Category: Uncategorized
-
Insider threat hunting best practices and tools
Post ContentRead More
-
THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 – Oct 27) [email protected] (The Hacker News)
Cybersecurity news can sometimes feel like a never-ending horror movie, can’t it? Just when you think the villains are locked up, a new threat emerges from the shadows. This week is no exception, with tales of exploited flaws, international espionage, and AI shenanigans that could make your head spin. But don’t worry, we’re here to…
-
Types of cybersecurity controls and how to place them
Post ContentRead More
-
Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials [email protected] (The Hacker News)
Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat actors continue to abuse legitimate services like Cloudflare and Microsoft Sway to their advantage. “The campaigns target sensitive information from different crypto wallets, including Coinbase, MetaMask, Phantom, Trezor, and Bitbuy, as well as login credentials…
-
Sailing the Seven Seas Securely from Port to Port – OT Access Security for Ships and Cranes [email protected] (The Hacker News)
Operational Technology (OT) security has affected marine vessel and port operators, since both ships and industrial cranes are being digitalized and automated at a rapid pace, ushering in new types of security challenges. Ships come to shore every six months on average. Container cranes are mostly automated. Diagnostics, maintenance, upgrade and adjustments to these critical…
-
Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel [email protected] (The Hacker News)
A new attack technique could be used to bypass Microsoft’s Driver Signature Enforcement (DSE) on fully patched Windows systems, leading to operating system (OS) downgrade attacks. “This bypass allows loading unsigned kernel drivers, enabling attackers to deploy custom rootkits that can neutralize security controls, hide processes and network activity, maintain stealth, and much more,” SafeBreachRead…
-
Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining [email protected] (The Hacker News)
The infamous cryptojacking group known as TeamTNT appears to be readying for a new large-scale campaign targeting cloud-native environments for mining cryptocurrencies and renting out breached servers to third-parties. “The group is currently targeting exposed Docker daemons to deploy Sliver malware, a cyber worm, and cryptominers, using compromised servers and Docker Hub as the infrastructureRead…
-
Four REvil Ransomware Members Sentenced in Rare Russian Cybercrime Convictions [email protected] (The Hacker News)
Four members of the now-defunct REvil ransomware operation have been sentenced to several years in prison in Russia, marking one of the rare instances where cybercriminals from the country have been convicted of hacking and money laundering charges. Russian news publication Kommersant reported that a court in St. Petersburg found Artem Zaets, Alexei Malozemov, Daniil…
-
CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities [email protected] (The Hacker News)
The Computer Emergency Response Team of Ukraine (CERT-UA) has detailed a new malicious email campaign targeting government agencies, enterprises, and military entities. “The messages exploit the appeal of integrating popular services like Amazon or Microsoft and implementing a zero-trust architecture,” CERT-UA said. “These emails contain attachments in the form of Remote Desktop Protocol (‘.rdp’Read More
-
Relearning past lessons in assessing cloud risk
Post ContentRead More