Tag: phishing

  • Cloud Blog: (QR) Coding My Way Out of Here: C2 in Browser Isolation Environments

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/c2-browser-isolation-environments/ Source: Cloud Blog Title: (QR) Coding My Way Out of Here: C2 in Browser Isolation Environments Feedly Summary: Written by: Thibault Van Geluwe de Berlaere Executive Summary Browser isolation is a security technology where web browsing activity is separated from the user’s local device by running the browser in a secure environment,…

  • Krebs on Security: Why Phishers Love New TLDs Like .shop, .top and .xyz

    Source URL: https://krebsonsecurity.com/2024/12/why-phishers-love-new-tlds-like-shop-top-and-xyz/ Source: Krebs on Security Title: Why Phishers Love New TLDs Like .shop, .top and .xyz Feedly Summary: Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a small number of new generic top-level domains (gTLDs) — such as .shop, .top, .xyz —…

  • The Register: RansomHub claims to net data hat-trick against Bologna FC

    Source URL: https://www.theregister.com/2024/11/30/bologna_fc_ransomhub/ Source: The Register Title: RansomHub claims to net data hat-trick against Bologna FC Feedly Summary: Crooks say they have stolen sensitive files on managers and players Italian professional football club Bologna FC is allegedly a recent victim of the RansomHub cybercrime gang, according to the group’s dark web postings.… AI Summary and…

  • Microsoft Security Blog: Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/11/22/microsoft-shares-latest-intelligence-on-north-korean-and-chinese-threat-actors-at-cyberwarcon/ Source: Microsoft Security Blog Title: Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON Feedly Summary: At CYBERWARCON 2024, Microsoft Threat Intelligence analysts will share research and insights on North Korean and Chinese threat actors representing years of threat actor tracking, infrastructure monitoring and disruption, and their attack…

  • The Register: The only thing worse than being fired is scammers fooling you into thinking you’re fired

    Source URL: https://www.theregister.com/2024/11/28/fired_phishing_campaign_cloudflare/ Source: The Register Title: The only thing worse than being fired is scammers fooling you into thinking you’re fired Feedly Summary: Scumbags play on victims’ worst fears in phishing campaign referencing UK Employment Tribunal A current phishing campaign scares recipients into believing they’ve been sacked, when in reality they’ve been hacked –…

  • Slashdot: Data Broker Leaves 600K+ Sensitive Files Exposed Online

    Source URL: https://yro.slashdot.org/story/24/11/27/2253216/data-broker-leaves-600k-sensitive-files-exposed-online Source: Slashdot Title: Data Broker Leaves 600K+ Sensitive Files Exposed Online Feedly Summary: AI Summary and Description: Yes Summary: The text details a significant security breach involving an unprotected Amazon S3 bucket owned by SL Data Services, which exposed over 600,000 sensitive files containing personal information, including criminal histories and background checks.…

  • The Register: Data broker leaves 600K+ sensitive files exposed online

    Source URL: https://www.theregister.com/2024/11/27/600k_sensitive_files_exposed/ Source: The Register Title: Data broker leaves 600K+ sensitive files exposed online Feedly Summary: Researcher spotted open database before criminals … we hope Exclusive More than 600,000 sensitive files containing thousands of people’s criminal histories, background checks, vehicle and property records were exposed to the internet in a non-password protected database belonging…

  • CSA: AI in Cybersecurity – The Double-Edged Sword

    Source URL: https://cloudsecurityalliance.org/blog/2024/11/27/ai-in-cybersecurity-the-double-edged-sword Source: CSA Title: AI in Cybersecurity – The Double-Edged Sword Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the transformative impact of Artificial Intelligence (AI) on cybersecurity, emphasizing its dual role in both enhancing defenses and facilitating cybercrime. Key areas of focus include AI in vulnerability assessments, threat detection,…