Summary: The video discusses the critical role of balancing human interaction with technology, specifically AI, to enhance customer experience strategies. It highlights the importance of understanding customer needs, ensuring consistent omnichannel engagement, empowering employees, and maintaining a mindset focused on continuous improvement.

Keypoints:

Providing excellent customer experiences is essential for long-term business growth.…
Read More
Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions
Summary: Cybersecurity researchers have discovered that a misconfiguration in on-premise applications can bypass Microsoft’s Group Policy designed to disable NT LAN Manager (NTLM) v1 authentication. This vulnerability allows organizations to mistakenly believe they are protected against NTLMv1 attacks, while in reality, they remain exposed due to misconfigured settings.…
Read More
The  Cyber Threat Responsible for the Biggest Breaches of 2024
Summary: Stolen credential-based attacks have surged, becoming the leading cyber threat in 2023/24, with a staggering 80% of web app attacks originating from this breach vector. Despite increased cybersecurity budgets, vulnerabilities remain due to inadequate MFA adoption and the rise of infostealer malware. This article explores the factors contributing to the rise in account compromises and offers recommendations for security teams to combat these threats.…
Read More
Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service
In December 2024, a new Adversary-in-the-Middle (AiTM) phishing kit known as Sneaky 2FA was identified, targeting Microsoft 365 accounts. This phishing kit, sold as Phishing-as-a-Service (PhaaS) by the cybercrime service “Sneaky Log”, utilizes sophisticated techniques including autograb functionality and anti-bot measures. The analysis reveals its operational methods, including the use of Telegram for distribution and support.…
Read More
Securonix Threat Labs 2024 Annual Autonomous Threat Sweeper Intelligence Insights
The 2024 Annual Cyber Threat Report reveals a significant increase in cyber threats, including advanced persistent threats (APTs) and evolving tactics used by attackers. Key incidents include the resurgence of LockBit ransomware, exploitation of vulnerabilities in widely-used technologies, and notable data breaches affecting major organizations. Affected: Ivanti Connect Secure, GlobalProtect, CrowdStrike, Snowflake, Palo Alto Networks

Keypoints :

Emerging threats exploit vulnerabilities in Ivanti Connect Secure and GlobalProtect VPN.…
Read More
JustJoin Landing Page Linked to Suspected DPRK Activity Resurfaces
This report discusses the identification of a server linked to TA444/BlueNoroff, which employs deceptive domains related to virtual meeting platforms like Zoom for phishing and malware delivery. The analysis reveals a network of domains and shared SSH keys, indicating coordinated infrastructure. Affected: IP address, domain

Keypoints :

Hunt researchers identified a server with HTTP response headers linked to DPRK-related activity.…
Read More
Purina Dog Food Data Breach Raises Privacy Issues in Colombia
Victim: Purina Dog Food | Purina Dog Food Price: Not disclosed Data: Phone numbers, Email addresses

Keypoints :

Incident involves a data breach in Colombia. Exposed sensitive user information including phone numbers and email addresses. Raises significant privacy concerns regarding consumer data security. Highlights the need for robust cybersecurity measures in the pet food and retail sectors.…
Read More
CISA shares guidance for Microsoft expanded logging capabilities
Summary: CISA has released guidance for government agencies and enterprises on utilizing expanded cloud logs in Microsoft 365 for forensic and compliance investigations. The new Microsoft Purview Audit (Standard) logging capabilities enhance threat-hunting efforts, particularly in response to a significant Exchange Online breach attributed to the threat actor Storm-0558.…
Read More
Eyewear Wholesaler Data Breach Raises Privacy Issues
Victim: Frame and Optic | Frame and Optic Price: Not disclosed Data: Customer and business data

Keypoints :

Data breach involving a U.S.-based eyewear wholesaler. Exposed sensitive customer details, purchase records, and potentially confidential business insights. Highlights the growing cybersecurity challenges in the eyewear industry. Emphasizes the need for robust cybersecurity measures to protect sensitive information.…
Read More
Volt Typhoon: Analyzing Espionage Campaigns Against Critical Infrastructure
Volt Typhoon, a Chinese state-sponsored APT group, is known for targeting critical infrastructure in the US, UK, Canada, and Australia by exploiting vulnerabilities in outdated SOHO devices. Their stealthy tactics involve using legitimate tools to blend malicious activities with normal network traffic, making detection difficult. Affected: United States, United Kingdom, Canada, Australia

Keypoints :

Volt Typhoon is linked to espionage and information gathering targeting critical infrastructure.…
Read More
Apple Bug Allows Root Protections Bypass Without Physical Access
Summary: Cyber defenders are urged to update macOS systems to address a critical vulnerability (CVE-2024-44243) that compromises the operating system’s security. This flaw allows threat actors to bypass System Integrity Protection (SIP), potentially leading to severe malware installations without physical access.

Threat Actor: Unknown | unknown Victim: Apple | Apple

Key Point :

Vulnerability allows bypassing of macOS System Integrity Protection (SIP).…
Read More
Windows 11 KB5050009 & KB5050021 cumulative updates released
Summary: Microsoft has released mandatory cumulative updates KB5050009 and KB5050021 for Windows 11 to address security vulnerabilities and improve system features. These updates include various fixes and enhancements, particularly for touchscreen gestures, File Explorer, and speech functionalities.

Threat Actor: Microsoft | Microsoft Victim: Windows 11 Users | Windows 11 Users

Key Point :

Mandatory updates KB5050009 and KB5050021 fix security vulnerabilities and improve system features.…
Read More