Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29805 bookmarks
Custom sorting
Lumma Stealer, coming and going
Lumma Stealer, coming and going
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive
·news.sophos.com·
Lumma Stealer, coming and going
Lumma Stealer, coming and going
Lumma Stealer, coming and going
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive
·news.sophos.com·
Lumma Stealer, coming and going
PowerSchool Admits Ransom Payment Amid Fresh Extortion Demands
PowerSchool Admits Ransom Payment Amid Fresh Extortion Demands
PowerSchool said its customers had been hit by new extortion demands using data stolen in a previous attack, despite attacker claims the data had been deleted
·infosecurity-magazine.com·
PowerSchool Admits Ransom Payment Amid Fresh Extortion Demands
FBI: End-of-life routers hacked for cybercrime proxy networks
FBI: End-of-life routers hacked for cybercrime proxy networks
The FBI warns that threat actors are deploying malware on end-of-life (EoL) routers to convert them into proxies sold on the 5Socks and Anyproxy networks.
·bleepingcomputer.com·
FBI: End-of-life routers hacked for cybercrime proxy networks
Cisco fixes max severity IOS XE flaw letting attackers hijack devices
Cisco fixes max severity IOS XE flaw letting attackers hijack devices
Cisco has fixed a maximum severity flaw in IOS XE Software for Wireless LAN Controllers by a hard-coded JSON Web Token (JWT) that allows an unauthenticated remote attacker to take over devices.
·bleepingcomputer.com·
Cisco fixes max severity IOS XE flaw letting attackers hijack devices
Supply chain attack hits npm package with 45,000 weekly downloads
Supply chain attack hits npm package with 45,000 weekly downloads
An npm package named 'rand-user-agent' has been compromised in a supply chain attack to inject obfuscated code that activates a remote access trojan (RAT) on the user's system.
·bleepingcomputer.com·
Supply chain attack hits npm package with 45,000 weekly downloads
The IT help desk kindly requests you read this newsletter
The IT help desk kindly requests you read this newsletter
How do attackers exploit authority bias to manipulate victims? Martin shares proactive strategies to protect yourself and others in this must-read edition of the Threat Source newsletter.
·blog.talosintelligence.com·
The IT help desk kindly requests you read this newsletter
NICKEL TAPESTRY expands fraudulent worker operations
NICKEL TAPESTRY expands fraudulent worker operations
The North Korean IT worker scheme grows to include organizations in Europe and Asia and industries beyond the technology sector
·news.sophos.com·
NICKEL TAPESTRY expands fraudulent worker operations
NICKEL TAPESTRY expands fraudulent worker operations
NICKEL TAPESTRY expands fraudulent worker operations
The North Korean IT worker scheme grows to include organizations in Europe and Asia and industries beyond the technology sector
·news.sophos.com·
NICKEL TAPESTRY expands fraudulent worker operations
Kickidler employee monitoring software abused in ransomware attacks
Kickidler employee monitoring software abused in ransomware attacks
Ransomware operations are using legitimate Kickidler employee monitoring software for reconnaissance, tracking their victims' activity, and harvesting credentials after breaching their networks.
·bleepingcomputer.com·
Kickidler employee monitoring software abused in ransomware attacks
Russian Group Launches LOSTKEYS Malware in Attacks
Russian Group Launches LOSTKEYS Malware in Attacks
New LOSTKEYS malware has been identified and linked to COLDRIVER by GTIG, stealing files and system data in targeted attacks
·infosecurity-magazine.com·
Russian Group Launches LOSTKEYS Malware in Attacks