Weekly Round-up: Latest Cybersecurity Incidents at Your Fingertips!
Here is another weekly cybersecurity newsletter. Cyble is your best source of the latest updates on cyber threats and cybercrime activity across the world. ?
The tactics, techniques, and procedures (TTPs) employed by threat actors to infiltrate networks and steal users' sensitive information are evolving, growing in sophistication along with advances in technology and growth in the adoption of disruptive technologies such as #artificialintelligence and #machinelearning . Therefore, it is crucial for businesses to stay updated on the latest updates from the cyber world and implement the necessary security measures to fortify their risk perimeter and safeguard their #digital critical infrastructure assets. ?
In this edition of our newsletter, you will find a quick recap of our latest findings, along with tips to secure your business. Check out the latest intelligence research shared by the Cyble Research and Intelligence Labs (CRIL)!
Evasive malware targets Remote Desktop Files to gain unauthorized remote access to a victim’s system without credentials, allows for lateral movement, and creates opportunities for additional attacks. Read more .?
Threat Actor/Group ‘InTheBox’ expanding their inventory?with ready-to-sale web injects that are compatible with various Android banking malware at inexpensive prices and lucrative discounts. Read more .
Researchers at Cyble observe Threat Actors enhancing their capabilities to exploit Industrial Control System (ICS) and analyze underground activities targeting Military ICS Infrastructure. Read more .
领英推荐
Titan Stealer, a Golang-based information stealer working as a Malware-as-a-Service, along with multiple Command and Control (C&C) infrastructures associated with this Stealer targeting new victims. Read more. ?
Significant increase in the number of Amadey bot samples, indicating that threat actors are actively utilizing this bot to infect victims’ systems with additional malware. Read more .??
Major ransomware findings and observations around critical ransomware statistics and trends, major attacks, and common Tactics, Techniques, and Procedures (TTPs) observed in the last quarter- Q4-2022. Read more .??
The recent rise of Certification Fraud with Threat Actors offering fraudulent Cybersecurity Certifications poses a threat to the effectiveness and internal security of the Cybersecurity community. Read more. ??
Stay tuned to get the latest cybersecurity news and Infosec trends from around the cyber world! ?
Never miss an update. Join our Cybersecurity Journal today!
#InTheBox ?#WebInjects ?#android ?#bfsi #VectorStealer ?#RemoteDesktopProtocol ?#KGBCrypter #phishing ?#trojan #AmadeyBot ?#criticalinfrastructure ?#icssecurity ?#physicalsecurity #security ?#cyberattack #criticalinfrastructureprotection ?#darkweb #threatintelligence ?#ics ?#scada ?#plc ?#bordersecurity ?#military #armedforces #airforce ?#army #cyberrisk #osint ?#pentesting ?#redteaming #redteam ?#OT ?#infosecurity #infosecnews ?#automation ?#modbus ?#hacking ?#industrial ?#darkwebmonitoring ?#attacksurfacemanagement ?#cyberattacks ?#brandmonitoring ?#threatintelligence ?#threathunting ?#digitalriskprotection ?#attacksurface ?#ransomwareattacks ?#cyberattack ?