#Cybersecurity News Summary Nov 30

#Cybersecurity News Summary Nov 30

No alt text provided for this image

??This Malicious App Abused Hacked Devices to Create Fake Accounts on Multiple Platforms??

A malicious Android app distributed through the Google Play Store secretly collected users' text messages in order to create accounts on various platforms, including Facebook, Google, and WhatsApp.

??Read in "The Hackers News"

No alt text provided for this image

??Researchers Find a Way Malicious NPM Libraries Can Evade Vulnerability Detection??

An "unexpected behavior" in the npm command line interface could allow malicious NPM libraries to bypass security checks and hide vulnerabilities.

??Read in "The Hackers News"

No alt text provided for this image

??RansomBoggs: New #ransomware targeting Ukraine??

ESET researchers spot a new ransomware campaign targeting Ukrainian organizations and bearing the hallmarks of other campaigns previously unleashed by the Sandworm APT group.?

Virus Bulletin

??Read in "Welive Security"

No alt text provided for this image

??Intelligence Insights: November 2022??

Red Canary presents its November 2022 intelligence insights: Qbot’s campaign takes centre stage while stealer malware attempts to swipe more than just the spotlight.?

Virus Bulletin

??Read in "Red Canary"

No alt text provided for this image

?? Oracle Fusion Middleware Flaw Flagged by CISA ??

The bug could allow unauthorized access and takeover, earning it a spot on the Known Exploited Vulnerabilities Catalog.

?? Read in "Dark Reading".

No alt text provided for this image

?? How to Use Cyber Deception to Counter an Evolving and Advanced Threat Landscape ??

Organizations must be prepared to root out bad actors by any means possible, even if it means setting traps and stringing lures.

?? Read in "Dark Reading".

No alt text provided for this image

?? Microsoft Defender Gets New Security Protections ??

The new Microsoft Defender for Endpoint capabilities include built-in protection and scanning network traffic for malicious activity.

?? Read in "Dark Reading".

No alt text provided for this image

?? The Evolution of Business Email Compromise ??

The simplicity and profitability of these attacks continue to appeal to threat actors a decade later.

?? Read in "Dark Reading".

No alt text provided for this image

?? API Secrets: Where the Bearer Model Breaks Down ??

Current authentication methods are based on the bearer model, but lack of visibility into the entities leveraging API secrets has made this untenable.

?? Read in "Dark Reading".


#security #microsoft #network #cybersecurity #cybersec #cyberthreat

#malware #intelligence #stage #android #facebook #google

CHESTER SWANSON SR.

Realtor Associate @ Next Trend Realty LLC | HAR REALTOR, IRS Tax Preparer

2 年

Thanks for sharing.

要查看或添加评论,请登录

Federico Hansen的更多文章

  • #cybersec #cibersecurity

    #cybersec #cibersecurity

    ????♂? Extortion Reboot: Ransomware Crew Threatens Leak to Snowden ????♂? Though the group initially stuck to classic…

  • #cybersec #cibersecurity

    #cybersec #cibersecurity

    ????♂? 3 AI-Driven Roles in Cybersecurity ????♂? For candidates with a cybersecurity background who want to stay…

  • #cybersec #cibersecurity

    #cybersec #cibersecurity

    ????♂? Intel’s Secure Data Tunnel Moves AI Training Models to Data Sources ????♂? The chip maker's Tiber Secure…

  • #cybersec #cibersecurity

    #cybersec #cibersecurity

    ???♂? Ransomware Developer Extradited, Admits Working for LockBit ???♂? Law enforcement discovered admin credentials on…

  • #cybersec #cibersecurity

    #cybersec #cibersecurity

    ?? Five Eyes cyber agencies issue guidance on edge device vulnerabilities ?? Cybersecurity agencies including the NCSC…

  • #cybersec #cibersecurity

    #cybersec #cibersecurity

    ?? HPE alerts affected staff after Midnight Blizzard breach ?? HPE has notified staff affected in a data breach that…

  • #cybersec #cibersecurity

    #cybersec #cibersecurity

    ?? Seashell Blizzard hacker group escalating attacks on critical infrastructure, Microsoft warns ?? The BadPilot threat…

  • #cybersec #cibersecurity

    #cybersec #cibersecurity

    ?? Hackers are using this new phishing technique to bypass MFA ?? Microsoft has warned that a threat group known as…

  • #cybersec #cibersecurity

    #cybersec #cibersecurity

    ?? Warning issued over prolific 'Ghost' ransomware group ?? The Ghost ransomware group is known to act fast and exploit…

  • #cybersec #cibersecurity

    #cybersec #cibersecurity

    ????♂? Latin American Orgs Face 40% More Attacks Than Global Average ????♂? Technological adoption, demographics…

社区洞察

其他会员也浏览了