How to Outsmart Stealthy E-Crime and Nation-State Threats

November 6, 2024 at 10:08AM Cross-domain threats have surged, exploiting identity, cloud, and endpoint vulnerabilities with minimal detection footprints. Notable adversaries like Scattered Spider and North Korea’s Famous Chollima utilize stolen credentials and sophisticated phishing to conduct attacks. Defending against these requires integrated visibility, real-time threat hunting, and advanced identity protection measures to prevent breaches. … Read more

INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime

November 6, 2024 at 05:24AM INTERPOL’s Operation Synergia II successfully dismantled over 22,000 malicious servers globally from April to August 2024, targeting phishing and ransomware. Approximately 76% of 30,000 identified suspicious IPs were taken down, leading to 41 arrests. The operation included cooperation with private sector partners and significant discoveries in multiple countries. ### Meeting … Read more

Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users

November 6, 2024 at 01:31AM Google Cloud will require mandatory multi-factor authentication (MFA) for all users by the end of 2025 to enhance security. The rollout will occur in three phases, starting November 2024. This initiative aligns with similar efforts by competitors Amazon and Microsoft amid rising concerns over phishing and credential theft. ### Meeting … Read more

Massive Git Config Breach Exposes 15,000 Credentials; 10,000 Private Repos Cloned

November 1, 2024 at 07:33AM Cybersecurity researchers have uncovered a campaign, EMERALDWHALE, targeting exposed Git configurations to steal credentials from over 10,000 private repositories. The operation exploits tools to access sensitive files and collect data, leading to extensive credential theft for phishing purposes. A list of 67,000 exposed URLs is being sold online. ### Meeting … Read more

Tricky CAPTCHA Caught Dropping Lumma Stealer Malware

October 22, 2024 at 12:31PM Lumma Stealer has launched a campaign using malicious CAPTCHA pages to prompt malware downloads. This malware aims to steal sensitive data. Researchers emphasize the need for security teams to adopt continuous monitoring and adapt defenses against evolving threats like Lumma Stealer, using a multilayered approach for effective protection. ### Meeting … Read more

Anti-Bot Services Help Cybercrooks Bypass Google ‘Red Page’

October 21, 2024 at 11:32AM Cybercriminals are using new anti-bot services from the Dark Web to bypass Google’s Red Page warning against phishing attacks. These services filter out security crawlers and utilize techniques like cloaking and CAPTCHA to disguise malicious sites. This development complicates detection efforts, increasing risks for individuals and enterprises alike. **Meeting Takeaways: … Read more

5 Techniques for Collecting Cyber Threat Intelligence

October 16, 2024 at 06:36AM To effectively combat cyber threats, organizations must stay informed about the threat landscape. Analysts can enhance investigations by utilizing techniques like pivoting on Command and Control IPs, analyzing URLs, employing MITRE TTPs, using YARA rules, and examining command line artifacts. ANY.RUN’s TI Lookup tool facilitates these processes. **Meeting Takeaways: Cyber … Read more

Microsoft says more ransomware stopped before reaching encryption

October 15, 2024 at 12:55PM Microsoft reports a 2.75 times increase in ransomware attacks, yet defenses are improving, halving successful encryption attempts. Common methods include social engineering and exploiting unmanaged devices. Ransomware tactics like double extortion are prevalent, with Akira leading attacks. Microsoft advises implementing multi-factor authentication and reviewing account privileges to mitigate risks. ### … Read more

TrickMo malware steals Android PINs using fake lock screen

October 14, 2024 at 01:35PM Forty new variants of the TrickMo Android banking trojan have emerged, designed to steal PINs and sensitive data through deceptive screens and various phishing tactics. Linked to 16 droppers and 22 command and control infrastructures, it has impacted at least 13,000 victims, primarily in Canada, UAE, Turkey, and Germany. ### … Read more

New Mamba 2FA bypass service targets Microsoft 365 accounts

October 8, 2024 at 04:32PM The Mamba 2FA platform is an emerging phishing-as-a-service (PhaaS) tool, targeting Microsoft 365 accounts through AiTM attacks. It offers a competitive price of $250/month and has evolved to enhance stealthiness and longevity. It specifically targets Microsoft 365 users and offers phishing templates for various services. This platform poses a significant … Read more