TheConversationUS , to Cybersecurity
@TheConversationUS@newsie.social avatar

The conflict between Israel and Hamas is happening online as well as on the ground – with phishing attacks and hacking efforts targeting civilians on both sides.

https://theconversation.com/a-look-inside-the-cyberwar-between-israel-and-hamas-reveals-the-civilian-toll-228847

TechDesk , to Cybersecurity
@TechDesk@flipboard.social avatar

Generative AI is not just teaching cyber bad guys new tricks — it’s also making it easier for anyone to become a bad guy, according to Cybersecurity and Infrastructure Security Agency (CISA) chief Jen Easterly.

“I look at AI: how fast it’s moving, how unpredictable it is, how powerful it is,” Easterly told @AxiosNews. “I think it’ll make people who are less sophisticated actually better at doing some of the bad things that they want to do.” Here’s more from the interview.

https://flip.it/r64n5-

LeeArchinal , to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Friday all! We made it!

The focus of the third part of Elastic's "Dissecting : An in-depth analysis of a widespread 2024 malware" is all about the command and control (C2) configuration and commands. Looking at the long list of capabilities, it is easy to see why this is a formidable malware indeed. Some of the commands that can be issued control the persistence between two registry run keys, can enable key logging, it can disable the User Account Control (UAC) within the registry and much more. I really don't have enough space or time to list everything that it is capable of, you just have to check it out yourself!

One of the TTPs and Behaviors that shows up time and time again when it comes to persistence is the abuse of the AutoRun registry key locations. In this instance, we see that the Remcos rat can modifies the CurrentVersion\Run keys in both the HKCU and HKLM hive. As always, if we can help we do! Cyborg Security has a community hunt package that captures this activity as well as other registry run locations. Enjoy and Happy Hunting!

Autorun or ASEP Registry Key Modification
https://hunter.cyborgsecurity.io/research/hunt-package/8289e2ad-bc74-4ae3-bfaa-cdeb4335135c

Article Source:
https://www.elastic.co/security-labs/dissecting-remcos-rat-part-three

mobileatom , to Cybersecurity
@mobileatom@flipboard.com avatar
gcluley , to Cybersecurity
@gcluley@mastodon.green avatar

Boeing refused to pay $200 million ransomware demand from LockBit gang. Good for them!

Read more in my article on the Bitdefender blog: https://www.bitdefender.com/blog/hotforsecurity/boeing-refused-to-pay-200-million-ransomware-demand-from-lockbit-gang/

ninjaowl Bot , to Cybersecurity
@ninjaowl@mastodon.social avatar

Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability https://thehackernews.com/2024/05/chrome-zero-day-alert-update-your.html

gcluley , to Cybersecurity
@gcluley@mastodon.green avatar

The kingpin of the LockBit ransomware is named and sanctioned, a cybersecurity consultant is charged with a $1.5 million extortion, and a romance fraudster defrauded women he met on Tinder of £80,000.

All this and much much more is discussed in the latest edition of the @smashingsecurity podcast with yours truly and Carole Theriault, joined this week by “Ransomware Sommelier” Allan Liska.

https://grahamcluley.com/smashing-security-podcast-371/

gcluley , to Cybersecurity
@gcluley@mastodon.green avatar

$10 million reward offer for apprehension of unmasked LockBit ransomware leader.

Read more in my article on the Exponential-e blog: https://www.exponential-e.com/blog/10-million-reward-offer-for-apprehension-of-unmasked-lockbit-ransomware-leader

applsec , to Cybersecurity
@applsec@infosec.exchange avatar

🧪 NEW BETA RELEASE 🧪

💻 macOS 14.5 RC (23F79)
https://developer.apple.com/news/releases

LeeArchinal , to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Thursday everyone!

Jumping around a bit because that is just how my brain works! But, here is Elastic's part two of their "Dissecting : An in-depth analysis of a widespread 2024 malware" series. This episode they focus on the watchdog, keylogger, and screen and audio recording capabilities and much more! The technical details here are amazing and I can't wait to finish the rest of the series!
Enjoy and Happy Hunting!

Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Two
https://www.elastic.co/security-labs/dissecting-remcos-rat-part-two

scottwilson , to Cybersecurity
@scottwilson@infosec.exchange avatar

STATEMENT:

“We take the privacy and confidentiality of your information seriously.”

TRANSLATION:

“Every time we have a data breach we’ll let you know about it! Mainly ‘cuz we are required to in order to minimize our legal liability… and of course after we’ve consulted with our legal firm and our new 3rd party incident response vendor.”

InfobloxThreatIntel , to Cybersecurity
@InfobloxThreatIntel@infosec.exchange avatar

A malicious lookalike domain for Scotiabank Canada scotiabankcanada-auth[.]com was recently registered 5/5/2024. This domain features a landing page with a reCAPTCHA that changes languages depending on the user's geolocation. It resolves to a Russian IP 141[.]8[.]193[.]14 hosting a number of other malicious lookalikes for Scotiabank, the Royal Bank of Canada, and Telus Mobility. These domains appear to be used for phishing. auth-scotiaonline-scotiabank-secure[.]com previously resolved to a page imitating the Scotiabank login page shown in the screenshot below.

Domains: secure-scotiabankcanada[.]com, ,auth-scotiabankcanada-secure[.]com, info-securerbcroyalbank[.]com, rbcroyalbank-infosecure[.]com, rbcroyalbankinfo-secure[.]com, secure-inforbcroyalbank[.]com, secure-rbcroyalbankinfo[.]com, telusmobility-securerefund[.]com

image/png

gcluley , to Cybersecurity
@gcluley@mastodon.green avatar

Cancer patients' sensitive information accessed by "unidentified parties" after being left exposed by screening lab for years.

Read more in my article on the Bitdefender blog: https://www.bitdefender.com/blog/hotforsecurity/cancer-patients-sensitive-information-accessed-by-unidentified-parties-after-being-left-exposed-by-screening-lab-for-years/

ianonymous3000 , to Cybersecurity
@ianonymous3000@mastodon.social avatar

📚 Just completed the 'Basics of Personal Threat Modeling' course by @privacyguides 🛡️

Threat modeling is crucial because it helps identify and prioritize the most probable security and privacy risks. It enables focused resource allocation, tailored defenses, and heightened awareness.

Check it out: https://learn.privacyguides.org

image/png

north , to Cybersecurity
@north@xn--8r9a.com avatar

I'll give this a shot.

I'm looking to for a role in . I've done both offensive (see e.g. https://github.com/qwell/disclosures/) and defensive security work, and have over 20 years of software development experience in many different languages.

ISC2 CC

DMs always open.

(we should pick a hashtag and stick with it)

applsec , to Cybersecurity
@applsec@infosec.exchange avatar

🧪 NEW BETA RELEASE 🧪

⌚ watchOS 10.5 RC 2 (21T576)
https://developer.apple.com/news/releases

applsec , to Cybersecurity
@applsec@infosec.exchange avatar

🐛 NEW SECURITY CONTENT 🐛

🎵 iTunes 12.13.2 for Windows - 1 bug fixed
https://support.apple.com/kb/HT214099

cyberfeed Bot , to Cybersecurity
@cyberfeed@mstdn.social avatar
dumbpasswordrules Bot , to Cybersecurity
@dumbpasswordrules@botsin.space avatar

This dumb password rule is from Minecraft.

Using a 16 character password seems to work. Everything else above does not always work.
Also, passwords that are too long are still changed, so you have to reset them by email.

https://dumbpasswordrules.com/sites/minecraft/

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

Pretty sure ZScaler has been breached.

🚨🚨Notorious threat actor,
@InteIBroker
, is selling access to a large Cybersecurity company. Price: $20,000. Details below.

Revenue: $1.8 Billion
Access includes:

  • Confidential and highly critical logs packed with credentials
  • SMTP Access
  • PAuth Pointer Auth Access
  • SSL Passkeys & SSL Certificates
  • some others (will be on contact)
    Price: $20K in XMR or ETH
    Middleman / Escrow accepted (Auto Escrow or
    @Baphomet
    )
    Message me on the forums for a point of contact.
    Proof of funds is required.
    I am only selling to reputable members. No time wasters or default rank users.

X Link: https://twitter.com/DarkWebInformer/status/1788179513353891977

LeeArchinal , to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Wednesday everyone!

I am flattered that I have the opportunity to present my 2-day training "A Beginner's Guide To Threat Hunting: How to Shift Focus from IOCs to Behaviors and TTPs" again at Black Hat USA 2024 and that early bird registration is open and you have two opportunities to take the course!

Day 1 begins with a theory section where we discuss resources and models that can help aid our threat hunting from both an intel and communication perspective. We then move to a section that covers how to extract artifacts from an intel report and how to make those artifacts actionable. Then we create some hypotheses and test them against a set of data to see what we can find.

Day 2 will put all the theory and applications to the test where the students will break into teams, process another intel report, create hypotheses, and hunt again!

Last year was a lot of fun and we receive high ratings, so we hope you can join us again this year for the fun! I hope to see you there, but until then, Happy Hunting!

A BEGINNER'S GUIDE TO THREAT HUNTING: HOW TO SHIFT FOCUS FROM IOCS TO BEHAVIORS AND TTPS
https://www.blackhat.com/us-24/training/schedule/#a-beginners-guide-to-threat-hunting-how-to-shift-focus-from-iocs-to-behaviors-and-ttps-36528

applsec , to Cybersecurity
@applsec@infosec.exchange avatar

🧪 NEW BETA RELEASES 🧪

📱 iOS 16.7.8 RC (20H343)
📱 iOS 17.5 RC (21F79)
📱 iPadOS 16.7.8 RC (20H343)
📱 iPadOS 17.5 RC (21F79)
📺 tvOS 17.5 RC (21L569)
🥽 visionOS 1.2 beta 5 (21O5587a)
⌚ watchOS 10.5 RC (21T575)
🔨 Xcode 15.4 RC (15F31c)
https://developer.apple.com/news/releases

Tutanota , to Cybersecurity
@Tutanota@mastodon.social avatar

What's your favorite tool (after Tuta 😉)? And why do you prefer it to Big Tech?

edbro , to Cybersecurity
@edbro@swecyb.com avatar

Things are brewing in the space. CVE-2024-3661 exploits the routing table to make VPN software leak traffic.

https://www.leviathansecurity.com/blog/tunnelvision

dumbpasswordrules Bot , to Cybersecurity
@dumbpasswordrules@botsin.space avatar

This dumb password rule is from GoDaddy SFTP.

Max 14 characters for the most important password in your shared hosting environment.

https://dumbpasswordrules.com/sites/godaddy-sftp/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • supersentai
  • WatchParties
  • Rutgers
  • loren
  • Lexington
  • cragsand
  • mead
  • RetroGamingNetwork
  • itdept
  • jeremy
  • xyz
  • PowerRangers
  • AnarchoCapitalism
  • kamenrider
  • Mordhau
  • space_engine
  • neondivide
  • AgeRegression
  • mauerstrassenwetten
  • Teensy
  • MidnightClan
  • learnviet
  • bjj
  • khanate
  • electropalaeography
  • steinbach
  • WarhammerFantasy
  • fandic
  • All magazines