- Stalking via social media aka Cyberstalking – Source:davinciforensics.co.zaby CISO2CISO Editor 2 on December 29, 2024
Source: davinciforensics.co.za – Author: cyberpro. The mere term “stalking” usually sends a chill down the spine. While in-person stalking might be scary, cyberstalking via social media takes on a whole new problematic level. The internet has given people a far too relaxed attitude regarding sharing personal information and this opens the doors for those that La entrada Stalking via social media aka Cyberstalking – Source:davinciforensics.co.za se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
- How cops taking down LockBit, ALPHV led to RansomHub’s meteoric rise – Source: go.theregister.comby CISO2CISO Editor 2 on December 28, 2024
Source: go.theregister.com – Author: Jessica Lyons RansomHub, the ransomware collective that emerged earlier this year, quickly gained momentum, outpacing its criminal colleagues and hitting its victims especially hard. The group named and shamed hundreds of organizations on its leak site, while demanding exorbitant payments across various industries. The group, a suspected Knight rebrand, first appeared La entrada How cops taking down LockBit, ALPHV led to RansomHub’s meteoric rise – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
- 15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials – Source:thehackernews.comby CISO2CISO Editor 2 on December 28, 2024
Source: thehackernews.com – Author: . A high-severity flaw impacting select Four-Faith routers has come under active exploitation in the wild, according to new findings from VulnCheck. The vulnerability, tracked as CVE-2024-12856 (CVSS score: 7.2), has been described as an operating system (OS) command injection bug affecting router models F3x24 and F3x36. The severity of the La entrada 15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
- North Korea actors use OtterCookie malware in Contagious Interview campaign – Source: securityaffairs.comby CISO2CISO Editor 2 on December 28, 2024
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 28, 2024 North Korea-linked threat actors are using the OtterCookie backdoor to target software developers with fake job offers. North Korea-linked threat actors were spotted using new malware called OtterCookie as part of the Contagious Interview campaign that targets software developer community with fake job offers. La entrada North Korea actors use OtterCookie malware in Contagious Interview campaign – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
- Experts warn of a surge in activity associated FICORA and Kaiten botnets – Source: securityaffairs.comby CISO2CISO Editor 2 on December 28, 2024
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 27, 2024 FortiGuard Labs observed increased activity from two botnets, the Mirai variant “FICORA” and the Kaiten variant “CAPSAICIN”. FortiGuard Labs researchers observed a surge in activity associated with two botnets, the Mirai variant “FICORA” and the Kaiten variant “CAPSAICIN,” in late 2024. Both botnets target La entrada Experts warn of a surge in activity associated FICORA and Kaiten botnets – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
- 6 Security Vendors Named ‘Leaders’ In Gartner’s Inaugural Email Security Magic Quadrant – Source: www.proofpoint.comby CISO2CISO Editor 2 on December 28, 2024
Source: www.proofpoint.com – Author: The first-ever Gartner ranking for Email Security Platforms included 14 companies in total. Six cybersecurity vendors were chosen to appear in the “leaders” category for Gartner’s first-ever Magic Quadrant for Email Security Platforms, according to the report published this week. The research firm ranked Proofpoint, Abnormal Security, Trend Micro, Mimecast, KnowBe4 La entrada 6 Security Vendors Named ‘Leaders’ In Gartner’s Inaugural Email Security Magic Quadrant – Source: www.proofpoint.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
- 15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentialsby info@thehackernews.com (The Hacker News) on December 28, 2024
A high-severity flaw impacting select Four-Faith routers has come under active exploitation in the wild, according to new findings from VulnCheck. The vulnerability, tracked as CVE-2024-12856 (CVSS score: 7.2), has been described as an operating system (OS) command injection bug affecting router models F3x24 and F3x36. The severity of the shortcoming is lower due to the fact that it only works
- Best of 2024: AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again – Source: securityboulevard.comby CISO2CISO Editor 2 on December 28, 2024
Source: securityboulevard.com – Author: Richi Jennings NYSE:T loses yet more customer data—this time, from almost all of them. Almost all AT&T customers in 2022 had their phone metadata stolen, plus some from Liberty and MVNOs. Ma Bell knew about the hack for months, but somehow didn’t get around to telling us until today. Galen Erso wouldn’t have La entrada Best of 2024: AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
- DEF CON 32 – Offensive Security Testing Safeguarding the Final Frontier – Source: securityboulevard.comby CISO2CISO Editor 2 on December 28, 2024
Source: securityboulevard.com – Author: Marc Handelman Friday, December 27, 2024 Home » Security Bloggers Network » DEF CON 32 – Offensive Security Testing Safeguarding the Final Frontier Authors/Presenters: Andrzej Olchawa Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the La entrada DEF CON 32 – Offensive Security Testing Safeguarding the Final Frontier – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
- Navigating the Pixel Minefield: Strategies for Risk Mitigation – Source: securityboulevard.comby CISO2CISO Editor 2 on December 28, 2024
Source: securityboulevard.com – Author: mykola myroniuk In the previous posts, we explored the world of web pixels, uncovering potential privacy risks and highlighting the importance of a thorough audit. Now, let’s shift our focus to actionable strategies for mitigating these risks and ensuring your web pixel usage is both effective and ethical. 1. Embrace Transparency La entrada Navigating the Pixel Minefield: Strategies for Risk Mitigation – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
- Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #318 — Working for a Big Consultancy – Source: securityboulevard.comby CISO2CISO Editor 2 on December 28, 2024
Source: securityboulevard.com – Author: Marc Handelman via the respected Software Engineering expertise of Mikkel Noe-Nygaard and the lauded Software Engineering / Enterprise Agile Coaching work of Luxshan Ratnaravi at Comic Agilé! Permalink *** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.comicagile.net/comic/working-for-a-big-consultancy/ Original Post URL: https://securityboulevard.com/2024/12/comic-agile-mikkel-noe-nygaard-luxshan-ratnaravi-318-working-for-a-big-consultancy/ Category & Tags: Security Bloggers Network,Agile,agile development,Agile Humor,Agile La entrada Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #318 — Working for a Big Consultancy – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
- North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaignby info@thehackernews.com (The Hacker News) on December 27, 2024
North Korean threat actors behind the ongoing Contagious Interview campaign have been observed dropping a new JavaScript malware called OtterCookie. Contagious Interview (aka DeceptiveDevelopment) refers to a persistent attack campaign that employs social engineering lures, with the hacking crew often posing as recruiters to trick individuals looking for potential job opportunities into