Tag: cybercriminals

  • Microsoft Security Blog: New Star Blizzard spear-phishing campaign targets WhatsApp accounts

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/01/16/new-star-blizzard-spear-phishing-campaign-targets-whatsapp-accounts/ Source: Microsoft Security Blog Title: New Star Blizzard spear-phishing campaign targets WhatsApp accounts Feedly Summary: In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending their typical targets spear-phishing messages, this time offering the supposed opportunity to join a WhatsApp group. This is the first…

  • Hacker News: Mastercard DNS Error Went Unnoticed for Years

    Source URL: https://krebsonsecurity.com/2025/01/mastercard-dns-error-went-unnoticed-for-years/ Source: Hacker News Title: Mastercard DNS Error Went Unnoticed for Years Feedly Summary: Comments AI Summary and Description: Yes Summary: The incident involving MasterCard’s DNS misconfiguration underscores the critical importance of accurate DNS management as a security measure in the financial sector. The flaw, which existed for nearly five years, highlights potential…

  • Krebs on Security: MasterCard DNS Error Went Unnoticed for Years

    Source URL: https://krebsonsecurity.com/2025/01/mastercard-dns-error-went-unnoticed-for-years/ Source: Krebs on Security Title: MasterCard DNS Error Went Unnoticed for Years Feedly Summary: The payment card giant MasterCard just fixed a glaring error in its domain name server settings that could have allowed anyone to intercept or divert Internet traffic for the company by registering an unused domain name. The misconfiguration…

  • The Register: HPE probes IntelBroker’s bold data theft boasts

    Source URL: https://www.theregister.com/2025/01/21/hpe_intelbroker_claims/ Source: The Register Title: HPE probes IntelBroker’s bold data theft boasts Feedly Summary: Incident response protocols engaged following claims of source code burglary Hewlett Packard Enterprise (HPE) is probing assertions made by prolific Big Tech intruder IntelBroker that they broke into the US corporation’s systems and accessed source code, among other things.……

  • The Register: Medusa ransomware group claims attack on UK’s Gateshead Council

    Source URL: https://www.theregister.com/2025/01/17/gateshead_council_cybersecurity_incident/ Source: The Register Title: Medusa ransomware group claims attack on UK’s Gateshead Council Feedly Summary: Pastes allegedly stolen documents on leak site with £600K demand Another year and yet another UK local authority has been pwned by a ransomware crew. This time it’s Gateshead Council in North East England at the hands…

  • Wired: Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants

    Source URL: https://www.wired.com/story/hackers-likely-stole-fbi-call-logs-from-att-that-could-compromise-informants/ Source: Wired Title: Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants Feedly Summary: A breach of AT&T that exposed “nearly all” of the company’s customers may have included records related to confidential FBI sources, potentially explaining the Bureau’s new embrace of end-to-end encryption. AI Summary and Description: Yes…

  • CSA: Use Zero Trust to Fight Against AI-Generated Attacks

    Source URL: https://hub.illumio.com/briefs/ai-generated-attacks-are-here-zero-trust-is-how-we-fight-back Source: CSA Title: Use Zero Trust to Fight Against AI-Generated Attacks Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses the rising trend of generative AI (GenAI) being weaponized by cybercriminals, emphasizing the inadequacy of traditional cybersecurity methods to confront these emerging threats. It advocates for the Zero Trust security…

  • Alerts: CISA Adds Four Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/01/14/cisa-adds-four-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Four Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added four vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-55591 Fortinet FortiOS Authorization Bypass Vulnerability CVE-2025-21333 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability CVE-2025-21334 Microsoft Windows Hyper-V NT…

  • Slashdot: UK Plans To Ban Public Sector Organizations From Paying Ransomware Hackers

    Source URL: https://news.slashdot.org/story/25/01/14/160241/uk-plans-to-ban-public-sector-organizations-from-paying-ransomware-hackers?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: UK Plans To Ban Public Sector Organizations From Paying Ransomware Hackers Feedly Summary: AI Summary and Description: Yes Summary: The U.K. government is considering a targeted ban on ransomware payments for public sector entities in response to rising cyberattacks. This proposal aims to disrupt the financial incentives that fuel…