Show more

decade-old flaw in a password generator allowed hackers to recover lost crypto fortune

youtu.be/o5IySpAkThg

Okay then + PCs

Microsoft AI “Recall” feature records everything, secures far less

malwarebytes.com/blog/news/202

How the new Microsoft Recall feature fundamentally undermines Windows security

doublepulsar.com/how-the-new-m

With Recall, a CEO’s personal laptop could become an even more enticing target for hackers equipped with infostealers, a journalist’s protected sources could be within closer grasp of an oppressive government that isn’t afraid to target dissidents

ransomware attack targets Windows system administrators by using Google advertisements to promote fraudulent download sites for Putty and WinSCP.

According to a recent Rapid7 report, a search engine campaign featured adverts for fake Putty and WinSCP websites when users searched for download winscp or download putty

rapid7.com/blog/post/2024/05/1

Beginning in early March 2024, Rapid7 observed the distribution of trojanized installers for the open source utilities WinSCP and PuTTy

Meanwhile:

Nissan has admitted to another data loss – this time involving the theft of personal information belonging to more than 50,000 Nissan employees.…According to the disclosure, 53,038 stateside Nissan employees - presumably past and present - had their social security numbers stolen after "a criminal threat actor" compromised Nissan's external VPN, shut down "certain" Nissan systems and demanded a payment

apps.web.maine.gov/online/aevi

Meanwhile; another day another breach

IntelBroker has allegedly put the database of Patriot Mobile, an American mobile network operator, up for sale on behalf of a threat actor known as Centre

compromised data reportedly includes Account PINs, full names, email addresses, credit scores, physical locations, dates of birth, the last four digits of Social Security Numbers (SSNs), account balances, and enrollment types

Google’s new cybersecurity product Threat Intelligence brings Gemini, Mandiant, and VirusTotal together.

The new product uses the Gemini 1.5 Pro large language model, which Google says reduces the time needed to reverse engineer malware attacks. The company claims Gemini 1.5 Pro, released in February, took only 34 seconds to analyze the code of the WannaCry virus

cloud.google.com/blog/products

welcome to Zero-Day market

good ex-plainer video - breakdown of *things* & history

where people go to hack you

youtu.be/TLPHmHPaCiQ

Not the first time that Europol has suffered a data security scare

At the end of March it was reported that they lost highly sensitive HR files on some of its most senior officials

politico.eu/article/europol-in

Encrypted mail service Proton hands suspect's personal info to cops again

In this latest instance, Proton handed over an account's recovery email address information to Spanish police concerning a suspect believed to be supporting Catalonian separatists.

Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

dailydarkweb.net/threat-actor-

threat actor known as Menelik put the data up for sale on the Breached hacking forum on April 28th - Menelik told BleepingComputer this morning they were able to steal the data after discovering a portal for partners, resellers, and retailers that could be used to look up order information

bleepingcomputer.com/news/secu

Researchers on Wednesday reported critical vulnerabilities in a widely used networking appliance that leaves some of the world’s biggest networks open to intrusion.

eclypsium.com/blog/big-vulnera

vulnerabilities allow attackers to gain full administrative control of a device then create accounts on systems managed by the Central Manager. “attacker-controlled accounts would not be visible from the Next Central Manager itself, enabling ongoing malicious persistence within the environment,”

From infosec to skunks, RSA Conference SVP spills the tea

Keynotes, physical security, playlists … the buck stops with Linda Gray Martin - The 33rd RSA Conference is underway this week, and no one feels that more acutely than the cybersecurity event's SVP Linda Gray Martin.

youtu.be/LInIzFBYrfY

LockBit’s Greatest Hits are now available on a special edition 2 CD set.

humor

The Damselfly Advanced Persistent Threat (APT) group, also known as APT42, has been actively utilizing custom backdoor variants, NiceCurl and TameCat, to infiltrate Windows machines

NiceCurl & TameCat backdoors represent a sophisticated toolkit in Damselfly’s arsenal, enabling threat actors to gain initial access to targeted environments discreetly.

gbhackers.com/hackers-use-cust

Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi devices running Android.

"The vulnerabilities in Xiaomi led to access to arbitrary activities, receivers and services with system privileges, theft of arbitrary files with system privileges, [and] disclosure of phone, settings and Xiaomi account data," mobile security firm Oversecured said

blog.oversecured.com/20-Securi

Gmail and Outlook users have been warned to watch out for the latest nasty trick sweeping inboxes across the globe

The scam that's taking hold at the moment are so-called mystery boxes. That promise prizes if you click.

Action Fraud UK says: "Watch out for these fake emails claiming you've won a "mystery box" of free prizes.

The only "reward" they lead to are phishing websites designed to steal your personal information"

forward it [email protected] so experts can investigate

The Underground ransomware gang announced a massive operation recently.

The hackers listed 11 victims on their leak website, along with a short summary of each. The amount of data leaked varies between 35 GB and 1,6 TB.

twitter.com/FalconFeedsio/stat

Why Shouldn't You Upload Files So Readily On Your Browser?

Recent findings by cybersecurity researchers have surfaced a new ransomware threat that exploits web browsers, potentially putting users' files at risk

cysecurity.news/2024/04/why-sh

lmao

the UK has made it illegal for bad passwords to be used as defaults

"admin & "12345" new laws in the UK aim to make it tougher for cyber attacks to succeed and increase consumer confidence in the security of the products they use and buy

Under the new regime, manufacturers will be banned from having weak, easily guessable default passwords like ‘admin’ or ‘12345’ and if there is a common password the user will be promoted to change it on start-up.

gov.uk/government/news/new-law

Show more

⇄ Σ = Mᄃ² ⇆

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.