing cryptocurrency seed phrases in an attempt to drain victims' digital wallets. "Recipients of the bulk spam are targeted with a cryptocurrency seed phrase poisoning attack," Silent Push said in an.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ PoisonSeed Exploits CRM Accounts to Launch Cryptocurrency Seed Phrase Poisoning Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A malicious campaign dubbed PoisonSeed is leveraging compromised credentials associated with customer relationship management CRM tools and bulk email providers to send spam messages containing cryptocurrency seed phrases in an attempt to drain victims' digital wallets. "Recipients of the bulk spam are targeted with a cryptocurrency seed phrase poisoning attack," Silent Push said in an.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Smishing Triad Fuels Surge in Toll Payment Scams in US, UK π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A rise in smishing campaigns impersonating toll service providers has been linked to Chinas Smishing Triad.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Smishing Triad Fuels Surge in Toll Payment Scams in US, UK
A rise in smishing campaigns impersonating toll service providers has been linked to Chinaβs Smishing Triad
π Aussie Pension Savers Hit with Wave of Credential Stuffing Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Cyberattacks on Australian superannuation funds leave some savers out of pocket.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Aussie Pension Savers Hit with Wave of Credential Stuffing Attacks
Cyber-attacks on Australian superannuation funds leave some savers out of pocket
π Darknetβs Xanthorox AI Offers Customizable Tools for Hackers π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Xanthorox AI, a selfcontained system for offensive cyber operations, has emerged on darknet forums.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Darknetβs Xanthorox AI Offers Customizable Tools for Hackers
Xanthorox AI, a self-contained system for offensive cyber operations, has emerged on darknet forums
π Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Security researchers from ExtensionTotal have found nine malicious extensions in Visual Studio Code, Microsofts lightweight sourcecode editor.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign
Security researchers from ExtensionTotal have found nine malicious extensions in Visual Studio Code, Microsoftβs lightweight source-code editor
π’ Europcar data breach could affect up to 200,000 customers π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Europcar has reportedly suffered a massive data breach affecting as many as 200,000 customers.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Europcar data breach could affect up to 200,000 customers
Hackers say they've accessed all the firm's GitLab repositories - Europcar denies the claims
π’ Australian pension funds slammed for βabsolute incompetenceβ in wake of cyber attacks π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
While firms are working to minimize the damage, Super Consumers Australia said the attack showed 'absolute incompetence'.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Australian pension funds slammed for βabsolute incompetenceβ in wake of cyber attacks
While firms are working to minimize the damage, Super Consumers Australia said the attack showed 'absolute incompetence'
π’ Hackers are targeting Ivanti VPN users again β hereβs what you need to know π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Ivanti has repatched a security flaw in its Connect Secure VPN appliances that's been exploited by a Chinalinked espionage group since at least the middle of March.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Hackers are targeting Ivanti VPN users again β hereβs what you need to know
Ivanti issued a patch in February, but researchers were able to find an exploit for early versions
π’ βInsiders donβt need to break inβ: A developer crippled company networks with malicious code and a βkill switchβ after being sacked β and experts warn it shows the huge danger of insider threats π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Security experts have warned ITPro over the risks of insider threats from disgruntled workers after a software developer deployed a 'kill switch' to sabotage his former employers networks.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
βInsiders donβt need to break inβ: A developer crippled company networks with malicious code and a βkill switchβ after being sackedβ¦
The incident highlights the growing risks of insider threats, experts told ITPro
π’ Cyber criminals are using the US tax deadline to score a payday π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Cyber criminals are using tax season as an opportunity to trick individuals and businesses into handing over sensitive information.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Cyber criminals are using the US tax deadline to score a payday
Microsoft researchers discover βquishingβ and url-shortner attacks to cloak malicious links in the IRSβ clothing
π΅οΈββοΈ Dangerous, Windows-Hijacking Neptune RAT Scurries Into Telegram, YouTube π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The malware's creators insist a new open source version of Neptune is for educational use by pen testers, but a raft of sophisticated backdoor and evasion capabilities says otherwise.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Windows-Hijacking Neptune RAT Scurries via Telegram, YouTube
The malware's creators insist a new open source version of Neptune is for educational use by pentesters, but a raft of sophisticated backdoor and evasion capabilities says otherwise.
π΅οΈββοΈ Experts Optimistic About Secure by Design Progress π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Secure by Design is an important step to reduce the number of vulnerabilities present originally, but is it progressing fast enough? According to security experts Chris Wysopal and Jason Healey, the landscape is improving.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Experts Optimistic About Secure by Design Progress
Secure by design is an important step to reduce the number of vulnerabilities present originally, but is it progressing fast enough? According to security experts Chris Wysopal and Jason Healey, the landscape is improving.
π΅οΈββοΈ Palo Alto Networks Begins Unified Security Rollout π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Cortex Cloud integrates Prisma Cloud with CDR to provide a consolidated security posture management and realtime threat detection and remediation platform.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Palo Alto Networks Begins Unified Security Rollout
Cortex Cloud integrates Prisma Cloud with CDR to provide a consolidated security posture management and real-time threat detection and remediation platform.
π¦Ώ How to Use a VPN: 4 Easy Steps to Get Started π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Learn how to set up and use a VPN with just four easy steps. This stepbystep guide takes you through how you can secure your connection and online data.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
How to Use a VPN: 4 Easy Steps to Get Started
Learn how to use a VPN in four easy steps. Follow this step-by-step setup guide to enhance your online privacy, security, and access restricted content.
ποΈ Agentic AI in the SOC - Dawn of Autonomous Alert Triage ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Security Operations Centers SOCs today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases analyst fatigue, burnout, and attrition. While artificial intelligence has emerged as a goto solution, the term AI often blurs crucial distinctions. Not all AI is built equal, especially in the SOC. Many.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Computer Emergency Response Team of Ukraine CERTUA has revealed a new set of cyber attacks targeting Ukrainian institutions with informationstealing malware. The activity is aimed at military formations, law enforcement agencies, and local selfgovernment bodies, particularly those located near Ukraine's eastern border, the agency said. The attacks involve distributing phishing emails.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A recently disclosed critical security flaw impacting CrushFTP has been added by the U.S. Cybersecurity and Infrastructure Security Agency CISA to its Known Exploited Vulnerabilities KEV catalog after reports emerged of active exploitation in the wild. The vulnerability is a case of authentication bypass that could permit an unauthenticated attacker to take over susceptible instances. It has.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Google has shipped patches for 62 vulnerabilities, two of which it said have been exploited in the wild. The two highseverity vulnerabilities are listed below CVE202453150 CVSS score 7.8 An outofbounds flaw in the USB subcomponent of Kernel that could result in information disclosure CVE202453197 CVSS score 7.8 A privilege escalation flaw in the USB subcomponent of Kernel.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π NIST Defers Pre-2018 CVEs to Tackle Growing Vulnerability Backlog π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
NIST marks CVEs pre2018 as Deferred in the NVD as agency focus shifts to managing emerging threats.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
NIST Defers Pre-2018 CVEs to Tackle Growing Vulnerability Backlog
NIST marks CVEs pre-2018 as βDeferredβ in the NVD as agency focus shifts to managing emerging threats