Tag: intelligence
-
16th December Threat Intelligence Report
The Romanian National Cybersecurity Directorate (DNSC) has disclosed a ransomware attack conducted by Lynx ransomware gang on the country’s energy provider Electrica Group, which provides services to more than 3.8M people across […] First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2024/16th-december-threat-intelligence-report/
-
The Hidden Risks of Mobile Calls and Messages: Why EndEnd Encryption is Just the Starting Line
Tags: access, android, breach, business, communications, control, cybercrime, cybersecurity, data, encryption, endpoint, espionage, government, identity, intelligence, mobile, network, risk, service, startup, technology, threat, tool, update, vulnerabilityThe recent breaches of sovereign telecom networks in the United States, underscores how highly connected but fragmented public networks are increasingly vulnerable to sophisticated attacks. Another rising concern is the blind trust organizations and individuals put into consumer-grade messaging apps such as WhatsApp to share government and commercially-sensitive information. Some of the biggest risks concerning these…
-
Serbian police used Cellebrite to unlock, then plant spyware, on a journalist’s phone
Amnesty said it found NoviSpy, an Android spyware linked to Serbian intelligence, on the phones of several members of Serbian civil society following police stops. First seen on techcrunch.com Jump to article: techcrunch.com/2024/12/15/serbian-police-used-cellebrite-to-unlock-then-plant-spyware-on-a-journalists-phone/
-
Russian APT >>Secret Blizzard<< Leverages Cybercriminal Tools in Ukraine Attacks
A new report from Microsoft Threat Intelligence reveals that the Russian state-sponsored threat actor known as Secret Blizzard (also tracked as Turla, Waterbug, Venomous Bear, Snake, Turla Team, and Turla... First seen on securityonline.info Jump to article: securityonline.info/russian-apt-secret-blizzard-leverages-cybercriminal-tools-in-ukraine-attacks/
-
Cloud Access Security Broker ein Kaufratgeber
Tags: access, ai, api, authentication, cisco, cloud, compliance, control, cyberattack, data, detection, endpoint, exploit, gartner, governance, intelligence, mail, malware, microsoft, monitoring, network, phishing, ransomware, risk, saas, service, software, startup, threat, tool, zero-day, zero-trust -
Platforms are the Problem
Tags: ai, breach, business, chatgpt, cloud, cyber, cybercrime, cybersecurity, data, defense, detection, finance, firewall, fraud, infrastructure, intelligence, LLM, network, saas, service, technology, threat, toolA better path forward for cybersecurity Why is it that cybersecurity is struggling to keep pace with the rapidly evolving threat landscape? We spend more and more, tighten our perimeters, and still there are trillions of dollars being lost to cybercrime and cyber attacks. Setting aside the direct costs to individuals and businesses, and the…
-
Artificial Intelligence Looms Large at Black Hat Europe
Open Questions: What’s Next Killer Use Case? Can Output Be Better Validated?. The topic of AI reality versus hype, as well as what the next killer use cases might be, dominated the wrap-up Locknote panel at this year’s annual Black Hat Europe in London, comprised of conference Review Board members detailing this year’s hot topics,…
-
How AWS is protecting customers from cyber threats
Amazon Web Services reveals how its threat intelligence capabilities work under the hood to thwart cyber attacks and keep its customers’ data safe First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366617118/How-AWS-is-protecting-customers-from-cyber-threats
-
Human Misuse Will Make Artificial Intelligence More Dangerous
AI creates what it’s told to, from plucking fanciful evidence from thin air, to arbitrarily removing people’s rights, to sowing doubt over public misdeeds. First seen on wired.com Jump to article: www.wired.com/story/human-misuse-will-make-artificial-intelligence-more-dangerous/
-
Arctic Wolf beobachtet Zero-Day-Exploit von Cleo-MFT-Software
Das Threat-Intelligence-Team der Arctic Wolf Labs haben neue schadhafte Aktivitäten beobachtet. Diese stehen im Zusammenhang mit der von Huntress aufgedeckten Zero-Day-Schwachstelle in der Cleo-Managed-File-Transfer (MFT) -Software. Im Dezember 2024 beobachtete Arctic Wolf Labs eine Mass-Exploitation-Kampagne, bei der Cleo-MFT-Lösungen für den unberechtigten Fernzugriff genutzt wurden. Die Ausführungskette umfasste einen verschleierten Powershell-Stager, einen Java-Loader sowie eine Java-basierte Backdoor,…
-
Thales and Imperva Win Big in 2024
Tags: access, api, application-security, attack, authentication, banking, business, ciso, cloud, communications, compliance, conference, control, cyber, cybersecurity, data, ddos, defense, encryption, firewall, gartner, group, guide, iam, identity, infosec, insurance, intelligence, malicious, mfa, microsoft, monitoring, privacy, risk, saas, service, software, strategy, threat, usaThales and Imperva Win Big in 2024 madhav Fri, 12/13/2024 – 09:36 At Thales and Imperva, we are driven by our commitment to make the world safer, and nothing brings us more satisfaction than protecting our customers from daily cybersecurity threats. But that doesn’t mean we don’t appreciate winning the occasional award. In the year…
-
Russia Used Borrowed Spyware to Target Ukrainian Troops
Secret Blizzard Used Third-party Amadey Bots to Hack Ukrainian Military Devices. A Russian state-backed hacker group used third-party data-stealing bots and possibly a backdoor used by another Russia-based threat group to infiltrate and spy on devices used by frontline Ukrainian military units, according to a report from the Microsoft threat intelligence team. First seen on…
-
Silent Push Raises $10 Million for Preemptive Threat Intelligence Platform
Threat intel startup Silent Push has raised $10 million in a funding round co-led by Ten Eleven Ventures and Stepstone Group LP. The post Silent Push Raises $10 Million for Preemptive Threat Intelligence Platform appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/silent-push-raises-10-million-for-preemptive-threat-intelligence-platform/
-
Cyberbedrohungen 2025: Eskalationsstufe Rot
Cyberkriminelle rüsten auf. Für das Jahr 2025 und darüber hinaus erwarten die Forscher der FortiGuard Labs, Fortinets Threat-Intelligence- und Forschungssparte, größere, dreistere und effektivere Cyberangriffe. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/cyberbedrohungen-2025-eskalationsstufe-rot
-
US Defense Bill Includes Major Focus on Tech, AI and Cyber
Defense Bill Targets Key Investments in AI, Cybersecurity and Quantum Technologies. An $895 billion National Defense Authorization Act features key provisions for significant investments in artificial intelligence, cybersecurity and quantum technology, including initiatives aimed at enhancing the Pentagon’s technological capabilities. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/us-defense-bill-includes-major-focus-on-tech-ai-cyber-a-27028
-
The imperative for governments to leverage genAI in cyber defense
Tags: ai, attack, cyber, cyberattack, cybersecurity, dark-web, data, deep-fake, defense, detection, email, endpoint, gartner, government, incident response, infrastructure, intelligence, LLM, malicious, malware, microsoft, strategy, tactics, threat, tool, training, vulnerabilityIn an era where cyber threats are evolving at an unprecedented pace, the need for robust cyber defense mechanisms has never been more critical. Sixty-two percent of all cyberattacks focus on public sector organizations directly and indirectly. Nation-state actors, equipped with generative artificial intelligence (genAI) sophisticated tools and techniques, pose significant threats to national security,…
-
US sanctions Chinese cybersecurity firm over global malware campaign
Tags: attack, breach, china, computer, control, corporate, credentials, cve, cyber, cyberattack, cybersecurity, email, encryption, exploit, finance, firewall, fraud, government, group, healthcare, identity, infection, infrastructure, intelligence, international, malicious, malware, monitoring, network, office, password, ransomware, risk, service, software, sophos, technology, terrorism, threat, tool, vulnerability, zero-dayThe US government has imposed sanctions on Chinese cybersecurity firm Sichuan Silence Information Technology and one of its employees, Guan Tianfeng, for their alleged involvement in a 2020 global cyberattack that exploited zero day vulnerabilities in firewalls.The actions were announced by the US Department of the Treasury and the Department of Justice (DOJ), which also…
-
KI-gestützte Verteidigungsagenten
KnowBe4 kündigte eine neue innovative Suite von KI-nativen Sicherheitsagenten zur Automatisierung und Verbesserung des menschlichen Risikomanagements an AIDA. AIDA (Artificial-Intelligence-Defense-Agent) ist eine Suite von Agenten, die den Ansatz des menschlichen Risikomanagements verbessert, indem sie mehrere KI-Technologien nutzt, um personalisierte, adaptive und hochwirksame Trainings für alle Endbenutzer zu erstellen, die das Verhalten tatsächlich ändern. Der […]…
-
Varonis offeriert mehr Datensicherheit für die DataPlattform von Databricks
Der Spezialist für datenzentrierte Cybersicherheit, Varonis Systems, baut die Abdeckung seiner Datensicherheitsplattform auf Databricks aus. Auf diese Weise können auch kritische Daten der Data-Intelligence-Plattform kontinuierlich identifiziert und klassifiziert, Gefährdungen beseitigt sowie Bedrohungen erkannt und gestoppt werden. Tausende Unternehmen weltweit setzten auf Databricks bei der Erstellung, Bereitstellung, gemeinsamen Nutzung und Wartung von Daten, Analysen und KI-Lösungen.…
-
EDR-Software ein Kaufratgeber
Tags: ai, android, api, backup, browser, chrome, cloud, computing, crowdstrike, cyberattack, detection, edr, endpoint, firewall, identity, incident response, intelligence, iot, kubernetes, linux, macOS, mail, malware, microsoft, network, ransomware, risk, siem, soar, software, sophos, threat, tool, windows, zero-day -
Previewing Black Hat Europe 2024 in London: 20 Hot Sessions
From Automotive Exploits and Bootloader Bugs to Cybercrime and ‘LLMbotomy’ Trojans Black Hat Europe returns to London with more than 45 keynotes and briefings tackling everything from bootloader bugs and flaws in artificial intelligence and large language model tools, to disrupting fake online brokerages and remotely hacking Volkswagen entertainment systems to track vehicles. First seen…
-
9th December Threat Intelligence Report
Romania’s Constitutional Court annulled the first round of its presidential election after declassified intelligence revealed Russian interference favoring right wing candidate Călin Georgescu. The interference involved a sophisticated social media campaign on […] First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2024/9th-december-threat-intelligence-report/
-
Researchers Uncover Prompt Injection Vulnerabilities in DeepSeek and Claude AI
Details have emerged about a now-patched security flaw in the DeepSeek artificial intelligence (AI) chatbot that, if successfully exploited, could permit a bad actor to take control of a victim’s account by means of a prompt injection attack.Security researcher Johann Rehberger, who has chronicled many a prompt injection attack targeting various AI tools, found that…
-
Unmasking Termite, the Ransomware Gang Claiming the Blue Yonder Attack
This new ransomware group is likely a new variant of Babuk, said Cyble threat intelligence analysts First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/termite-ransomware-blue-yonder/
-
The EU Makes an Urgent TikTok Inquiry on Russia’s Role in Romanian Election Turmoil
EU sent TikTok an urgent request for more information about Romanian intelligence files suggesting that Russia coordinated influencers to promote a candidate who became the surprise front-runner in presidential election. The post The EU Makes an Urgent TikTok Inquiry on Russia’s Role in Romanian Election Turmoil appeared first on SecurityWeek. First seen on securityweek.com Jump…

