Summary and Keypoints
Short SummaryThe video discusses a hands-on approach to exploiting Remote Code Execution (RCE) vulnerabilities in a target server. The presenter shares their experience of overcoming data …
Summary and Keypoints
Short SummaryThe video discusses a hands-on approach to exploiting Remote Code Execution (RCE) vulnerabilities in a target server. The presenter shares their experience of overcoming data …
The article discusses a new campaign by the APT group Awaken Likho, targeting Russian government agencies and industrial enterprises. The group has shifted its tactics, now utilizing the …
Summary: A critical vulnerability (CVE-2024-47191) in the OATH-Toolkit’s PAM module exposes systems to root-level exploits during one-time password (OTP) authentication. Discovered by SUSE Security Team members, the flaw allows unprivileged …
Summary: A report by Sekoia’s Threat Detection & Research team reveals a sophisticated cyber threat involving two malware variants, GobRAT and Bulbature, targeting edge devices globally, particularly linked to Chinese …
Summary: Scammers are creating fake activation pages for popular streaming services, using SEO techniques to appear in Google search results, leading victims to malicious sites that display alarming fake alerts. …
Cyber Security Roles Summary
SummaryThe video discusses the various roles available in the field of cyber security, outlining the qualifications and certifications necessary for each role. It highlights six …
Summary: Cybersecurity researchers have revealed that 5% of Adobe Commerce and Magento stores have been compromised due to a critical vulnerability known as CosmicSting, which allows remote code execution. The …
The video discusses the biggest heist of all time involving Axie Infinity, where hackers stole 5 million from the game’s developer, Sky Mavis. The incident was primarily facilitated …
Short Summary:
CyberVolk is a politically motivated hacktivist group that has transitioned to using ransomware since June 2024. Initially operating under different names, the group has targeted Spanish institutions in …
Victim: City Of Forest Park – Full Leak Country : US Actor: monti Source: http://mblogci3rudehaagbryjznltdp33ojwzkq6hn2pckvjq33rycmzczpid.onion/blog/358c4d15c88f881a4fe9b4009fea92875bd9569160533db6cbea77d6fbdee3be/ Discovered: 2024-10-04 18:04:36.479547 Published: 2024-10-04 18:04:35.948224 Description : Georgia, United States
Ransomware Victims – ALL …
Summary: The Chrome development team has released a new Stable channel update, version 129.0.6668.89/.90, for Windows, Mac, and Linux, which includes important security enhancements and fixes. This update addresses four …
The BlueShark APT group has been actively targeting individuals in South Korea during the first half of 2024, utilizing various malware types and spear-phishing tactics disguised as …
Short Summary:
The article analyzes CyberVolk, a politically motivated hacktivist group that transitioned to using ransomware since June 2024. Initially a hacktivist organization, CyberVolk has launched ransomware attacks as a …
Since mid-2023, the Sekoia Threat Detection & Research team has been investigating a sophisticated cyber attack infrastructure that utilizes compromised edge devices as Operational Relay Boxes (ORBs). This …
Short Summary:
The “Vilsa Stealer” is a newly identified malware discovered on GitHub, known for its efficiency in extracting sensitive data from various applications. It targets browser credentials, crypto wallets, …
Short Summary:
Cisco Talos has identified a financially motivated threat actor, active since 2022, distributing a MedusaLocker ransomware variant named “BabyLockerKZ.” The actor has targeted organizations globally, with a notable …
Short Summary:
This article discusses a vishing attack that targeted a remote employee in the hospitality sector, leading to unauthorized access to the customer’s network. Darktrace’s anomaly-based threat detection successfully …
Threat Actor: Unknown | unknown Victim: Chunghwa Telecom | Chunghwa Telecom Price: $2,000 (negotiable) Exfiltrated Data Type: Customer data (over 900GB)
Key Points :
The threat actor claims to sell…Summary and Keypoints
Short SummaryThe speaker announces the publication of a zero-day exploit, prompting a moment of confusion about the context and significance of this revelation.
Key Points The…Summary: A critical unauthenticated stored cross-site scripting (XSS) vulnerability has been found in the LiteSpeed Cache plugin for WordPress, affecting over 6 million installations. This flaw allows attackers to potentially …
Threat Actor: @grep | @grep Victim: Andamen | Andamen Price: Not disclosed Exfiltrated Data Type: Personal details
Key Points :
In October 2024, a data breach affected the Indian luxury…Summary: DrayTek has patched 14 vulnerabilities across 24 router models, including critical flaws that could lead to remote code execution (RCE) or denial-of-service (DoS). The vulnerabilities were discovered by Forescout …
Summary: A critical vulnerability in the Vesta Control Panel allows attackers to take over admin accounts by exploiting the non-cryptographically secure $RANDOM variable in Bash, which is used in the …
Short Summary:
ESET researchers have identified a new China-aligned threat actor named CeranaKeeper, which has been targeting governmental institutions in Thailand since 2023. This group utilizes advanced techniques and tools, …
Victim: mccartycompany.com Country : US Actor: ransomhub Source: http://ransomxifxwc5eteopdobynonjctkxxvap77yqifu2emfbecgbqdw6qd.onion/162d71d4-40ea-496a-977a-29f1e86be3f8/ Discovered: 2024-10-02 20:49:26.020053 Published: 2024-10-02 20:02:09.000000 Description : McCarty Company is a full-service architecture, design, and construction firm that specializes in …
Victim: rollxvans.com Country : US Actor: ransomhub Source: http://ransomxifxwc5eteopdobynonjctkxxvap77yqifu2emfbecgbqdw6qd.onion/7a541914-6c47-4eb3-b71b-0941a46bfd62/ Discovered: 2024-10-02 20:37:10.987043 Published: 2024-10-02 20:07:19.000000 Description : Rollx Vans specializes in manufacturing and selling wheelchair-accessible vehicles. They offer customized minivans …
Victim: Holmes & Brakel Country : CA Actor: akira Source: Discovered: 2024-10-02 16:01:25.788262 Published: 2024-10-02 16:01:24.124366 Description : Holmes & Brakel is a full-service contract office furniture deale rship serving …
Short Summary:
The article discusses the NetSupport RAT, a remote access trojan used by advanced persistent threat (APT) groups. It highlights the challenges in detecting and removing such malware, along …
The article discusses the critical role of machine learning (ML) in analyzing cybersecurity logs to enhance threat detection capabilities. It highlights Kaspersky’s experience in utilizing ML algorithms, particularly …
Summary: Attackers are exploiting a critical remote code execution vulnerability (CVE-2024-45519) in Zimbra’s SMTP server, prompting urgent patching by affected organizations. The vulnerability allows unauthenticated remote attackers to execute arbitrary …
Counter Strike Video Summary
Short SummaryThe video discusses the rise of in-game item trading in popular video games like Counter-Strike 2, focusing on the integration of cryptocurrency as a …
Researchers at Palo Alto Networks discovered a tool named Swiss Army Suite (S.A.S) used by attackers for automated vulnerability scanning, particularly targeting SQL injection vulnerabilities. This tool operates …
Short Summary:
Key Group, also known as keygroup777, is a financially motivated ransomware group that primarily targets Russian users. They utilize various ransomware builders, including Chaos and Annabelle, and communicate …
Threat Actor: Unknown | unknown Victim: Android Users | Android Users Price: $800,000 Exfiltrated Data Type: Sensitive personal information
Key Points :
A powerful zero-day exploit targeting Android devices is…Summary: A critical vulnerability known as KartLANPwn (CVE-2024-45200) has been discovered in Mario Kart 8 Deluxe, allowing potential remote code execution during multiplayer sessions. The flaw, found in Nintendo’s Pia …
Victim: canstarrestorations.com Country : CA Actor: qilin Source: http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion/site/view?uuid=bafccd45-b1f6-35ab-a743-1f6cfdb6f199 Discovered: 2024-09-30 17:39:14.543763 Published: 2024-09-30 00:00:00.000000 Description : Canstar Restorations is a full-service restoration company offering a complete range of building …
Summary: A researcher has identified a critical decade-old vulnerability rated 9.9 that affects all GNU/Linux systems, potentially allowing attackers to gain complete control over these devices. The flaw is currently …
Summary: The Filament project has issued a critical security advisory for a Cross-Site Scripting (XSS) vulnerability, CVE-2024-47186, affecting versions 3.0.0 to 3.2.114. This vulnerability allows attackers to execute malicious scripts …
UserSec is a pro-Russian hacktivist group that emerged in early 2023, targeting Western governments and critical infrastructure, particularly those affiliated with NATO and Ukraine. Utilizing Telegram for coordination …
Short Summary:
In July 2024, a ReliaQuest customer in the manufacturing sector experienced a data exfiltration attack. The threat actor exploited a Fortinet firewall and used a brute-force attack on …
Short Summary:
This research by Check Point focuses on the increasing number of vulnerable Windows drivers and their exploitation potential. It highlights the characteristics shared by these drivers, the methodologies …
Threat Actor: Mr. Hamza Group | Mr. Hamza Group Victim: Egyptian Army | Egyptian Army Price: Not disclosed Exfiltrated Data Type: Sensitive military information
Key Points :
The Mr. Hamza…Victim: weisermemorialhospital.org Country : US Actor: embargo Source: http://embargobe3n5okxyzqphpmk3moinoap2snz5k6765mvtkk7hhi544jid.onion/#/post/37 Discovered: 2024-09-30 01:34:57.841488 Published: 2024-09-19 23:50:14.150896 Description : Weiser Memorial Hospital is a full service not-for-profit community hospital that has been …
Threat Actor: Unknown | Unknown Victim: digiDirect | digiDirect Price: Not disclosed Exfiltrated Data Type: Personal customer information
Key Points :
Over 304,000 customers’ sensitive information leaked. Database includes full…Summary: Microsoft has reported a multi-staged attack by the threat actor Storm-0501, which compromised hybrid cloud environments leading to data exfiltration, credential theft, and ransomware deployment across various sectors in …
Threat Actor: Unknown | unknown Victim: Mobility Compare | Mobility Compare Price: Available for download on dark web Exfiltrated Data Type: Personal information
Key Points :
Data breach occurred in…