AWS, Azure auth keys found in Android and iOS apps used by millions

October 22, 2024 at 04:23PM A report by Symantec reveals that numerous mobile apps for iOS and Android contain hardcoded, unencrypted cloud service credentials, risking user data exposure. This vulnerability, stemming from poor development practices, could allow unauthorized data access. Developers are urged to adopt best practices to safeguard sensitive information in apps. ### Meeting … Read more

Stream.Security Secures $30 Million Series B 

October 22, 2024 at 09:08AM Stream.Security, previously known as Lightlytics, has raised $55 million since its 2020 launch of a cloud data security product. The company recently secured $30 million in a Series B funding round. **Meeting Takeaways:** 1. **Company Overview**: Stream.Security, previously known as Lightlytics, specializes in cloud data security solutions. 2. **Funding Status**: … Read more

BlackCat Ransomware Successor Cicada3301 Emerges

October 22, 2024 at 07:06AM The Cicada3301 ransomware, resembling BlackCat, signifies a resurgence of this threat. It is viewed as a successor to BlackCat, highlighting ongoing concerns in cybersecurity. ### Meeting Notes Takeaways: 1. **Cicada3301 Ransomware**: – There are notable similarities between Cicada3301 and BlackCat ransomware. – Cicada3301 may signify the return of this particular … Read more

Latrodectus Malware Increasingly Used by Cybercriminals

October 22, 2024 at 06:45AM SecurityWeek offers comprehensive coverage of cybersecurity news, including threats, data breaches, and risk management. The platform also features webcasts, virtual events, and an ICS Cybersecurity Conference. Subscribe to their Daily Briefing Newsletter for updates on the latest cybersecurity insights and trends. Unsubscription is available anytime. ### Meeting Takeaways **1. Overview … Read more

Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies

October 22, 2024 at 06:18AM Two malware families, Bumblebee and Latrodectus, have resurfaced in new phishing campaigns following a law enforcement operation called Endgame. Both are malware loaders aimed at stealing personal data. The campaigns utilize malicious email attachments and links to deploy these threats, targeting sectors like finance, automotive, and business. ### Meeting Takeaways … Read more

Pixel perfect Ghostpulse malware loader hides inside PNG image files

October 22, 2024 at 01:33AM Ghostpulse malware has updated its delivery method, now embedding payloads within the pixels of PNG files, enhancing evasion of detection tools. This sophisticated technique allows it to act as a loader for more dangerous malware like Lumma, compelling defenses to evolve accordingly. Attackers also use social engineering tricks for distribution. … Read more

Cisco Disables DevHub Access After Security Breach

October 21, 2024 at 05:08PM Cisco has disabled public access to its DevHub after threat actors stole and listed sensitive customer data for sale, including source code and credentials from major companies. Investigations revealed no personal data was compromised, but the incident highlights the importance of securing public-facing environments against potential vulnerabilities. ### Meeting Takeaways: … Read more

Over 6,000 WordPress hacked to install plugins pushing infostealers

October 21, 2024 at 01:56PM WordPress sites are being compromised to introduce malicious plugins that show fake software updates and error messages, aimed at installing information-stealing malware. **Meeting Takeaways:** 1. **Security Breach Risk:** WordPress sites are currently at risk of being hacked. 2. **Malicious Plugin Installation:** Hackers are installing malicious plugins on affected WordPress sites. … Read more

Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain

October 21, 2024 at 10:02AM APT41, a Chinese state-sponsored cyber actor, conducted a sophisticated nine-month attack on the gambling and gaming industry, stealthily gathering sensitive data and evading detection by adapting strategies. Utilizing custom malware and exploiting credentials, they established persistence in the compromised network, targeting devices specifically within a designated VPN subnet. ### Meeting … Read more

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 – Oct 20)

October 21, 2024 at 08:24AM This week’s cybersecurity recap highlights increasing hacker tactics targeting seemingly secure systems while security experts develop advanced protective measures. Notable incidents include Apple’s macOS flaw and the weaponization of legitimate tools. Keeping devices updated is essential for protection. The FIDO Alliance aims to enhance passkey transfer across platforms. ### Meeting … Read more