One threat actor claims to have already gathered email addresses and associated hashes from more than 110 remote IT management databases.
Автор: Jai Vijayan, Contributing Writer
Millions of Devices Vulnerable to ‘PKFail’ Secure Boot Bypass Issue
Several vendors for consumer and enterprise PCs share a compromised crypto key that should never have been on the devices in the first place.
Feds Warn of North Korean Cyberattacks on US Critical Infrastructure
The Andariel group is targeting critical defense, aerospace, nuclear, and engineering companies for data theft, the FBI, NSA, and others said.
‘Stargazer Goblin’ Amasses Rogue GitHub Accounts to Spread Malware
The threat group uses its "Stargazers Ghost Network" to star, fork, and watch malicious repos to make them seem legitimate, all to distribute a variety of notorious information-stealers-as-a-service.
Sprawling CrowdStrike Incident Mitigation Showcases Resilience Gaps
A painful recovery from arguably one of the worst IT outages ever continues, and the focus is shifting to what can be done to prevent something similar from happening again.
Novel ICS Malware Sabotaged Water-Heating Services in Ukraine
Newly discovered "FrostyGoop" is the first ICS malware that can communicate directly with operational technology systems via the Modbus protocol.
China’s APT41 Targets Global Logistics, Utilities Companies
According to Mandiant, among the many cyber espionage tools the threat actor is using is a sophisticated new dropper called DustTrap.
Threat Actors Ramp Up Use of Encoded URLs to Bypass Secure Email
The tactic is not new, but there has been a steady increase in its use as of this spring.
Orgs Are Finally Making Moves to Mitigate GenAI Risks
With AI use ramping up rapidly, a growing number of enterprise security teams have begun putting controls in place to protect sensitive data from accidental exposure and leaks.
Cloud Security, PowerShell Expertise Emerge as Key SOC Analyst Skills
SOC analysts should also cultivate skills like incident handling and response, threat hunting, digital forensics, Python, and bash scripting.