π΅οΈββοΈ Victoria's Secret Goes Offline After 'Incident' Claims π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The lingerie retailer isn't revealing much about the security incident it's dealing with but has brought in thirdparty experts to address the issue.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Victoria's Secret Goes Offline After 'Incident' Claims
The lingerie retailer isn't revealing much about the security incident it's dealing with but has brought in third-party experts to address the issue.
π΅οΈββοΈ New Botnet Plants Persistent Backdoors in ASUS Routers π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Thousands of ASUS routers have been infected and are believed to be part of a wideranging ORB network affecting devices from Linksys, DLink, QNAP, and Araknis Network.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
New Botnet Plants Persistent Backdoors in ASUS Routers
Thousands of ASUS routers have been infected and are believed to be part of a wide-ranging ORB network affecting devices from Linksys, D-Link, QNAP, and Araknis Network.
π΅οΈββοΈ SentinelOne Reports Services Are Back Online After Global Outage π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The outage reportedly hit 10 commercial customer consoles for SentinelOne's Singularity platform, including Singularity Endpoint, XDR, Cloud Security, Identity, Data Lake, RemoteOps, and more.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
SentinelOne Restores Services After Global Outage
The outage reportedly hit 10 commercial customer consoles for SentinelOne's Singularity platform, including Singularity Endpoint, XDR, Cloud Security, Identity, Data Lake, RemoteOps, and more.
π΅οΈββοΈ Zscaler's Buyout of Red Canary Shows Telemetry's Value π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Red Canary's MDR portfolio complements Zscaler's purchase last year of Israeli startup Avalor, which automates collection, curation, and enrichment of security data.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Zscaler's Buyout of Red Canary Shows Telemetry's Value
Red Canary's MDR portfolio complements Zscaler's purchase last year of Israeli startup Avalor, which automates collection, curation, and enrichment of security data.
π΅οΈββοΈ APT41 Uses Google Calendar Events for C2 π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
APT41, a Chinese statesponsored threat actor also known as "Double Dragon," used Google Calendar as commandandcontrol infrastructure during a campaign last fall.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
APT41 Uses Google Calendar Events for C2
APT41, a Chinese state-sponsored threat actor also known as "Double Dragon," used Google Calendar as command-and-control infrastructure during a campaign last fall.
π¦Ώ North Koreaβs Laptop Farm Scam: βSomething Weβd Never Seen Beforeβ π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Officials uncover how North Korean operatives used stolen identities and remotecontrolled tech to infiltrate American companies and steal corporate data.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
North Koreaβs Laptop Farm Scam: βSomething Weβd Never Seen Beforeβ
Officials uncover how North Korean operatives used stolen identities and remote-controlled tech to infiltrate American companies and steal corporate data.
βοΈ U.S. Sanctions Cloud Provider βFunnullβ as Top Source of βPig Butcheringβ Scams βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippinesbased company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams, commonly known as pig butchering." In January 2025, KrebsOnSecurity detailed how Funnull was being used as a content delivery network that catered to cybercriminals seeking to route their traffic through U.S.based cloud providers.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
U.S. Sanctions Cloud Provider βFunnullβ as Top Source of βPig Butcheringβ Scams
The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams, commonly known as βpigβ¦
ποΈ Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Meta on Thursday revealed that it disrupted three covert influence operations originating from Iran, China, and Romania during the first quarter of 2025. "We detected and removed these campaigns before they were able to build authentic audiences on our apps," the social media giant said in its quarterly Adversarial Threat Report. This included a network of 658 accounts on Facebook, 14 Pages, and.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
π΅οΈββοΈ 'Everest Group' Extorts Global Orgs via SAP's HR Tool π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
In addition to CocaCola, entities in Abu Dhabi, Jordan, Namibia, South Africa, and Switzerland are experiencing extortion attacks, all involving stolen SAP SuccessFactor data.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
'Everest Group' Extorts Global Orgs via SAP's HR Tool
In addition to Coca-Cola, entities in Abu Dhabi, Jordan, Namibia, South Africa, and Switzerland are experiencing extortion attacks, all involving stolen SAP SuccessFactor data.
ποΈ ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nationstate threat actor. "ConnectWise recently learned of suspicious activity within our environment that we believe was tied to a sophisticated nationstate actor, which affected a very small number of ScreenConnect.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
β€1
π¦
The Week in Vulnerabilities: Cyble Sensors Detects Attack Attempts on SAP, Ivanti π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble The Week in Vulnerabilities Cyble Sensors Detects Attack Attempts on SAP, Ivanti " dataimagecaption"Cyble The Week in Vulnerabilities Cyble Sensors Detects Attack Attempts on SAP, Ivanti " datamediumfile"httpscyble.comwpcontentuploads202505CybleBlogsCybleSensors300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202505CybleBlogsCybleSensors.jpg" title"The Week in Vulnerabilities Cyble Sensors Detects Attack Attempts on SAP, Ivanti 1" Attack attempts picked up by Cyble Sensors' honeypots highlight threat actors' resourcefulness and the need for strong security defenses. Cyble's honeypot sensors have detected attack attempts on product vulnerabilities from SAP and Ivanti, among other vulnerabilities targeted this week. The sensors, part of Cyble's Threat Hunting service, c...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Cyble Sensors Detect Attack Attempts On SAP, Ivanti Flaws
Cyble sensors detect attack attempts on SAP NetWeaver, Ivanti Endpoint Manager Mobile, CrushFTP and more.
π CISA Urged to Enrich KEV Catalog with More Contextual Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Security teams should use vulnerability context alongside KEV lists to prioritize patching, OX argued.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
CISA Urged to Enrich KEV Catalog with More Contextual Data
Security teams should use vulnerability context alongside KEV lists to prioritize patching, OX argued
π¦Ώ TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
π Dutch Police Lead Shut Down of Counter AV Service AVCheck π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Dutch, US and Finnish investigators have taken cybercrime service AVCheck offline.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Dutch Police Lead Shut Down of Counter AV Service AVCheck
Dutch, US and Finnish investigators have taken cybercrime service AVCheck offline
π’ Hackers are using fake tool installers to dupe victims β and AI tools like ChatGPT are a key target π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Cisco Talos said it has uncovered malware disguised as a lead monetization platform and a ChatGPT installer.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Hackers are using fake tool installers to dupe victims β and AI tools like ChatGPT are a key target
Cisco Talos said it has uncovered malware disguised as a lead monetization platform and a ChatGPT installer
ποΈ The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As attackers become more sophisticated leveraging encryption, livingofftheland techniques, and lateral movement to evade traditional defenses security teams are finding more threats wreaking havoc before they can be detected. Even after an attack has been identified, it can.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have warned of a new spearphishing campaign that uses a legitimate remote access tool called Netbird to target Chief Financial Officers CFOs and financial executives at banks, energy companies, insurers, and investment firms across Europe, Africa, Canada, the Middle East, and South Asia. "In what appears to be a multistage phishing operation, the attackers.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Dutch Police Lead Shut Down of Counter AV Service AVCheck π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Dutch, US and Finnish investigators have taken cybercrime service AVCheck offline.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Dutch Police Lead Shut Down of Counter AV Service AVCheck
Dutch, US and Finnish investigators have taken cybercrime service AVCheck offline
π Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A report on the dark web marketplace Russian Market showed Acreed has emerged as the leading infostealer.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown
A report on the dark web marketplace Russian Market showed Acreed has emerged as the leading infostealer
ποΈ β‘ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
If this had been a security drill, someone wouldve said it went too far. But it wasnt a drillit was real. The access? Everything looked normal. The tools? Easy to find. The detection? Came too late. This is how attacks happen nowquiet, convincing, and fast. Defenders arent just chasing hackers anymoretheyre struggling to trust what their systems are telling them. The problem isnt too.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π #Infosec2025: Ransomware Drill to Spotlight Water Utility Cyber Risks in βOperation 999β π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Semperis will host an immersive ransomware simulation focused on water utilities during Infosecurity Europe 2025.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity