Microsoft 365 credentials stolen via adversary-in-the-middle campaign, gaining access via this hack. ๐คฏ
https://www.scworld.com/news/microsoft-365-credentials-stolen-via-adversary-in-the-middle-campaign
#cybersecurity #netsec #infosec https://nostrcheck.me/media/8fdd2660fd6d38a4f2699099f5e561e801501b59f786d5444657cfc0f2e2e72f/996abc48f5f87aa3893ccf040d6b55df6c743744cbc353815ffc369a5498d97d.webp
Ransomware Groups Targeting VPNs for Initial Access.
Possible due to not using MFA, missing patches. ๐คฌ https://www.msspalert.com/news/ransomware-groups-targeting-vpns-for-initial-access-report
#VPN #access #ransomware https://nostrcheck.me/media/8fdd2660fd6d38a4f2699099f5e561e801501b59f786d5444657cfc0f2e2e72f/98ba44fa48d6b9357b5ea1ba9f0619f35ee0642870e01658025d9f4c982af1b1.webp
๐ก๏ธ Attack surface management
The key to securing expanding digital defences
#cyberdefence #attack #cybersecurity
2K Palo Alto un-patched firewalls hacked despite warnings
2 crucial issues let Hackers manage the firewalls โ ๏ธ
#infosec #cybersecurity #risks #paloalto
https://www.scworld.com/news/2000-palo-alto-firewalls-hacked-despite-patching-two-pan-os-bugs
Avast anti-rootkit driver used to seize control of infected systems ๐พ
| #cybersecurity | #netsec |
https://www.scworld.com/news/avast-anti-rootkit-driver-used-to-seize-control-of-infected-systems
VPN vulnerabilities, weak credentials fuel ransomware attacks
Incident are increasing due to lack of Maintenance.โ ๏ธ
#vpn #security #cyber #encryption #privacy
https://www.helpnetsecurity.com/2024/11/28/vpn-weak-credentials-ransomware-attacks/ https://nostrcheck.me/media/8fdd2660fd6d38a4f2699099f5e561e801501b59f786d5444657cfc0f2e2e72f/c92557a1a5fa75a08042c0d6b191c8993ed28ee20fcecce5592b764dbcd8277f.webp
The Multifaceted Extortion Tactics Keeping Ransomware Alive
Pressure on critical infrastructure causes production and financial lost ๐บ
#ransomware #cyberdefense ๐งจ
๐๐ฒ๐ง๐-๐๐๐ก๐๐๐ฎ๐ฅ๐๐ซ ๐๐๐ฅ๐ฐ๐๐ซ๐.
It started with a PDF file:
Unveiling a Sophisticated Espionage Attack
#cybersecurity #attack #infosec
https://securityonline.info/sync-scheduler-malware-unveiling-a-sophisticated-espionage-attack/ https://nostrcheck.me/media/8fdd2660fd6d38a4f2699099f5e561e801501b59f786d5444657cfc0f2e2e72f/8d48f11cd0400ff60c540bc8504f9bc85cf6ea14ab3cc196dc4bfeeb6bb45d42.webp
Russian women stepping up for cybercrime outfits.
Malware groups have talented women on Top! โ ๏ธ
#cyberwar #malware #ransomware #russia
https://www.scworld.com/news/russian-women-stepping-up-for-cybercrime-outfits https://nostrcheck.me/media/8fdd2660fd6d38a4f2699099f5e561e801501b59f786d5444657cfc0f2e2e72f/48afd22d0b530207da575c875e27ba9c3e3c486230489db4440cd3c0ab9aad5b.webp
Signal Is Now a Great Encrypted Alternative to Zoom and Google Meet
And Signal app is FREE ๐
#security #encrypted #message
https://lifehacker.com/tech/signal-is-now-a-great-encrypted-alternative-to-zoom-google-meet
Chinese man arrested in New Delhi for cybercrime, bank account features in 17 criminal cases of fraud via Whatsapp ๐งจ๐ฐ
#scam #fraud #Cybersecurity
Two fake call centres busted in Madhya Pradesh (Bhopal, India) in three days, 29 arrested for cyber fraud ๐ฅณ
#arrest #scam #fraud #india #infosec
https://www.newindianexpress.com/nation/2024/Nov/17/two-fake-call-centres-busted-in-madhya-pradesh-in-three-days-29-arrested-for-aiding-cyber-fraud https://nostrcheck.me/media/8fdd2660fd6d38a4f2699099f5e561e801501b59f786d5444657cfc0f2e2e72f/dcc4049d48bf5a14949a3d5ea05aada901c92704b0ab0dbb6247f98823209f2b.webp
ALERT; Fake AI video generators infect Windows, macOS with infostealers ๐จ
#AI #video #infostealer #infosec #Netsec #cyber
https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-infect-windows-macos-with-infostealers/ https://nostrcheck.me/media/8fdd2660fd6d38a4f2699099f5e561e801501b59f786d5444657cfc0f2e2e72f/6214d5bb680484b61bb25d5cadb2c7dff5e7352abe25b01588d85f9166c68154.webp
Google's Gemini AI Chatbot Keeps Telling Users to Die ๐คฆ
#google #AI #GEMINI #fail
https://hackread.com/google-gemini-ai-chatbot-tells-users-to-die/
Hackers find 15,000 credentials by scanning for git configuration ๐พ
#hackers #credentials #security
https://cyberscoop.com/sysdig-git-credentials-cloud-service-emeraldwhale/
AI in cybersecurity: Immediate strategies to navigate new frontiers of defense
Fast to mass of logs, be more predictive.
#AI #cybersecurity
Qnap has fixed the exposed 0-day
#qnap #backup #zeroday
There are 6๏ธโฃ key elements for building a Healthcare cybersecurity response plan ๐ฅ
#healthcare #cybersecurity #cyberdefense #security
https://www.helpnetsecurity.com/2024/10/30/healthcare-cybersecurity-incident-response-plan/ https://nostrcheck.me/media/8fdd2660fd6d38a4f2699099f5e561e801501b59f786d5444657cfc0f2e2e72f/14c431cc14dbd4d52cd9ce8b00a6d7a29cf3024b91d776567b51e4d5b714efa0.webp
Bankrobbers 2.0 has been detected on ATM;s with malware for Linux on ATMโs.
#money
#infosec #cybersecurity
Targeted BEC attacks detected.
โthreat actors send files with restricted access and โview-onlyโ restrictions โ files that typically can circumvent standard security controls.โ
#cybersecurity #netsec #infosec
https://www.scworld.com/news/sharepoint-onedrive-and-dropbox-targeted-by-bec-attacks