ποΈ DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider's MSP SimpleHelp remote monitoring and management RMM tool, and then leveraged it to exfiltrate data and drop the locker on multiple endpoints. It's believed that the attackers exploited a trio of security flaws in SimpleHelp CVE202457727, CVE202457728, and CVE202457726 that were.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Google on Wednesday disclosed that the Chinese statesponsored threat actor known as APT41 leveraged a malware called TOUGHPROGRESS that uses Google Calendar for commandandcontrol C2. The tech giant, which discovered the activity in late October 2024, said the malware was hosted on a compromised government website and was used to target multiple other government entities. "Misuse of cloud.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Malware Analysis Reveals Sophisticated RAT With Corrupted Headers π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Fortinet has identified a new Windows RAT operating stealthily on compromised systems with advanced evasion techniques.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Malware Analysis Reveals Sophisticated RAT With Corrupted Headers
Fortinet has identified a new Windows RAT operating stealthily on compromised systems with advanced evasion techniques
π Thousands of ASUS Routers Hijacked in Stealthy Backdoor Campaign π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A threat actor has used ASUS routers legitimate features to create persistent backdoors that survive firmware updates and reboots.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Thousands of ASUS Routers Hijacked in Stealthy Backdoor Campaign
A threat actor has used ASUS routersβ legitimate features to create persistent backdoors that survive firmware updates and reboots
π Cybersecurity Teams Generate Average of $36M in Business Growth π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A new EY report found that cybersecurity teams are a major vehicle for business growth, and CISOs should push for a seat at the top table.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Cybersecurity Teams Generate Average of $36M in Business Growth
A new EY report found that cybersecurity teams are a major vehicle for business growth, and CISOs should push for a seat at the top table
π #Infosec2025: Over 90% of Top Email Domains Vulnerable to Spoofing Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
EasyDMARC found that just 7.7 of the worlds top 1.8 million email domains have implemented the most stringent DMARC policy.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
#Infosec2025: Over 90% of Top Email Domains Vulnerable to Spoofing Attacks
EasyDMARC found that just 7.7% of the worldβs top 1.8 million email domains have implemented the most stringent DMARC policy
π¦Ώ Microsoft Defender Antivirus vs McAfee: Which Is Better for Your PC Security? π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Compare Microsoft Defender Antivirus and McAfee features to find the best antivirus for you. Discover the right choice for your security needs.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Microsoft Defender Antivirus vs McAfee: Which Is Better for Your PC Security?
Compare Microsoft Defender Antivirus and McAfee features to find the best antivirus for you. Discover the right choice for your security needs.
π New Browser Exploit Technique Undermines Phishing Detection π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Fullscreen BrowserintheMiddle attacks are making it harder for users to detect malicious websites.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New Browser Exploit Technique Undermines Phishing Detection
Fullscreen Browser-in-the-Middle attacks are making it harder for users to detect malicious websites
β€2
ποΈ New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS and PE headers, according to new findings from Fortinet. The DOS Disk Operating System and PE Portable Executable headers are essential parts of a Windows PE file, providing information about the executable. While the DOS header makes the executable file backward compatible.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ Breach at data analytics firm impacts 364,000 people π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Hackers used company GitHub account to steal software bits and personal information, company admits.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Breach at data analytics firm impacts 364,000 people
Hackers used company GitHub account to steal software bits and personal information, company admits
π΅οΈββοΈ A Defense-in-Depth Approach for the Modern Era π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
By integrating intelligent network policies, zerotrust principles, and AIdriven insights, enterprises can create a robust defense against the next generation of cyber threats.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
A Defense-in-Depth Approach for the Modern Era
By integrating intelligent network policies, zero-trust principles, and AI-driven insights, enterprises can create a robust defense against the next generation of cyber threats.
π ConnectWise Confirms Hack, βVery Small Numberβ of Customers Affected π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The firms remote monitoring management tool, ScreenConnect, has reportedly been patched.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
ConnectWise Confirms Hack, βVery Small Numberβ of Customers Affected
The firmβs remote monitoring management tool, ScreenConnect, has reportedly been patched
ποΈ Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Fake installers for popular artificial intelligence AI tools like OpenAI ChatGPT and InVideo AI are being used as lures to propagate various threats, such as the CyberLock and LuckyGh0t ransomware families, and a new malware dubbed Numero. "CyberLock ransomware, developed using PowerShell, primarily focuses on encrypting specific files on the victim's system," Cisco Talos researcher Chetan.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ PumaBot Targets Linux Devices in Latest Botnet Campaign π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
While the botnet may not be completely automated, it uses certain tactics when targeting devices that indicate that it may, at the very least, be semiautomated.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
PumaBot Targets Linux Devices in Botnet Campaign
While the botnet may not be completely automated, it uses certain tactics when targeting devices that indicate that it may, at the very least, be semiautomated.
π΅οΈββοΈ Victoria's Secret Goes Offline After 'Incident' Claims π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The lingerie retailer isn't revealing much about the security incident it's dealing with but has brought in thirdparty experts to address the issue.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Victoria's Secret Goes Offline After 'Incident' Claims
The lingerie retailer isn't revealing much about the security incident it's dealing with but has brought in third-party experts to address the issue.
π΅οΈββοΈ New Botnet Plants Persistent Backdoors in ASUS Routers π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Thousands of ASUS routers have been infected and are believed to be part of a wideranging ORB network affecting devices from Linksys, DLink, QNAP, and Araknis Network.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
New Botnet Plants Persistent Backdoors in ASUS Routers
Thousands of ASUS routers have been infected and are believed to be part of a wide-ranging ORB network affecting devices from Linksys, D-Link, QNAP, and Araknis Network.
π΅οΈββοΈ SentinelOne Reports Services Are Back Online After Global Outage π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The outage reportedly hit 10 commercial customer consoles for SentinelOne's Singularity platform, including Singularity Endpoint, XDR, Cloud Security, Identity, Data Lake, RemoteOps, and more.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
SentinelOne Restores Services After Global Outage
The outage reportedly hit 10 commercial customer consoles for SentinelOne's Singularity platform, including Singularity Endpoint, XDR, Cloud Security, Identity, Data Lake, RemoteOps, and more.
π΅οΈββοΈ Zscaler's Buyout of Red Canary Shows Telemetry's Value π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Red Canary's MDR portfolio complements Zscaler's purchase last year of Israeli startup Avalor, which automates collection, curation, and enrichment of security data.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Zscaler's Buyout of Red Canary Shows Telemetry's Value
Red Canary's MDR portfolio complements Zscaler's purchase last year of Israeli startup Avalor, which automates collection, curation, and enrichment of security data.
π΅οΈββοΈ APT41 Uses Google Calendar Events for C2 π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
APT41, a Chinese statesponsored threat actor also known as "Double Dragon," used Google Calendar as commandandcontrol infrastructure during a campaign last fall.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
APT41 Uses Google Calendar Events for C2
APT41, a Chinese state-sponsored threat actor also known as "Double Dragon," used Google Calendar as command-and-control infrastructure during a campaign last fall.
π¦Ώ North Koreaβs Laptop Farm Scam: βSomething Weβd Never Seen Beforeβ π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Officials uncover how North Korean operatives used stolen identities and remotecontrolled tech to infiltrate American companies and steal corporate data.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
North Koreaβs Laptop Farm Scam: βSomething Weβd Never Seen Beforeβ
Officials uncover how North Korean operatives used stolen identities and remote-controlled tech to infiltrate American companies and steal corporate data.
βοΈ U.S. Sanctions Cloud Provider βFunnullβ as Top Source of βPig Butcheringβ Scams βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippinesbased company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams, commonly known as pig butchering." In January 2025, KrebsOnSecurity detailed how Funnull was being used as a content delivery network that catered to cybercriminals seeking to route their traffic through U.S.based cloud providers.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
U.S. Sanctions Cloud Provider βFunnullβ as Top Source of βPig Butcheringβ Scams
The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams, commonly known as βpigβ¦