Summary: Cybercriminals are increasingly using phishing attacks that spoof well-known brands to deceive users into revealing sensitive information. A recent report from Check Point Research identifies the most commonly spoofed brands and highlights the need for vigilance against these threats. Key brands targeted include Microsoft, Apple, and Google, with specific campaigns impersonating services like PayPal and Facebook.…
Read More
Tag: EMAIL
Summary: Microsoft has patched a critical security vulnerability (CVE-2025-21298) in Windows OLE that allows attackers to execute malicious code without user interaction, receiving a CVSS score of 9.8. This “zero-click” exploit can be triggered simply by previewing a malicious RTF email in Outlook, affecting a wide range of Windows systems.…
Read More
Summary: The U.S. House Committee on Homeland Security recently held a hearing to address escalating cybersecurity threats, emphasizing the need for an offensive strategy against increasingly sophisticated adversaries. Testimonies from cybersecurity experts highlighted the growing intrusions from nation-state actors like China, Russia, Iran, and North Korea, as well as the rising threat from cybercriminal organizations.…
Read More
Summary: TalkTalk is investigating a data breach involving a third-party supplier after a threat actor began selling alleged customer data on a hacking forum. The company has stated that the number of affected customers is significantly overstated and that no financial information was compromised. Ongoing investigations suggest the data may have been stolen from the Ascendon SaaS platform rather than directly from TalkTalk.…
Read More
A trojanized version of the XWorm RAT builder has been weaponized and disseminated primarily through GitHub and other file-sharing services, targeting novice users in cybersecurity. The malware has compromised over 18,459 devices globally, exfiltrating sensitive data and utilizing Telegram for command-and-control operations. Disruption efforts have been made to mitigate its impact, but challenges remain due to offline devices and rate-limiting on Telegram.…
Read More
Summary: The ransomware attack on Change Healthcare has now impacted nearly 200 million individuals, significantly more than previously reported. UnitedHealth, the parent company, has confirmed that sensitive personal and health information was accessed, including Social Security numbers and medical records. The company is still assessing the full extent of the breach and has begun notifying affected individuals.…
Read More
Summary: Cybercriminals are now selling access to a malicious generative AI chatbot named GhostGPT, which is designed to aid in various cybercrimes, including malware creation and phishing. This tool, available on Telegram, connects to a modified version of ChatGPT, allowing users to execute attacks without technical barriers.…
Read More
Summary: The FBI has updated its guidance on North Korean IT workers, highlighting their malicious activities including data extortion and theft of sensitive company information. These workers have been leveraging unlawful access to networks to exfiltrate data and conduct cyber-criminal activities. The FBI warns of the increasing threat posed by these actors to U.S.-based…
Read More
This article explores various types of malware, detailing their characteristics, examples, and consequences in the cybersecurity landscape. It covers viruses, worms, trojans, spyware, rootkits, ransomware, and cryptojacking, highlighting both historical examples and mitigation strategies. Affected: malware, computer systems, data security
Read More
Keypoints :
Malware is software developed to harm computer systems, steal data, or gain unauthorized access.…
Cisco Talos has reported a notable rise in email threats utilizing hidden text salting, a technique that allows attackers to bypass detection systems by embedding invisible characters in emails. This method complicates the work of email parsers and spam filters, making it easier for phishing attempts to succeed.…
Read More
This article discusses the author’s experience with harvesting phishing emails using a catch-all domain. The author emphasizes the importance of recognizing phishing attempts and outlines the process of analyzing a suspicious email that contained a potential threat. Key insights include examining IP addresses and file hashes to uncover associations with known malware, specifically RedLine Stealer.…
Read More
This article outlines the responsibilities of an Information Security analyst at AIG, focusing on mitigating vulnerabilities like Log4j, preventing ransomware attacks, and implementing continuous monitoring. Key strategies included using resources from CISA for vulnerability assessments and creating custom tools for decryption. Affected: AIG, Cybersecurity & Infrastructure Security Agency (CISA), Apache Log4j, ransomware gangs
Read More
Keypoints :
AIG is an American multinational finance and insurance corporation with operations in over 80 countries.…
Summary: Security researchers uncovered a critical vulnerability in Subaru’s Starlink service that could enable attackers to take over accounts and control vehicles using only a license plate. The flaw allowed unrestricted access to customer accounts and sensitive vehicle data, posing significant risks to Subaru owners in the U.S.,…
Read More
Victim: www.shihka.com.hk
Country : HK
Actor: GDLockerSec
Source: http://igziys7pres4644kbrtakxfbrwkyld64nxk5prpkgtcexwrrjgtfjzyd.onion/264bddb7-1ae9-48d1-b5d1-370e4a308575/
Discovered: 2025-01-24 16:41:36.046395
Published: 2025-01-24 16:40:28.062253
Description :
Certainly! Here’s a list of key points, each contained within
tags, reflecting content related to a 10MB file:
File size: 10MB (megabytes), a common measurement for digital file storage.…
Read More
Summary: Microsoft has announced that outdated Exchange servers will no longer receive new emergency mitigation definitions due to the deprecation of an Office Configuration Service certificate type. The Exchange Emergency Mitigation Service (EEMS) is designed to apply interim mitigations for high-risk security flaws but cannot function on servers running versions older than March 2023.…
Read More
Summary: A vulnerability in Subaru’s Starlink connected vehicle service allowed unauthorized access to customer accounts in the US, Canada, and Japan. Security researchers discovered that the admin panel could be accessed without proper authentication, enabling potential vehicle takeovers and access to sensitive customer information. Subaru addressed the security flaw within 24 hours of being notified by the researchers.…
Read More
Summary: Cyber Insights 2025 highlights the evolution of social engineering as a significant cybersecurity threat, particularly with the rise of generative AI. Experts predict that AI will enhance social engineering tactics, making them more sophisticated and widespread, thereby increasing the risk of cyberattacks. The article emphasizes the inherent human nature of social engineering and the challenges in mitigating its effects on individuals and organizations.…
Read More
Summary: The modern workplace has shifted towards hybrid work, increasing reliance on cloud-based SaaS applications, which has led to heightened cyberthreats. The 2025 State of SaaS Backup and Recovery Report reveals alarming trends in data loss and recovery confidence among IT professionals. Organizations are urged to strengthen their data resilience strategies to navigate these challenges effectively.…
Read More
Summary: The U.S. Department of Justice has indicted five individuals, including two North Korean nationals, for their involvement in a fraudulent IT worker scheme that violates international sanctions. The defendants are accused of using forged identities to secure remote IT jobs at U.S. companies, generating significant revenue for North Korea.…
Read More
The CloudSEK Threat Research Team has identified a generic phishing page capable of impersonating various brands to steal user credentials. This phishing page, hosted on Cloudflare’s workers.dev, utilizes a generic login interface and can be customized to target specific organizations. Victims’ credentials are exfiltrated to a remote server after they log in.…
Read More