Multiple Cybersecurity Giants’ Account Credentials Leaked and Sold on Dark Web; Ministry of Industry and Information Technology Warns: Beware of Androxgh0st Botnet Risks | NiuLan – Security Niu
A recent report reveals that multiple cybersecurity firms have had their account credentials leaked and are being sold on the dark web. This poses risks not only to the companies involved but also to their customers. Additionally, the Ministry of Industry and Information Technology highlights the ongoing threat of the Androxgh0st botnet, which targets IoT devices and network infrastructure.…
Read More
If you think you blocked NTLMv1 in your org, think again
Silverfort has uncovered a significant misconfiguration in Active Directory Group Policy that allows NTLMv1 authentications to persist despite attempts to disable it. This flaw poses a security risk for organizations using on-prem applications, as attackers can exploit this vulnerability to gain unauthorized access. Affected: Active Directory, NTLMv1

Keypoints :

Silverfort’s research reveals a misconfiguration in Group Policy that allows NTLMv1 authentications to continue.…
Read More
The  Cyber Threat Responsible for the Biggest Breaches of 2024
Summary: Stolen credential-based attacks have surged, becoming the leading cyber threat in 2023/24, with a staggering 80% of web app attacks originating from this breach vector. Despite increased cybersecurity budgets, vulnerabilities remain due to inadequate MFA adoption and the rise of infostealer malware. This article explores the factors contributing to the rise in account compromises and offers recommendations for security teams to combat these threats.…
Read More
“Securing Your Single-Page Applications: Essential Fixes”
This article discusses the security vulnerabilities associated with single-page applications (SPAs) due to their reliance on client-side rendering. It highlights issues such as routing manipulation, hidden element exposure, and JavaScript debugging, and recommends implementing robust server-side access controls and server-side rendering to mitigate these risks. Affected: SPAs, APIs

Keypoints :

Single-page applications (SPAs) are popular for their dynamic interfaces but can introduce security vulnerabilities.…
Read More
1Password Acquires SaaS Access Management Provider Trelica
Summary: 1Password has acquired Trelica, a SaaS access management provider, marking its largest acquisition by revenue in 18 years. This move aims to enhance 1Password’s Extended Access Management platform, addressing challenges in managing and securing SaaS applications.

Threat Actor: N/A | N/A Victim: N/A | N/A

Key Point :

1Password’s acquisition of Trelica strengthens its offerings in access management and security.…
Read More
Hijacking Azure Machine Learning Notebooks (via Storage Accounts)
The article discusses vulnerabilities in the Azure Machine Learning (AML) service, particularly focusing on excessive Storage Account permissions that allow code execution in user-created Jupyter notebooks. It highlights a previously remediated privilege escalation vulnerability and introduces a tool for dumping stored credentials from AML workspaces. Affected: Azure Machine Learning

Keypoints :

The Azure Machine Learning (AML) service is used for data processing and integrates with other Azure services.…
Read More
Summary: Recent research has uncovered significant vulnerabilities in Argo Workflows, an open-source tool for Kubernetes, primarily due to misconfigurations that can lead to severe security breaches. These flaws allow attackers to gain unauthorized access and escalate privileges within Kubernetes clusters.

Threat Actor: Cybercriminals | cybercriminals Victim: Organizations using Argo Workflows | organizations using Argo Workflows

Key Point :

Default Unauthenticated Access: Many instances lack authentication, allowing unrestricted access to workflows.…
Read More

Summary: In 2024, cyber threats targeting SaaS platforms surged dramatically, with significant increases in password attacks and phishing attempts resulting in billions in losses. Security teams must prioritize risk assessments and adopt monitoring tools to defend against evolving threats from notable cybercriminals.

Threat Actor: ShinyHunters | ShinyHunters Victim: Snowflake | Snowflake

Key Point :

ShinyHunters exploited a misconfiguration to breach over 165 organizations, emphasizing the importance of proper security measures.…
Read More

Summary :

Unit 42 researchers uncovered a phishing campaign targeting European companies, particularly in the automotive and chemical sectors, aiming to harvest Microsoft Azure credentials. The campaign peaked in June 2024, impacting around 20,000 users through malicious links and documents. #Phishing #CyberSecurity #CredentialHarvesting

Keypoints :

The phishing campaign targeted European companies, primarily in the automotive and chemical industries.…
Read More

### #PhishingAsAService #AiTMattacks #CredentialTheft

Summary: A new phishing-as-a-service platform, ‘Rockstar 2FA,’ has emerged, enabling large-scale adversary-in-the-middle attacks to steal Microsoft 365 credentials by bypassing multifactor authentication. This service, which has gained traction in the cybercrime community, offers various features to facilitate phishing operations.

Threat Actor: Cybercriminals | Rockstar 2FA Victim: Microsoft 365 users | Microsoft 365

Key Point :

Rockstar 2FA allows attackers to intercept valid session cookies, enabling access to accounts even with MFA enabled.…
Read More

Summary: This blog post discusses phishing techniques used by the threat actor 0ktapus to compromise cloud identities and outlines methods for investigating phishing campaigns. It provides a comprehensive framework for identifying phishing infrastructure and highlights the importance of ongoing vigilance in cybersecurity practices.

Threat Actor: 0ktapus | 0ktapus Victim: Various organizations | various organizations

Key Point :

0ktapus employs sophisticated phishing techniques, including smishing, vishing, and MFA fatigue, to target IT service desk workers and gain access to cloud environments.…
Read More

Summary:

Phishing remains a prevalent tactic among threat actors, particularly in targeting cloud identities. This article explores various investigative techniques for analyzing phishing campaigns, with a focus on the 0ktapus threat actor. By examining their methods and infrastructure, the post aims to provide insights into detecting and mitigating future phishing attempts.…
Read More
Short Summary: The FBI, CISA, NSA, CSE, AFP, and ASD’s ACSC have issued a Cybersecurity Advisory regarding Iranian cyber actors employing brute force techniques to compromise critical infrastructure sectors. These actors aim to obtain credentials and network information for sale to cybercriminals, utilizing methods such as password spraying and MFA push bombing since October 2023.…
Read More

Summary: GitHub has issued security updates for GitHub Enterprise Server to fix two vulnerabilities, including a critical flaw that could allow attackers to bypass authentication. The most severe vulnerability, CVE-2024-9487, poses a significant risk due to improper verification in the SAML SSO authentication mechanism.

Threat Actor: Unknown | unknown Victim: GitHub Enterprise Server Users | GitHub Enterprise Server Users

Key Point :

The critical vulnerability (CVE-2024-9487) has a CVSS score of 9.5 and allows bypassing of SAML SSO authentication.…
Read More

Summary: Microsoft has issued a warning about cyber attack campaigns that exploit legitimate file hosting services like SharePoint, OneDrive, and Dropbox to evade defenses and conduct various forms of fraud. These attacks utilize a method known as living-off-trusted-sites (LOTS) to compromise identities and facilitate business email compromise (BEC) schemes.…

Read More

AWS IAM Identity Center Tutorial Summary

Short Summary

The video discusses how to level up your AWS skills by teaching viewers about AWS Identity Center, emphasizing its importance in cloud security and providing a step-by-step guide on its setup and integration with existing identity providers.

Key Points The demand for cloud security skills, particularly in AWS, is growing rapidly.…
Read More

Short Summary:

Check Point Research has identified a cyber-enabled disinformation campaign, dubbed Operation MiddleFloor, targeting Moldova’s government and education sectors. The campaign, which began in early August, aims to influence the upcoming elections and referendum by spreading negative perceptions about European values and Moldova’s pro-European leadership through fake emails and documents.…

Read More