Ducktail Hacker Group Evolves, Targets Facebook Business Accounts
Activity observed since early September featured new avenues to spear-phish targets
Cyber News, Cyber Threat TrendsActivity observed since early September featured new avenues to spear-phish targets
Cyber News, Cyber Threat TrendsReview your servers, your patches and your authentication policies – there’s a proof-of-concept out
Cyber News, Cyber Threat TrendsA malicious extension for Chromium-based web browsers has been observed to be distributed via a long-standing Windows information stealer called ViperSoftX. Czech-based cybersecurity company dubbed the rogue browser add-on VenomSoftX owing to its standalone features that enable it to access website visits, steal credentials and clipboard data, and even swap cryptocurrency addresses via an
Cyber News, Cyber Threat TrendsThe US Attorney’s Office for the Eastern District of Virginia made the announcement on Monday
Cyber News, Cyber Threat TrendsThe Daixin ransomware gang has given a humiliating slap in the face to Air Asia, which lost the personal data of five million passengers and all of its employees earlier this month.
Cyber News, Cyber Threat TrendsThe data excludes compliance fines, ransomware costs and losses from non-operational processes
Cyber News, Cyber Threat TrendsResearchers claim that supposedly anonymous device analytics information can identify users: On Twitter, security researchers Tommy Mysk and Talal Haj Bakry have found that Apple’s device analytics data includes an iCloud account and can be linked directly to a specific user, including their name, date of birth, email, and associated information stored on iCloud. Apple […]
Cyber News, Cyber Threat TrendsACM.119 Choosing where to store secrets and configuration data This is a continuation of my series of posts on Automating Cybersecurity Metrics. In the last post I explained why you might want to use a customer-managed instead of AWS-managed encryption. https://medium.com/cloud-security/customer-managed-kms-keys-vs-aws-managed-encryption-keys-722038fc4a0b Now let’s review the differences between AWS Secrets Manager and AWS Systems Manager Parameter […]
Cyber News, Cyber Threat TrendsThe best line of defense against holiday hacking schemes is a comprehensive incident response strategy that focuses on end-user vulnerabilities. The holiday season is upon us and with it a slew of cybersecurity scams preying on end-user vulnerabilities. Because employees often use their business emails and cell phones as their primary point of contact, these scams quickly […]
Cyber News, Cyber Threat Trends