Source: – Author: 1 ESET researchers uncover a Telegram bot that enables even less tech-savvy scammers to defraud people out of their money Original Post URL:...
Day: August 28, 2023
Telekopye: Hunting Mammoths using Telegram bot – Source:
Source: – Author: 1 Analysis of Telegram bot that helps cybercriminals scam people on online marketplaces Original Post URL: Category & Tags: –
Scarabs colon-izing vulnerable servers – Source:
Source: – Author: 1 Analysis of Spacecolon, a toolset used to deploy Scarab ransomware on vulnerable servers, and its operators, CosmicBeetle Original Post URL: Category &...
A Bard’s Tale – how fake AI bots try to install malware – Source:
Source: – Author: 1 The AI race is on! It’s easy to lose track of the latest developments and possibilities, and yet everyone wants to see...
Evacuation of 30,000 hackers – Week in security with Tony Anscombe – Source:
Source: – Author: 1 DEF CON, the annual hacker convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the event’s venue due to...
DEF CON 31: US DoD urges hackers to go and hack ‘AI’ – Source:
Source: – Author: 1 The limits of current AI need to be tested before we can rely on their output Original Post URL: Category & Tags:...
Mass-spreading campaign targeting Zimbra users – Source:
Source: – Author: 1 ESET researchers have observed a new phishing campaign targeting users of the Zimbra Collaboration email server. Original Post URL: Category & Tags:...
DEF CON 31: Robot vacuums may be doing more than they claim – Source:
Source: – Author: 1 When it comes to privacy, it remains complicated and near impossible for a consumer to make an informed decision. Original Post URL:...
Black Hat 2023: Hacking the police (at least their radios) – Source:
Source: – Author: 1 Hiding behind a black box and hoping no one will hack it has been routinely proven to be unwise and less secure....
Black Hat 2023: How AI changes the monetization of search – Source:
Source: – Author: 1 Search engines, AI, and monetization in the new era Original Post URL: Category & Tags: –
Black Hat 2023: AI gets big defender prize money – Source:
Source: – Author: 1 Black Hat is big on AI this year, and for a good reason Original Post URL: Category & Tags: –
Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence – Source:
Source: – Author: 1 Current LLMs are just not mature enough for high-level tasks Original Post URL: Category & Tags: –
20k security folks in the desert – Week in security with Tony Anscombe – Source:
Source: – Author: 1 Unsurprisingly, artificial intelligence took the center stage at this year’s edition of Black Hat, one of the world’s largest gatherings of cybersecurity...
Black Hat 2023: Cyberwar fire-and-forget-me-not – Source:
Source: – Author: 1 What happens to cyberweapons after a cyberwar? Original Post URL: Category & Tags: –
MoustachedBouncer: Espionage against foreign diplomats in Belarus – Source:
Source: – Author: 1 Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks… Sounds like the infamous Turla? Think again!...
Experts Uncover How Cybercriminals Could Exploit Microsoft Entra ID for Elevated Privilege – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 28, 2023THNVulnerability / Active Directory Cybersecurity researchers have discovered a case of privilege escalation associated with a Microsoft Entra ID...
Developers Beware: Malicious Rust Libraries Caught Transmitting OS Info to Telegram Channel – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 28, 2023THNSupply Chain / Software Security In yet another sign that developers continue to be targets of software supply chain...
Cyberattacks Targeting E-commerce Applications – Source:thehackernews.com
Source: thehackernews.com – Author: . Cyber attacks on e-commerce applications are a common trend in 2023 as e-commerce businesses become more omnichannel, they build and deploy...
Cyber Info-Sharing Guide for Healthcare Sector Updated – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Healthcare , Industry Specific , Next-Generation Technologies & Secure Development Sector Urged to Broaden Info Sharing Beyond Traditional Indicators Marianne Kolbasuk...
Ransomware Attack Cleanup Costs: $10M So Far for Rackspace – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Fraud Management & Cybercrime , Incident & Breach Response , Ransomware Fallout From Crypto-Locking Malware Attacks and Data Exfiltration Remains Costly...
Why a Wiz-SentinelOne Deal Makes Sense, and Why It Might Not – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Cloud Security , Open XDR , Security Operations Despite the Financial Hurdles, the Perks of Building a CNAPP-XDR Platform Are Clear...
Crypto Investor Data Stolen From Kroll In SIM Swap – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Blockchain & Cryptocurrency , Cryptocurrency Fraud , Fraud Management & Cybercrime FTX, BlockFI and Genesis Claimants at Risk of Phishing Mihir...
Met Police Officers at Risk After Serious Data Breach – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Breach Notification , Cybercrime , Endpoint Security Scotland Yard Probes Impact of Suspected Hack Attack Against Service Provider Mathew J. Schwartz...
Global Privacy Agencies Urge Social Media to Protect User Data from Scraping – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Andreea Chebac In a statement published online, 12 data protection and privacy authorities from around the world urge social media platforms to...
French Unemployment Agency Announces a Data Breach – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Andreea Chebac Pole emploi, the government’s unemployment registration and financial assistance office in France, announced a data breach. The incident affected 10...
Acquisition Chatter Swirls Around SentinelOne, BlackBerry – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Prominent anti-malware vendors SentinelOne and BlackBerry have been separately named in public acquisition chatter, underscoring a clear signal of impending...
10 Million Likely Impacted by Data Breach at French Unemployment Agency – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The personal information of roughly 10 million individuals was likely compromised in a data breach at French governmental unemployment agency...
Signs of Malware Attack Targeting Rust Developers Found on Crates.io – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The Crates.io Rust package registry was targeted recently in what appeared to be the initial phase of a malware attack...
3 Malware Loaders Detected in 80% of Attacks: Security Firm – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire QakBot, SocGholish, and Raspberry Robin are the three most popular malware loaders among cybercriminals, accounting for 80% of the observed...
Two Men Arrested Following Poland Railway Hacking – Source: www.securityweek.com
Source: www.securityweek.com – Author: AFP Polish police on Sunday arrested two men suspected of illegally hacking into the national railway’s communications network, which destabilized traffic in...