https://www.bleepingcomputer.com/news/security/filefix-attack-weaponizes-windows-file-explorer-for-stealthy-powershell-commands/

Latest CyberSec News by @thecyberpicker
Fewer ransomware attacks encrypting data, new report finds
Hackers are increasingly performing extortion-only attacks.
Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers
Hackers target Microsoft Exchange servers worldwide, injecting keyloggers to steal credentials from victims in 26 countries.
Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue
Cryptominer campaigns disrupted using bad shares and XMRogue tool, reducing attackers' annual revenue by 76%
Russia releases REvil members after convictions for payment card fraud
Four convicted members of the REvil cybercrime gang were released from custody after being sentenced in St. Petersburg for offenses related to payment card fraud.
US House bans WhatsApp on staff devices over security concerns
The U.S. House of Representatives has banned the installation and use of WhatsApp on government-issued devices belonging to congressional staff, citing concerns over how the app encrypts and secures data.
Deep Dive into Automated Security Testing Tools
This week in cybersecurity from the editors at Cybercrime Magazine
Why Pen Testing Strengthens Cybersecurity | CSA
Learn how penetration testing uncovers vulnerabilities, boosts compliance, and improves breach response for a more proactive cybersecurity program.
Half of Security Pros Want GenAI Deployment Pause
Cobalt found that many security professionals believe a “strategic pause” in genAI deployment is necessary to recalibrate defenses
Here's a Subliminal Channel You Haven't Considered Before - Schneier on Security
Scientists can manipulate air bubbles trapped in ice to encode messages.
Lists
Why would someone go to the effort of hacking my system? For a start, these findings should serve as a reminder that it isn’t just big corporates who are at
Between Buzz and Reality: The CTEM Conversation We All Need
Cybersecurity experts share actionable insights on CTEM, risk reporting, and how to operationalize exposure management effectively
Reported Impersonation Scams Surge 148% as AI Takes Hold
New ITRC data reveals identity crimes are down but impersonation scams now account for a third of all scams
Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
Attackers exploit Docker misconfigurations to mine cryptocurrency using Tor, targeting technology, financial, and healthcare industries.
CIEM & Secure Cloud Access | CSA
Learn CIEM and secure cloud access best practices: effective identity visibility, least-privilege, zero‑standing privileges, session control.
Des versions détournées des LLMs de Mistral AI et Grok font renaître Worm GPT, le générateur de malware redouté
L'IA générative s'invite une nouvelle fois dans les arrières-boutiques du cybercrime, où elle révolutionne la manière dont les attaques sont conçues et déployées. Le phénomène WormGPT, déjà inquiétant en 2023, connaît aujourd’hui une seconde jeunesse grâce à deux modèles de pointe : Grok, développé par la société xAI
APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine
Ukrainian CERT warns of APT28 using Signal chat to deliver BEARDSHELL, COVENANT malware to government entities.
U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues
U.S. House bans WhatsApp on government devices due to security risks, recommending alternatives like Signal.
NCSC Urges Experts to Join Cyber Advisor Program
The NCSC says its Cyber Advisor program is not growing fast enough
Cyber Intel Pros and Hobbyists Can Now Report Threats Anonymously
Draugnet is a new anonymous threat reporting platform built for the MISP ecosystem
China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom
Chinese Salt Typhoon actors exploit Cisco vulnerability to target global telecom providers, including Canadian devices (CVE-2023-20198).
DHS warns of heightened cyber threat as US enters Iran conflict
Federal officials are warning that pro-Iran hacktivists or state-linked actors may target poorly secured U.S. networks.
Steelmaker Nucor restores operations, confirms limited data breach
The steel products giant said it does not expect the cyberattack to have a material impact on its operations.
Russian court releases several REvil ransomware gang members | CyberScoop
Four members of REvil were found guilty of computer crimes, but were released after a Russian court determined their sentence would amount to time served.
APT28 hackers use Signal chats to launch new malware attacks on Ukraine
The Russian state-sponsored threat group APT28 is using Signal chats to target government targets in Ukraine with two previously undocumented malware families named BeardShell and SlimAgent.
Researchers say cybercriminals are using jailbroken AI tools from Mistral and xAI
"Uncensored" versions of two mainstream AI tools are the latest examples of how cybercriminals are repurposing the technology for illicit means.
Malware on Google Play, Apple App Store stole your photos—and crypto
A new mobile crypto-stealing malware called SparkKitty was found in apps on Google Play and the Apple App Store, targeting Android and iOS devices.
Navigating cyber risks with Microsoft Security Exposure Management eBook
Discover how exposure management helps equip teams to anticipate adversarial tactics and neutralize risks before they escalate. Read the latest eBook.
US Homeland Security warns of escalating Iranian cyberattack risks
The U.S. Department of Homeland Security (DHS) warned over the weekend of escalating cyberattack risks by Iran-backed hacking groups and pro-Iranian hacktivists.
Cyber Fattah Leaks Data from Saudi Games in Alleged Iranian Operation
A cyber-attack by pro-Iranian group Cyber Fattah has leaked personal information from the Saudi Games online