DATE |
NAME |
Info |
CATEG. |
WEB |
20.1.24 |
Parrot TDS: A Persistent and Evolving Malware Campaign |
This campaign
is unique in its methodology, employing a source spoofing technique to
target a broad spectrum of token holders. |
Malware blog |
Palo Alto |
20.1.24 |
CHECK POINT RESEARCH ALERTS ON A NEW NFT AIRDROP CAMPAIGN |
A traffic
direction system (TDS) nicknamed Parrot TDS has been publicly reported
as active since October 2021. |
OS Blog |
Checkpoint |
20.1.24 |
Why many CISOs consider quitting – Week in security with Tony Anscombe |
The job of a
CISO is becoming increasingly stressful as cybersecurity chiefs face
overwhelming workloads and growing concerns over personal liability for
security failings |
Security blog |
Eset |
20.1.24 |
Virtual kidnapping: How to see through this terrifying scam |
Phone fraud takes a frightening twist as fraudsters can tap into AI to
cause serious emotional and financial damage to the victims |
Spam blog |
Eset |
20.1.24 |
Is Temu safe? What to know before you ‘shop like a billionaire’ |
Here are some scams you may encounter on the shopping juggernaut, plus a
few simple steps you can take to help safeguard your data while bagging
that irresistible deal |
Spam blog |
Eset |
20.1.24 |
The 7 deadly cloud security sins and how SMBs can do things better |
By eliminating these mistakes and blind spots, your organization can
take massive strides towards optimizing its use of cloud without
exposing itself to cyber-risk |
Security blog |
Eset |
14.1.24 |
Financial Fraud APK Campaign |
During our
research discovering threats in legitimate network traffic, activity
generated by a certain type of Android Package Kit (APK) files kept
hitting our radar. |
Hacking blog |
Palo Alto |
14.1.24 |
Medusa Ransomware Turning Your Files into Stone |
Unit 42 Threat
Intelligence analysts have noticed an escalation in Medusa ransomware
activities and a shift in tactics toward extortion, characterized by the
introduction in early 2023 of their dedicated leak site called the
Medusa Blog. |
Ransom blog |
Palo Alto |
14.1.24 |
Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer |
Malware, like
many complex software systems, relies on the concept of software
configuration. |
Malware blog |
Palo Alto |
14.1.24 |
.NET HOOKING – HARMONIZING MANAGED TERRITORY |
For a malware
researcher, analyst, or reverse engineer, the ability to alter the
functionality of certain parts of code is a crucial step, often
necessary to reach a meaningful result during the analysis process. |
Malware blog |
Checkpoint |
14.1.24 |
New decryptor for Babuk Tortilla ransomware variant released |
Cisco Talos
obtained executable code capable of decrypting files affected by the
Babuk Tortilla ransomware variant, allowing Talos to extract and share
the private decryption key used by the threat actor. |
Ransom blog |
Cisco Blog |
14.1.24 |
Lessons from SEC's X account hack – Week in security with Tony Anscombe |
The
cryptocurrency rollercoaster never fails to provide a thrilling ride –
this week it was a drama surrounding the hack of SEC's X account right
ahead of the much-anticipated decision about Bitcoin ETFs |
Cryptocurrency blog |
Eset |
14.1.24 |
A peek behind the curtain: How are sock puppet accounts used in OSINT? |
How wearing a ‘sock puppet’ can aid the collection of open source
intelligence while insulating the ‘puppeteer’ from risks |
Security blog |
Eset |
14.1.24 |
Attack of the copycats: How fake messaging apps and app mods could bite
you |
WhatsApp, Telegram and Signal clones and mods remain a popular vehicle
for malware distribution. Don’t get taken for a ride. |
Social blog |
Eset |
14.1.24 |
Love is in the AI: Finding love online takes on a whole new meaning |
Is AI companionship the future of not-so-human connection – and even the
cure for loneliness? |
AI blog |
Eset |
14.1.24 |
Cracking the 2023 SANS Holiday Hack Challenge |
From ChatNPT to Game Boys and space apps, this year’s challenge took us
to the Geese Islands for another rollicking romp of fun |
Hacking blog |
Eset |
14.1.24 |
Cybersecurity trends and challenges to watch out for in 2024 – Week in
security with Tony Anscombe |
What are some of the key cybersecurity trends that people and
organizations should have on their radars this year? |
Security blog |
Eset |
14.1.24 |
Lost and found: How to locate your missing devices and more |
Losing your keys, your wallet – or anything else, really – can be a
pain, but there is a wide world of trackers that can help you locate
your missing things – with awesome accuracy |
Security blog |
Eset |
14.1.24 |
Say what you will? Your
favorite speech-to-text app may be a privacy risk |
Typing with your voice? It should go without saying that you need to
take some precautions and avoid spilling your secrets. |
Security blog |
Eset |
|
|
| | |