- Security News
- Universities are at risk of email-based impersonation attacks [Help Net Security, Help Net Security]
- Phishers use custom phishing kit to hijack MFA-protected enterprise Microsoft accounts [Zeljka Zorz, Help Net Security]
- Users Still in the Dark Over $5m Theft From Blockchain Firm Solana [Phil Muncaster, Info security]
- US Federal Communications Commission warns of the rise of smishing attacks [Pierluigi Paganini, Security Affairs]
- Dark Web Research Suggests 87% of Ransomware Brands Exploit Malicious Macros [Alessandro Mascellino, Info security]
- Chinese Hackers Using New Manjusaka Hacking Framework Similar to Cobalt Strike [Ravie Lakshmanan, The Hacker News]
- Malware
- One-third of organizations experience weekly ransomware attacks [Security Magazine, Security Magazine]
- Lockbit ransomware gang claims to have breached the Italian Revenue Agency [Pierluigi Paganini, Security Affairs]
- A Growing Number of Malware Attacks Leveraging Dark Utilities ‘C2-as-a-Service’ [Ravie Lakshmanan, The hacker news]
- A Bunch of Android Apps Spread Adware and Other Malware [Cyware, Cyware]
- Vulnerabilities and Patches
- Hackers Exploit Atlassian Confluence Vulnerability to Deploy New ‘Ljl’ Backdoor [Sergiu Gatlan, BleepingComputer]
- Google Paid Out $90,000 for Vulnerabilities Patched by Chrome 104 [Eduard Kovacs, Security Week]
- Google Patches Critical Android Flaw Allowing Remote Code Execution via Bluetooth [Security Curated, Security Curated]
- 29 models of DrayTek routers impacted by critical RCE vulnerability [Blossom Hazarika, TheTechOutlook]
- Critical flaws found in four Cisco SMB router ranges for the second time this year [Simon Sharwood, The Register]
- CISA Adds Zimbra Email Vulnerability to its Exploited Vulnerabilities Catalog [Sacut, Sacut]
- Others
- Securing Your Move to the Hybrid Cloud [Rani Osnat, Threatpost]
- New Traffic Light Protocol standard released after five years [Sergiu Gatlan, BleepingComputer]
- 6 ways your cloud data security policies are slowing innovation and how to avoid that [Rob Geurtsen, Help Net Security]
- How to minimize your exposure to supply chain attacks [Vumetric Cyber Portal, Vumetric Cyber Portal]
- Be careful where you install software, and who installs it [Richard Speed, The Register]
C410 A2BE CB73 EF77 746E 9682 E2C4 91CE D20D 800F