decade-old flaw in a password generator allowed hackers to recover lost crypto fortune
Okay then #Microsoft #CoPilot + PCs #CoSoSec
Microsoft AI “Recall” feature records everything, secures far less
How the new Microsoft Recall feature fundamentally undermines Windows security
With Recall, a CEO’s personal laptop could become an even more enticing target for hackers equipped with infostealers, a journalist’s protected sources could be within closer grasp of an oppressive government that isn’t afraid to target dissidents
ransomware attack targets Windows system administrators by using Google advertisements to promote fraudulent download sites for Putty and WinSCP.
According to a recent Rapid7 report, a search engine campaign featured adverts for fake Putty and WinSCP websites when users searched for download winscp or download putty
https://www.rapid7.com/blog/post/2024/05/13/ongoing-malvertising-campaign-leads-to-ransomware/
Beginning in early March 2024, Rapid7 observed the distribution of trojanized installers for the open source utilities WinSCP and PuTTy
Meanwhile: #CoSoSec
Nissan has admitted to another data loss – this time involving the theft of personal information belonging to more than 50,000 Nissan employees.…According to the disclosure, 53,038 stateside Nissan employees - presumably past and present - had their social security numbers stolen after "a criminal threat actor" compromised Nissan's external VPN, shut down "certain" Nissan systems and demanded a payment
https://apps.web.maine.gov/online/aeviewer/ME/40/d34f3290-0126-421f-9d69-5ccd31652641.shtml
Meanwhile; another day another breach
IntelBroker has allegedly put the database of Patriot Mobile, an American mobile network operator, up for sale on behalf of a threat actor known as Centre
compromised data reportedly includes Account PINs, full names, email addresses, credit scores, physical locations, dates of birth, the last four digits of Social Security Numbers (SSNs), account balances, and enrollment types
Google’s new cybersecurity product Threat Intelligence brings Gemini, Mandiant, and VirusTotal together.
The new product uses the Gemini 1.5 Pro large language model, which Google says reduces the time needed to reverse engineer malware attacks. The company claims Gemini 1.5 Pro, released in February, took only 34 seconds to analyze the code of the WannaCry virus
welcome to Zero-Day market
good ex-plainer video - breakdown of *things* & history
where people go to hack you
Not the first time that Europol has suffered a data security scare
At the end of March it was reported that they lost highly sensitive HR files on some of its most senior officials
Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records
threat actor known as Menelik put the data up for sale on the Breached hacking forum on April 28th - Menelik told BleepingComputer this morning they were able to steal the data after discovering a portal for partners, resellers, and retailers that could be used to look up order information
Researchers on Wednesday reported critical vulnerabilities in a widely used networking appliance that leaves some of the world’s biggest networks open to intrusion.
https://eclypsium.com/blog/big-vulnerabilities-in-next-gen-big-ip/
vulnerabilities allow attackers to gain full administrative control of a device then create accounts on systems managed by the Central Manager. “attacker-controlled accounts would not be visible from the Next Central Manager itself, enabling ongoing malicious persistence within the environment,”
From infosec to skunks, RSA Conference SVP spills the tea
Keynotes, physical security, playlists … the buck stops with Linda Gray Martin - The 33rd RSA Conference is underway this week, and no one feels that more acutely than the cybersecurity event's SVP Linda Gray Martin.
The Damselfly Advanced Persistent Threat (APT) group, also known as APT42, has been actively utilizing custom backdoor variants, NiceCurl and TameCat, to infiltrate Windows machines
NiceCurl & TameCat backdoors represent a sophisticated toolkit in Damselfly’s arsenal, enabling threat actors to gain initial access to targeted environments discreetly.
Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi devices running Android.
"The vulnerabilities in Xiaomi led to access to arbitrary activities, receivers and services with system privileges, theft of arbitrary files with system privileges, [and] disclosure of phone, settings and Xiaomi account data," mobile security firm Oversecured said
https://blog.oversecured.com/20-Security-Issues-Found-in-Xiaomi-Devices/
Gmail and Outlook users have been warned to watch out for the latest nasty trick sweeping inboxes across the globe
The scam that's taking hold at the moment are so-called mystery boxes. That promise prizes if you click.
Action Fraud UK says: "Watch out for these fake emails claiming you've won a "mystery box" of free prizes.
The only "reward" they lead to are phishing websites designed to steal your personal information"
forward it [email protected] so experts can investigate
The Underground ransomware gang announced a massive operation recently.
#Hackers #Cybersecurity #CoSoSec
The hackers listed 11 victims on their leak website, along with a short summary of each. The amount of data leaked varies between 35 GB and 1,6 TB.
https://twitter.com/FalconFeedsio/status/1785863314721079794
Why Shouldn't You Upload Files So Readily On Your Browser?
Recent findings by cybersecurity researchers have surfaced a new ransomware threat that exploits web browsers, potentially putting users' files at risk
https://www.cysecurity.news/2024/04/why-shouldnt-you-upload-files-so.html
lmao #CoSoSec
the UK has made it illegal for bad passwords to be used as defaults
"admin & "12345" new laws in the UK aim to make it tougher for cyber attacks to succeed and increase consumer confidence in the security of the products they use and buy
Under the new regime, manufacturers will be banned from having weak, easily guessable default passwords like ‘admin’ or ‘12345’ and if there is a common password the user will be promoted to change it on start-up.
E = Mc2 - Energy Milk Coffee
Fáilte Abhaile 🏴 “a nod’s as guid as a wink tae a blind horse”
ta be aff yer heid helps