The top 10 brands exploited in phishing attacks – and how to protect yourself | ZDNET
Summary: Cybercriminals are increasingly using phishing attacks that spoof well-known brands to deceive users into revealing sensitive information. A recent report from Check Point Research identifies the most commonly spoofed brands and highlights the need for vigilance against these threats. Key brands targeted include Microsoft, Apple, and Google, with specific campaigns impersonating services like PayPal and Facebook.…
Read More
US House Committee calls for offensive cyber strategies in response to rising adversarial threats – Industrial Cyber
Summary: The U.S. House Committee on Homeland Security recently held a hearing to address escalating cybersecurity threats, emphasizing the need for an offensive strategy against increasingly sophisticated adversaries. Testimonies from cybersecurity experts highlighted the growing intrusions from nation-state actors like China, Russia, Iran, and North Korea, as well as the rising threat from cybercriminal organizations.…
Read More
TalkTalk investigates breach after data for sale on hacking forum
Summary: TalkTalk is investigating a data breach involving a third-party supplier after a threat actor began selling alleged customer data on a hacking forum. The company has stated that the number of affected customers is significantly overstated and that no financial information was compromised. Ongoing investigations suggest the data may have been stolen from the Ascendon SaaS platform rather than directly from TalkTalk.…
Read More
No Honour Among Thieves: Uncovering a Trojanized XWorm RAT Builder Propagated by Threat Actors and Disrupting Its Operations
A trojanized version of the XWorm RAT builder has been weaponized and disseminated primarily through GitHub and other file-sharing services, targeting novice users in cybersecurity. The malware has compromised over 18,459 devices globally, exfiltrating sensitive data and utilizing Telegram for command-and-control operations. Disruption efforts have been made to mitigate its impact, but challenges remain due to offline devices and rate-limiting on Telegram.…
Read More
UnitedHealth updates number of data breach victims to 190 million
Summary: The ransomware attack on Change Healthcare has now impacted nearly 200 million individuals, significantly more than previously reported. UnitedHealth, the parent company, has confirmed that sensitive personal and health information was accessed, including Social Security numbers and medical records. The company is still assessing the full extent of the breach and has begun notifying affected individuals.…
Read More
Malicious Software and Its Types
This article explores various types of malware, detailing their characteristics, examples, and consequences in the cybersecurity landscape. It covers viruses, worms, trojans, spyware, rootkits, ransomware, and cryptojacking, highlighting both historical examples and mitigation strategies. Affected: malware, computer systems, data security

Keypoints :

Malware is software developed to harm computer systems, steal data, or gain unauthorized access.…
Read More
Reeling in RedLine Stealer
This article discusses the author’s experience with harvesting phishing emails using a catch-all domain. The author emphasizes the importance of recognizing phishing attempts and outlines the process of analyzing a suspicious email that contained a potential threat. Key insights include examining IP addresses and file hashes to uncover associations with known malware, specifically RedLine Stealer.…
Read More
Information Security Analyst
This article outlines the responsibilities of an Information Security analyst at AIG, focusing on mitigating vulnerabilities like Log4j, preventing ransomware attacks, and implementing continuous monitoring. Key strategies included using resources from CISA for vulnerability assessments and creating custom tools for decryption. Affected: AIG, Cybersecurity & Infrastructure Security Agency (CISA), Apache Log4j, ransomware gangs

Keypoints :

AIG is an American multinational finance and insurance corporation with operations in over 80 countries.…
Read More

Victim: www.shihka.com.hk Country : HK Actor: GDLockerSec Source: http://igziys7pres4644kbrtakxfbrwkyld64nxk5prpkgtcexwrrjgtfjzyd.onion/264bddb7-1ae9-48d1-b5d1-370e4a308575/ Discovered: 2025-01-24 16:41:36.046395 Published: 2025-01-24 16:40:28.062253 Description : Certainly! Here’s a list of key points, each contained within tags, reflecting content related to a 10MB file: File size: 10MB (megabytes), a common measurement for digital file storage.…
Read More
Microsoft: Outdated Exchange servers fail to auto-mitigate security bugs
Summary: Microsoft has announced that outdated Exchange servers will no longer receive new emergency mitigation definitions due to the deprecation of an Office Configuration Service certificate type. The Exchange Emergency Mitigation Service (EEMS) is designed to apply interim mitigations for high-risk security flaws but cannot function on servers running versions older than March 2023.…
Read More
Subaru Starlink Vulnerability Exposed Cars to Remote Hacking
Summary: A vulnerability in Subaru’s Starlink connected vehicle service allowed unauthorized access to customer accounts in the US, Canada, and Japan. Security researchers discovered that the admin panel could be accessed without proper authentication, enabling potential vehicle takeovers and access to sensitive customer information. Subaru addressed the security flaw within 24 hours of being notified by the researchers.…
Read More
Cyber Insights 2025: Social Engineering Gets AI Wings
Summary: Cyber Insights 2025 highlights the evolution of social engineering as a significant cybersecurity threat, particularly with the rise of generative AI. Experts predict that AI will enhance social engineering tactics, making them more sophisticated and widespread, thereby increasing the risk of cyberattacks. The article emphasizes the inherent human nature of social engineering and the challenges in mitigating its effects on individuals and organizations.…
Read More
2025 State of SaaS Backup and Recovery Report
Summary: The modern workplace has shifted towards hybrid work, increasing reliance on cloud-based SaaS applications, which has led to heightened cyberthreats. The 2025 State of SaaS Backup and Recovery Report reveals alarming trends in data loss and recovery confidence among IT professionals. Organizations are urged to strengthen their data resilience strategies to navigate these challenges effectively.…
Read More
DoJ Indicts 5 Individuals for 6K North Korean IT Worker Scheme Violations
Summary: The U.S. Department of Justice has indicted five individuals, including two North Korean nationals, for their involvement in a fraudulent IT worker scheme that violates international sanctions. The defendants are accused of using forged identities to secure remote IT jobs at U.S. companies, generating significant revenue for North Korea.…
Read More
Unmasking Cyber Deception: The Rise of Generic Phishing Pages Targeting Multiple Brands
The CloudSEK Threat Research Team has identified a generic phishing page capable of impersonating various brands to steal user credentials. This phishing page, hosted on Cloudflare’s workers.dev, utilizes a generic login interface and can be customized to target specific organizations. Victims’ credentials are exfiltrated to a remote server after they log in.…
Read More