#Cybersecurity News Summary Nov 30
??This Malicious App Abused Hacked Devices to Create Fake Accounts on Multiple Platforms??
A malicious Android app distributed through the Google Play Store secretly collected users' text messages in order to create accounts on various platforms, including Facebook, Google, and WhatsApp.
??Read in "The Hackers News"
??Researchers Find a Way Malicious NPM Libraries Can Evade Vulnerability Detection??
An "unexpected behavior" in the npm command line interface could allow malicious NPM libraries to bypass security checks and hide vulnerabilities.
??Read in "The Hackers News"
??RansomBoggs: New #ransomware targeting Ukraine??
ESET researchers spot a new ransomware campaign targeting Ukrainian organizations and bearing the hallmarks of other campaigns previously unleashed by the Sandworm APT group.?
Virus Bulletin
??Read in "Welive Security"
??Intelligence Insights: November 2022??
Red Canary presents its November 2022 intelligence insights: Qbot’s campaign takes centre stage while stealer malware attempts to swipe more than just the spotlight.?
Virus Bulletin
??Read in "Red Canary"
?? Oracle Fusion Middleware Flaw Flagged by CISA ??
The bug could allow unauthorized access and takeover, earning it a spot on the Known Exploited Vulnerabilities Catalog.
领英推荐
?? Read in "Dark Reading".
?? How to Use Cyber Deception to Counter an Evolving and Advanced Threat Landscape ??
Organizations must be prepared to root out bad actors by any means possible, even if it means setting traps and stringing lures.
?? Read in "Dark Reading".
?? Microsoft Defender Gets New Security Protections ??
The new Microsoft Defender for Endpoint capabilities include built-in protection and scanning network traffic for malicious activity.
?? Read in "Dark Reading".
?? The Evolution of Business Email Compromise ??
The simplicity and profitability of these attacks continue to appeal to threat actors a decade later.
?? Read in "Dark Reading".
?? API Secrets: Where the Bearer Model Breaks Down ??
Current authentication methods are based on the bearer model, but lack of visibility into the entities leveraging API secrets has made this untenable.
?? Read in "Dark Reading".
Realtor Associate @ Next Trend Realty LLC | HAR REALTOR, IRS Tax Preparer
2 年Thanks for sharing.