Traditionally, the focus has been on defending against digital threats such as malware, ransomware, and phishing attacks by detecting them and responding. However, as cyber threats become more sophisticated. There is a growing recognition of the importance of measures that stop new attacks before they are recognized.
Why Hardsec Matters: From Protecting Critical Services to Enhancing Resilience
https://thehackernews.com/2024/08/why-hardsec-matters-from-protecting.html
We wanted to update you on some changes that Google’s making, and what we’re doing in Browser Guard to keep you protected.
Google Manifest V3 and Malwarebytes Browser Guard
https://www.malwarebytes.com/blog/personal/2024/08/google-manifest-v3-and-malwarebytes-browser-guard
ICYMI
uBlock lite for manifest V3
https://counter.social/@ecksmc/112906436062895341
creator of ublock has made an ad blocker specifically for the new API and it's available to use right now
Hundreds of millions of AMD CPUs are facing a new vulnerability called Sinkhole. The exploit, which was first reported by Wired, impacts processors dating back to 2006
https://www.wired.com/story/amd-chip-sinkclose-flaw/
Despite Sinkhole hitting some of AMD’s best processors, only the most recent batch of chips will receive a patch
AMD isn’t patching Ryzen 1000, 2000, or 3000 processors, nor is it patching Threadripper 1000 and 2000 CPUs, reports Tom’s Hardware.
Ransomware attacks are on the rise across the world. How are U.S. companies being impacted and what can the government do about it? Bill Whitaker speaks with former NSA Director of Cybersecurity Rob Joyce and Las Vegas publisher Anthony Curtis
#Cybersecurity #CoSoSec #Podcasts
Check out this Podcast: 60 minutes:
Scattered Spider, Work to Own, Greta Gerwig
USPS Text Scammers Duped His Wife, So He Hacked Their Operation
worthy of a #CoSoSec 🫡 right?
https://m.slashdot.org/story/431720
Smith began a mission: Hunt down the scammers. Over the course of a few weeks, Smith tracked down the Chinese-language group behind the mass-smishing campaign, hacked into their systems, collected evidence of their activities, and started a months-long process of gathering victim data and handing it to USPS investigators and a US bank
ongoing and widespread malware campaign force-installed malicious Google Chrome and Microsoft Edge browser extensions in over 300,000 browsers, modifying the browser's executables to hijack homepages and steal browsing history.
(Check your extensions - list of extensions you should get rid off)
multi-stage attack, disguised as a customer service request, delivers malicious attachments that, once opened, install XWorm, VenomRAT, AsyncRAT, and PureHVNC
sophisticated phishing campaign targeting Windows systems leverages multiple evasion techniques, including Python obfuscation, shellcode generation, and loading, to deploy a payload of malware.
Not SOCRadar breach.... Or not?
What Exactly Happened in This Incident?
The investigation revealed that SOCRadar’s internal systems were not breached. The threat actor acquired a license from SOCRadar under a legitimate company name, providing access to the platform similar to any other customer. With this account, the actor could search for well-known domain names, collect Telegram channel names, and crawl these channels to harvest email addresses.
https://socradar.io/socradars-response-to-the-usdods-claim-of-scraping-330-million-emails/
Hackers stole $12m in virtual currency from Ronin Network, which has previously suffered a massive $620m heist
#CoSoSec #EthicalHacking #Hackers
Although its not your usual "heist" as the $12 million was returned - it was Ethical hackers who stole it then returned it
https://www.infosecurity-magazine.com/news/ethical-hackers-steal-return-12m/
Elastic Security Labs has lifted the lid on a slew of methods available to attackers who want to run malicious apps without triggering Windows' security warnings, including one in use for six years.
Bad apps bypass Windows security alerts for six years using newly unveiled trick
https://www.theregister.com/2024/08/06/bad_apps_bypass_windows_security/
Windows SmartScreen and Smart App Control both have weaknesses of which to be wary
Android security updates this month patch 46 vulnerabilities, including a high-severity remote code execution (RCE) exploited in targeted attacks.
Google says that "there are indications that CVE-2024-36971 may be under limited, targeted exploitation," with threat actors likely exploiting to gain arbitrary code execution without user interaction on unpatched devices.
/nosanitize
https://source.android.com/docs/security/bulletin/2024-08-01#Android-and-Google-service-mitigations
North Korean hackers exploit VPN update flaw to install malware
South Korea's National Cyber Security Center (NCSC) warns that state-backed DPRK hackers hijacked flaws in a VPN's software update to deploy malware and breach networks.
Install and use URL check app as your default browser
https://counter.social/@ecksmc/112637034324970454
With the VirusTotal module enabled you can check URLs, read the report without actually visiting VirusTotal site, before actually opening them
Or any URL you think might be dodgy try copying it then paste it into VirusTotal
https://www.virustotal.com/gui/home/url
will check the URL itself - there is also a file upload option for files you wanna check
#Android malware dons several cloaks, but the latest one to stay wary of is called BingoMod, and Bleeping Computer found a report from researchers at cybersec firm Cleafy saying it uses a technique called smishing to attack devices
https://www.cleafy.com/cleafy-labs/bingomod-the-new-android-rat-that-steals-money-and-wipes-data
The fourth biggest mobile network in the UK has issued a warning over a fresh wave of fake texts
According to Three Mobile, they've blocked a jaw-dropping 20 million fraudulent messages this year alone. That's 111,111 every day. But despite the best efforts of the network, some of these scam texts are still slipping through to net.
Google ads push fake Google Authenticator site installing malware
security issue in the latest version of WhatsApp for Windows allows sending Python and PHP attachments that are executed without any warning when the recipient opens them - For the attack to be successful, Python needs to be installed
Organizations Warned of Exploited Twilio Authy Vulnerability
CISA warns of the in-the-wild exploitation of CVE-2024-39891, a Twilio Authy bug leading to the disclosure of phone number data
https://www.securityweek.com/organizations-warned-of-exploited-twilio-authy-vulnerability
ICYMI
Chrome users will now see warnings alerting them of suspicious files (based on lower confidence verdicts and unknown risk of user harm) or dangerous files (on high confidence verdicts and high risk of user harm)
Chrome browser now also sends suspicious files to the company's servers for a deeper scan for users with Enhanced Protection mode enabled
Google promotes its reCAPTCHA service as a security mechanism for websites, but researchers affiliated with the University of California, Irvine, argue it's harvesting information while extracting human labor worth billions.…Forget security – Google's reCAPTCHA v2 is exploiting users for profit
In a paper [PDF]
https://arxiv.org/pdf/2311.10911
titled "Dazed & Confused: A Large-Scale Real-World User Study of reCAPTCHAv2,"
E = Mc2 - Energy Milk Coffee
Fáilte Abhaile 🏴 “a nod’s as guid as a wink tae a blind horse”
ta be aff yer heid helps