Results suggest the attack was executed using tools and techniques associated with Chinese APTs.
Christmas Warning: Threat Actors Impersonate your Favorite Brands to Attack, Finds CSC
Majority of third-party domain names impersonating the biggest global brands use domain privacy services, indicating the owner’s intention to mask their identity
Swiss Government Wants to Implement Mandatory Duty to Report Cyber-Attacks
The move would shed light on hackers and sound the alarm more widely on cyber-threats in the country.
Threat Actors Use Malicious File Systems to Scale Crypto-Mining Operations
The hackers used PRoot to increase the scope of their operations to several Linux distributions
Elevate Streaming Media with EdgeWorkers and Macrometa Stream Workers
Elevate players? gaming experiences with Akamai EdgeWorkers and Macrometa Stream Workers.
Gen Z Internet Users “Normalize” Cybercrime – Report
EU-funded study finds concerning levels of risky behavior
Russian Hackers Use Western Networks to Attack Ukraine
Lupovis used decoys to find out more about threat actors
Prolific Chinese Hackers Stole US COVID funds
Secret Service says discovery may be the tip of the iceberg
Kali Linux 2022.4 Release (Azure, Social & Kali NetHunter Pro)
Before the year is over, we thought it was best to get the final 2022 release out. Today we are publishing Kali Linux 2022.4. This is ready for immediate download or updating existing installations.
A summary of the changelog since August’s 2022….
Rackspace Admits Security Incident, Helps Customers Migrate to Microsoft 365 Accounts
The known impact was isolated to a portion of the firm’s Hosted Exchange platform