Heimdal? Cyber News Digest
Dear cyber enthusiast,
Welcome to another edition of our "Cyber News Digest" where you can get the scoop on all-things threat actors, industry shifts, cyberattacks, and data breaches from the last couple of months.
In this edition, we’re bringing you the most pressing cybersecurity developments and insights to help you understand the evolving landscape and protect your assets.
You'll find in-depth analyses, expert opinions, and practical tips to enhance your cybersecurity measures.
Read on to ensure you're always one step ahead in the cyber world.
News & Updates
ONNX Phishing Targets Financial Companies’ Microsoft 365 Accounts
The ONNX Store's new PhaaS targets Microsoft 365 and Office 365 accounts in financial companies using QR codes in PDF attachments to lure employees into clicking malicious links.
The platform employs Telegram bots to bypass two-factor authentication and is believed to be a new version of the Caffeine phishing kit managed by MRxC0DER.
To mitigate risks, companies should block untrustworthy PDF and HTML attachments, restrict access to non-certified HTTPS websites, use DNS filtering to spot malicious websites, and educate employees on recognizing phishing attempts.
The Top 7 Unified Endpoint Management Tools in 2024
Crypter Specialist Involved in the Conti and LockBit Attack Arrested
A 28-year-old Russian man was arrested by Ukraine's cyber police in Kyiv for his role in the Conti and LockBit ransomware operations, involving the creation of undetectable malware and executing at least one attack.
The Dutch police provided information linking him to a ransomware attack on a Dutch multinational, leading to his arrest on April 18, 2024, during "Operation Endgame."
领英推荐
The suspect, an expert in creating crypters to evade antivirus detection, faces up to 15 years in jail if found guilty under Part 5 of Article 361 of the Ukrainian Criminal Code.
What Is a Bastion Host? Types, Use Cases, and Safety Measures?
A bastion host is a server that sits between the public internet and a company’s private network, enhancing security by allowing access only to specific, authorized users.
It applies strict access rules and monitors sessions, but must be secured against various attacks like brute force or DDoS. Alternatively, a Privileged Account and Session Management (PASM) solution offers a more comprehensive and easier-to-use approach for managing secure access to privileged accounts.
Latest Cybersecurity Videos
Check out our most recent cyber news videos on our YouTube channel, where we provide you in-depth information and practical advice on various aspects of digital security.
How Does DNS Tunneling Work?
When Selective Patching Becomes Suspicious - Cybersecurity (ALMOST) Horror Stories
We Are Heimdalians: Interview with ANDREI HINODACHE, Cybersecurity Community Leader
Social Media Corner
Our social media profiles are the go-to places for the latest updates! There, you can discover highlights from events featuring the amazing Heimdalians, along with interviews, webinars, and much more.
Make sure you follow Heimdal? across all platforms.