Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31742 bookmarks
Custom sorting
Russian phishing campaigns exploit Signal's device-linking feature
Russian phishing campaigns exploit Signal's device-linking feature
Russian threat actors have been launching phishing campaigns that exploit the legitimate "Linked Devices" feature in the Signal messaging app to gain unauthorized access to accounts of interest.
·bleepingcomputer.com·
Russian phishing campaigns exploit Signal's device-linking feature
How AI Will Change the Role of the SOC Team | CSA
How AI Will Change the Role of the SOC Team | CSA
The rapid evolution of AI is revolutionizing the security operations center (SOC), promising unprecedented efficiency and accuracy.
·cloudsecurityalliance.org·
How AI Will Change the Role of the SOC Team | CSA
Spam and phishing in 2024
Spam and phishing in 2024
We analyze 2024's key spam and phishing statistics and trends: the hunt for crypto wallets, Hamster Kombat, online promotions via neural networks, fake vacation schedules, and more.
·securelist.com·
Spam and phishing in 2024
North Korea's Kimsuky Taps Trusted Platforms to Attack South Korea
North Korea's Kimsuky Taps Trusted Platforms to Attack South Korea
The campaign heavily uses Dropbox folders and PowerShell scripts to evade detection and quickly scrapped infrastructure components after researchers began poking around.
·darkreading.com·
North Korea's Kimsuky Taps Trusted Platforms to Attack South Korea
WinRAR 7.10 boosts Windows privacy by stripping MoTW data
WinRAR 7.10 boosts Windows privacy by stripping MoTW data
WinRAR 7.10 was released yesterday with numerous features, such as larger memory pages, a dark mode, and the ability to fine-tune how Windows Mark-of-the-Web flags are propagated when extracting files.
·bleepingcomputer.com·
WinRAR 7.10 boosts Windows privacy by stripping MoTW data
Xerox Printer Vulnerabilities Enable Credential Capture
Xerox Printer Vulnerabilities Enable Credential Capture
Attackers are using patched bugs to potentially gain unfettered access to an organization's Windows environment under certain conditions.
·darkreading.com·
Xerox Printer Vulnerabilities Enable Credential Capture
China-Linked Threat Group Targets Japanese Orgs' Servers
China-Linked Threat Group Targets Japanese Orgs' Servers
Winnti once used a variety of malware, but is now focused on SQL vulnerabilities and obfuscation, updated encryption, and new evasion methods to gain access.
·darkreading.com·
China-Linked Threat Group Targets Japanese Orgs' Servers
Cracked Garry’s Mod, BeamNG.drive games infect gamers with miners
Cracked Garry’s Mod, BeamNG.drive games infect gamers with miners
A large-scale malware campaign dubbed "StaryDobry" has been targeting gamers worldwide with trojanized versions of cracked games such as Garry's Mod, BeamNG.drive, and Dyson Sphere Program.
·bleepingcomputer.com·
Cracked Garry’s Mod, BeamNG.drive games infect gamers with miners
Venture capital giant Insight Partners hit by cyberattack
Venture capital giant Insight Partners hit by cyberattack
New York-based venture capital and private equity firm Insight Partners has disclosed that its systems were breached in January following a social engineering attack.
·bleepingcomputer.com·
Venture capital giant Insight Partners hit by cyberattack
Hackers use ‘sophisticated’ macOS malware to steal cryptocurrency, Microsoft says
Hackers use ‘sophisticated’ macOS malware to steal cryptocurrency, Microsoft says
In a report released on Monday, threat intelligence specialists at Microsoft said that they have discovered the new XCSSET strain in limited attacks. XCSSET, first spotted in the wild in August 2020, spreads by infecting Xcode projects, which developers use to create apps for Apple devices.
·therecord.media·
Hackers use ‘sophisticated’ macOS malware to steal cryptocurrency, Microsoft says
Microsoft: New Variant of macOS Threat XCSSET Spotted in the Wild
Microsoft: New Variant of macOS Threat XCSSET Spotted in the Wild
Microsoft is warning the modular and potentially wormable Apple-focused infostealer boasts new capabilities for obfuscation, persistence, and infection, and could lead to a supply chain attack.
·darkreading.com·
Microsoft: New Variant of macOS Threat XCSSET Spotted in the Wild
Microsoft reminds admins to prepare for WSUS driver sync deprecation
Microsoft reminds admins to prepare for WSUS driver sync deprecation
Microsoft once again reminded IT administrators that driver synchronization in Windows Server Update Services (WSUS) will be deprecated on April 18, just 60 days from now.
·bleepingcomputer.com·
Microsoft reminds admins to prepare for WSUS driver sync deprecation
Chinese hackers abuse Microsoft APP-v tool to evade antivirus
Chinese hackers abuse Microsoft APP-v tool to evade antivirus
The Chinese APT hacking group "Mustang Panda" has been spotted abusing the Microsoft Application Virtualization Injector utility as a LOLBIN to inject malicious payloads into legitimate processes to evade detection by antivirus software.
·bleepingcomputer.com·
Chinese hackers abuse Microsoft APP-v tool to evade antivirus
Juniper patches critical auth bypass in Session Smart routers
Juniper patches critical auth bypass in Session Smart routers
​Juniper Networks has patched a critical vulnerability that allows attackers to bypass authentication and take over Session Smart Router (SSR) devices.
·bleepingcomputer.com·
Juniper patches critical auth bypass in Session Smart routers