Cybersec Feeds Overview, Jan 6 - Jan 12, 2025 #
This brief consolidates key updates from 80+ sources, including government organizations, cybersecurity vendors, threat intelligence teams, security research labs, and blogs from cybersecurity communities and professionals. It highlights the most significant threats, vulnerabilities, and developments from the past week to keep you informed.
Gov Feeds #
Multiple vulnerabilities in SonicWall SonicOS could allow remote attackers to bypass authentication, which may lead to the unauthorized viewing, changing, or deletion of data (Multiple vulnerabilities in SonicWall SonicOS could allow a remote attacker to bypass authentication).
Ivanti products have critical vulnerabilities leading to potential remote code execution. CVE-2025-0282, related to Ivanti Connect Secure, is actively exploited, urging immediate mitigation actions (Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution, CISA Adds One Vulnerability to the KEV Catalog).
CISA released Industrial Control Systems (ICS) advisories for products from Schneider Electric, Delta Electronics, and ABB featuring significant vulnerabilities including remote code execution risks (CISA Releases Four Industrial Control Systems Advisories, CISA Releases Two Industrial Control Systems Advisories).
The Cybersecurity Performance Goals Adoption Report by CISA emphasizes the impact of adopting Cybersecurity Performance Goals (CPGs) across four critical infrastructure sectors, promoting stronger defenses through best practices (CISA Releases the Cybersecurity Performance Goals Adoption Report).
The presence of numerous vulnerabilities in ABB’s ASPECT-Enterprise, NEXUS, and MATRIX series highlights a high-risk situation with several exploits potentially compromising operations, requiring urgent security measures (ABB ASPECT-Enterprise, NEXUS, and MATRIX Series Products).
Active exploitation of stack overflow vulnerabilities in Ivanti Connect Secure demonstrates ongoing threats to edge devices, prompting immediate actions to mitigate against these high-impact vulnerabilities (CTO at NCSC Summary: week ending January 12th).
Articles #
- Multiple vulnerabilities in SonicWall SonicOS could allow a remote attacker to bypass authentication. by Cyber Security Advisories - MS-ISAC on Thu, 09 Jan 2025 18:54:10 -0500
- Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution by Cyber Security Advisories - MS-ISAC on Thu, 09 Jan 2025 00:21:32 -0500
- CISA Releases the Cybersecurity Performance Goals Adoption Report by All CISA Advisories on Fri, 10 Jan 25 12:00:00 +0000
- CISA Releases Four Industrial Control Systems Advisories by All CISA Advisories on Fri, 10 Jan 25 12:00:00 +0000
- Schneider Electric Harmony HMI and Pro-face HMI Products by All CISA Advisories on Fri, 10 Jan 25 12:00:00 +0000
- Delta Electronics DRASimuCAD by All CISA Advisories on Fri, 10 Jan 25 12:00:00 +0000
- Schneider Electric PowerChute Serial Shutdown by All CISA Advisories on Fri, 10 Jan 25 12:00:00 +0000
- CISA Adds One Vulnerability to the KEV Catalog by All CISA Advisories on Wed, 08 Jan 25 12:00:00 +0000
- Ivanti Releases Security Updates for Connect Secure, Policy Secure, and ZTA Gateways by All CISA Advisories on Wed, 08 Jan 25 12:00:00 +0000
- CISA Adds Three Known Exploited Vulnerabilities to Catalog by All CISA Advisories on Tue, 07 Jan 25 12:00:00 +0000
- CISA Releases Two Industrial Control Systems Advisories by All CISA Advisories on Tue, 07 Jan 25 12:00:00 +0000
- ABB ASPECT-Enterprise, NEXUS, and MATRIX Series Products by All CISA Advisories on Tue, 07 Jan 25 12:00:00 +0000
- Nedap Librix Ecoreader by All CISA Advisories on Tue, 07 Jan 25 12:00:00 +0000
- CTO at NCSC Summary: week ending January 12th by CTO at NCSC - Cyber Defence Analysis on Sat, 11 Jan 2025 12:46:53 GMT
Vendor Feeds #
The FunkSec ransomware group emerged in late 2024, rapidly gaining prominence by claiming over 85 victims in December. This group uses AI-assisted malware development, complicating traditional assessments and highlighting the necessity for more objective evaluation techniques (FunkSec – Alleged Top Ransomware Group Powered by AI).
The AhnLab report highlights a significant rise in ransomware and dark web activities, including a new ransomware gang called Morpheus and the return of a hacktivist group named Anonymous Sudan. Data breaches are being monetized on BreachForums (Ransom & Dark Web Issues Week 2, January 2025).
Increasing exploitations of Ivanti Connect Secure vulnerabilities have been noted, with CVE-2025-0282 being exploited as a zero-day in the wild. This underscores the need for immediate and comprehensive patch management across network devices (CVE-2025-0282: Ivanti Connect Secure Zero-Day Vulnerability Exploited In The Wild).
New cybersecurity threats targeting macOS users have been observed, such as the Banshee stealer, which uses a string encryption algorithm similar to Apple’s XProtect. The platform remains vulnerable due to the prevalence of phishing and lack of user awareness (Banshee: The Stealer That “Stole Code” From MacOS XProtect).
There is a reported trend of cyberattacks targeting critical infrastructure systems, including water utilities, which continue to be exploited due to poor cyber hygiene practices. These vulnerabilities threaten public safety and national security and call for improved collaboration to bolster defenses (Is the water safe? The state of critical infrastructure cybersecurity).
A significant attack on Slovakia’s land registry, reportedly the largest in the nation’s history, has majorly disrupted real estate and mortgage markets. The attack is linked to geopolitical tensions (Slovakia’s land registry hit by biggest cyberattack in country’s history, minister says).
The malware threat landscape continues to evolve, with a notable rise in the distribution of AutoIt compiled malware via phishing emails, and the use of infostealer LummaC2 spreading through fake CAPTCHA verification pages (Increase in Distribution of AutoIt Compile Malware via Phishing Emails, Infostealer LummaC2 Spreading Through Fake CAPTCHA Verification Page).
Articles #
- Android Malware & Security Issue 2st Week of January, 2025 by ASEC on Thu, 09 Jan 2025 15:00:00 +0000
- Statistical Report on Phishing Emails in Q4 2024 by ASEC on Thu, 09 Jan 2025 15:00:00 +0000
- Ransom & Dark Web Issues Week 2, January 2025 by ASEC on Wed, 08 Jan 2025 15:00:00 +0000
- Security Issues in the Financial Sector in December 2024 by ASEC on Wed, 08 Jan 2025 15:00:00 +0000
- Increase in Distribution of AutoIt Compile Malware via Phishing Emails by ASEC on Wed, 08 Jan 2025 15:00:00 +0000
- December 2024 Threat Trend Report on APT Attacks (South Korea) by ASEC on Tue, 07 Jan 2025 15:00:00 +0000
- Infostealer LummaC2 Spreading Through Fake CAPTCHA Verification Page by ASEC on Tue, 07 Jan 2025 15:00:00 +0000
- Weekly Detection Rule (YARA and Snort) Information – Week 2, January 2025 by ASEC on Tue, 07 Jan 2025 15:00:00 +0000
- December 2024 Threat Trend Report on Ransomware by ASEC on Tue, 07 Jan 2025 15:00:00 +0000
- Statistical Report on Malware Threat in Q4 2024 by ASEC on Tue, 07 Jan 2025 15:00:00 +0000
- 9 More Predictions for 2025 by Broadcom Software Blogs on Thu, 09 Jan 2025 21:34:39 +0000
- The 3-Step Configuration Review by Broadcom Software Blogs on Thu, 09 Jan 2025 14:48:31 +0000
- FunkSec – Alleged Top Ransomware Group Powered by AI by Check Point Research on Fri, 10 Jan 2025 12:00:00 +0000
- Banshee: The Stealer That “Stole Code” From MacOS XProtect by Check Point Research on Thu, 09 Jan 2025 14:08:01 +0000
- 6th January– Threat Intelligence Report by Check Point Research on Mon, 06 Jan 2025 13:26:22 +0000
- Phish-free PayPal Phishing by Fortinet Threat Research Blog on Wed, 8 Jan 2025 14:00:00 +0000
- Is the water safe? The state of critical infrastructure cybersecurity by Security Intelligence on Fri, 10 Jan 2025 15:35:00 +0000
- Cybersecurity trends: IBM’s predictions for 2025 by Security Intelligence on Thu, 09 Jan 2025 14:00:00 +0000
- Cloud threat report: Why have SaaS platforms on dark web marketplaces decreased? by Security Intelligence on Wed, 08 Jan 2025 14:00:00 +0000
- Mobile device security: Why protection is critical in the hybrid workforce by Security Intelligence on Tue, 07 Jan 2025 14:00:00 +0000
- EAGERBEE, with updated and novel components, targets the Middle East by Securelist on Mon, 06 Jan 2025 08:00:07 +0000
- Seven Trends to Watch for in 2025 by LevelBlue Blogs on 2025-01-09T07:00:00+00:00
- Google’s Willow Quantum Chip and Its Potential Threat to Current Encryption Standards by LevelBlue Blogs on 2025-01-08T07:00:00+00:00
- BayMark Health Services sends breach notifications after ransomware attack by Malwarebytes on Fri, 10 Jan 2025 16:27:09 GMT
- Google Chrome AI extensions deliver info-stealing malware in broad attack by Malwarebytes on Thu, 09 Jan 2025 16:35:07 GMT
- Massive breach at location data seller: “Millions” of users affected by Malwarebytes on Thu, 09 Jan 2025 15:21:57 GMT
- GroupGreeting e-card site attacked in “zqxq” campaign by Malwarebytes on Thu, 09 Jan 2025 14:00:00 GMT
- US Cyber Trust Mark logo for smart devices is coming by Malwarebytes on Wed, 08 Jan 2025 17:35:39 GMT
- AI-supported spear phishing fools more than 50% of targets by Malwarebytes on Tue, 07 Jan 2025 17:30:15 GMT
- Dental group lied through teeth about data breach, fined $350,000 by Malwarebytes on Mon, 06 Jan 2025 17:49:20 GMT
- Some weeks in security (December 16 – January 5) by Malwarebytes on Mon, 06 Jan 2025 08:11:32 GMT
- Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response by Microsoft Security Blog on Mon, 06 Jan 2025 17:00:00 +0000
- Protecting Web-Based Work by Palo Alto Networks Blog on Wed, 08 Jan 2025 14:00:39 +0000
- Proofpoint Named a Leader in 2024 Gartner Magic Quadrant for Digital Communications Governance and Archiving Solutions by Proofpoint News Feed on 09 Jan 2025 11:13:38
- Beyond the Hype: How to Set Up Your AI Project for Real Success by Proofpoint News Feed on 08 Jan 2025 12:35:27
- Digital transformation 2025: What’s in, what’s out by Proofpoint News Feed on 07 Jan 2025 12:33:48
- Malware metamorphosis: 2024 reflections and 2025 predictions. by Proofpoint News Feed on 07 Jan 2025 12:28:12
- Assemblyline 101 - Open Source Malware Triage by Pulsedive Blog on Tue, 07 Jan 2025 17:16:39 GMT
- Marijuana dispensary STIIIZY warns of leaked IDs after November data breach by The Record from Recorded Future News on Fri, 10 Jan 2025 21:43:36 GMT
- NSO ruling is a victory for WhatsApp, but could have a small impact on spyware industry by The Record from Recorded Future News on Fri, 10 Jan 2025 20:14:13 GMT
- New York sues to recover $2 million in crypto stolen in remote job scams by The Record from Recorded Future News on Fri, 10 Jan 2025 19:55:39 GMT
- Russian nationals arrested by US, accused of running crypto mixers Blender and Sinbad by The Record from Recorded Future News on Fri, 10 Jan 2025 17:54:16 GMT
- Slovakia’s land registry hit by biggest cyberattack in country’s history, minister says by The Record from Recorded Future News on Fri, 10 Jan 2025 17:27:08 GMT
- RST TI Report Digest: 06 Jan 2025 by Stories by RST Cloud on Medium on Mon, 06 Jan 2025 03:24:24 GMT
- Part 15: Function Type Categories by Posts By SpecterOps Team Members - Medium on Tue, 07 Jan 2025 16:06:36 GMT
- ADFS — Living in the Legacy of DRS by Posts By SpecterOps Team Members - Medium on Tue, 07 Jan 2025 13:57:32 GMT
- CVE-2025-0282: Ivanti Connect Secure Zero-Day Vulnerability Exploited In The Wild by Tenable Blog on Wed, 08 Jan 2025 14:16:44 -0500
- Looking at the Attack Surfaces of the Sony XAV-AX8500 Part 2 by Zero Day Initiative - Blog on Fri, 10 Jan 2025 16:13:26 +0000
- Looking at the Attack Surfaces of the Sony XAV-AX8500 by Zero Day Initiative - Blog on Thu, 09 Jan 2025 16:30:02 +0000
- ZDI Threat Hunting 2024: Highlights, Trends, & Challenges by Zero Day Initiative - Blog on Wed, 08 Jan 2025 17:07:59 +0000
- Innovating to Secure Software Supply Chains: Veracode Acquires Phylum, Inc. Technology for Enhanced Software Composition Analysis by Application Security Research, News, and Education Blog on Mon, 06 Jan 2025 10:38:18 -0500
- Research that builds detections by VirusTotal Blog on 2025-01-09T09:51:00.001+01:00
News Feeds #
Cybercriminals continue to deploy sophisticated phishing tactics, including fake job offers and proof-of-concept (PoC) exploits, to distribute malware such as infostealers and cryptominers, impersonating legitimate organizations to deceive victims and compromising security researchers for intelligence (Phishing texts trick Apple iMessage users into disabling protection, Fake LDAPNightmware exploit on GitHub spreads infostealer malware, Fake CrowdStrike Recruiters Distribute Malware Via Phishing Emails, Fake PoC Exploit Targets Cybersecurity Researchers with Malware).
Significant ransomware and malware threats continue to evolve and target critical sectors, with new strains like HexaLocker V2 incorporating dual-extortion tactics, and malware like Banshee Stealer specifically targeting macOS users via deceptive distribution methods (HexaLocker V2 Introduces Powerful New Mechanisms, Banshee Stealer Hits macOS Users via Fake GitHub Repositories).
High-profile data breaches have led to the exposure of sensitive information, impacting organizations across various sectors including telecommunications and healthcare, highlighting ongoing vulnerabilities and the need for robust incident response capabilities (Telefónica confirms internal ticketing system breach after data leak, BayMark Health Services Reports Data Breach, Exposing Patient Information).
Cybersecurity for critical infrastructure is emphasized with reports of vulnerabilities in products used widely across crucial sectors. For example, CISA continues to promote cyber hygiene programs, boosting enrollment and reducing exploitable vulnerabilities in critical systems (CISA report touts cyber hygiene enrollment surge for critical infrastructure orgs, New zero-day exploit targets Ivanti VPN product).
Deceptive tactics, such as spoofed domains in spam campaigns and unauthorized use of expired digital infrastructure by hackers, are prevalent cybersecurity threats, enabling attackers to exploit and expand their reach effortlessly (Muddling Meerkat Linked to Domain Spoofing in Global Spam Scams, Thousands of Live Hacker Backdoors Found in Expired Domains).
The international threat landscape remains tense, with state-backed groups from nations like China and Russia involved in espionage and financial laundering activities through cyber channels, affecting government agencies and private corporations globally (Treasury hackers also breached US foreign investments review office, Russian nationals charged with operating crypto mixers that masked cybercrime funds).
AI continues to shape both cybersecurity strategies and cybercrime tactics, requiring security teams to adopt AI-driven measures for defense and to anticipate evolving threats as AI technologies advance (How AI will transform cybersecurity in 2025 - and supercharge cybercrime).
Articles #
- Phishing texts trick Apple iMessage users into disabling protection by BleepingComputer on Sun, 12 Jan 2025 14:31:01 -0500
- Pastor who saw crypto project in his “dream” indicted for fraud by BleepingComputer on Sun, 12 Jan 2025 10:09:19 -0500
- Scammers file first — Get your IRS Identity Protection PIN now by BleepingComputer on Sat, 11 Jan 2025 11:44:20 -0500
- Fake LDAPNightmware exploit on GitHub spreads infostealer malware by BleepingComputer on Sat, 11 Jan 2025 10:21:31 -0500
- Telefónica confirms internal ticketing system breach after data leak by BleepingComputer on Fri, 10 Jan 2025 14:15:09 -0500
- New Web3 attack exploits transaction simulations to steal crypto by BleepingComputer on Fri, 10 Jan 2025 13:12:17 -0500
- US charges operators of cryptomixers linked to ransomware gangs by BleepingComputer on Fri, 10 Jan 2025 12:59:25 -0500
- Treasury hackers also breached US foreign investments review office by BleepingComputer on Fri, 10 Jan 2025 12:02:49 -0500
- Docker Desktop blocked on Macs due to false malware alert by BleepingComputer on Fri, 10 Jan 2025 11:37:59 -0500
- Proton worldwide outage caused by Kubernetes migration, software change by BleepingComputer on Fri, 10 Jan 2025 10:55:54 -0500
- STIIIZY data breach exposes cannabis buyers’ IDs and purchases by BleepingComputer on Fri, 10 Jan 2025 10:19:50 -0500
- Microsoft to force install new Outlook on Windows 10 PCs in February by BleepingComputer on Fri, 10 Jan 2025 09:12:52 -0500
- UAE to take center stage in AI Innovation with the launch of Dubai AI Week by Glovo apuesta por una experiencia fluida y eficiente para el usuario gracias a la tecnología | CIO on Sun, 12 Jan 2025 13:27:36 +0000
- Saudi Arabia’s deep tech startup ecosystem thrives with focus on AI and IoT, fueling Vision 2030 by Glovo apuesta por una experiencia fluida y eficiente para el usuario gracias a la tecnología | CIO on Sun, 12 Jan 2025 13:14:17 +0000
- AI will transform the enterprise ‘in a generation,’ say CDOs by Glovo apuesta por una experiencia fluida y eficiente para el usuario gracias a la tecnología | CIO on Fri, 10 Jan 2025 18:07:37 +0000
- Las empresas, dispuestas a gastar hasta 250 millones en IA generativa a pesar de las dificultades para alcanzar el ROI by Glovo apuesta por una experiencia fluida y eficiente para el usuario gracias a la tecnología | CIO on Fri, 10 Jan 2025 11:45:29 +0000
- El Hospital General de Granollers acelera el diagnóstico de ictus gracias a la IA by Glovo apuesta por una experiencia fluida y eficiente para el usuario gracias a la tecnología | CIO on Fri, 10 Jan 2025 11:12:47 +0000
- Enterprises willing to spend up to $250 million on gen AI, but ROI remains elusive by Glovo apuesta por una experiencia fluida y eficiente para el usuario gracias a la tecnología | CIO on Fri, 10 Jan 2025 10:50:28 +0000
- The 10 most in-demand tech jobs for 2025 — and how to hire for them by Glovo apuesta por una experiencia fluida y eficiente para el usuario gracias a la tecnología | CIO on Fri, 10 Jan 2025 10:01:00 +0000
- Tableau certification guide: How to boost your data analytics skills by Glovo apuesta por una experiencia fluida y eficiente para el usuario gracias a la tecnología | CIO on Fri, 10 Jan 2025 10:00:00 +0000
- Russian nationals charged with operating crypto mixers that masked cybercrime funds by CyberScoop on Fri, 10 Jan 2025 22:09:24 +0000
- CISA report touts cyber hygiene enrollment surge for critical infrastructure orgs by CyberScoop on Fri, 10 Jan 2025 22:04:02 +0000
- What is ‘security theater’ and how can we move beyond it? by CyberScoop on Fri, 10 Jan 2025 14:23:34 +0000
- Microsoft moves to disrupt hacking-as-a-service scheme that’s bypassing AI safety measures by CyberScoop on Fri, 10 Jan 2025 05:00:00 +0000
- FCC moves to tighten industry reporting rules for robocalls by CyberScoop on Thu, 09 Jan 2025 19:10:55 +0000
- New zero-day exploit targets Ivanti VPN product by CyberScoop on Thu, 09 Jan 2025 17:09:03 +0000
- Malicious hackers have their own shadow IT problem by CyberScoop on Wed, 08 Jan 2025 20:40:44 +0000
- National Cyber Director Harry Coker looks back (and ahead) on the Cyber Director office by CyberScoop on Wed, 08 Jan 2025 00:52:51 +0000
- White House launches cybersecurity label program for consumers by CyberScoop on Tue, 07 Jan 2025 17:38:54 +0000
- Android patches several vulnerabilities in first security update of 2025 by CyberScoop on Tue, 07 Jan 2025 15:40:28 +0000
- Threat Actors Exploit a Critical Ivanti RCE Bug, Again by darkreading on Fri, 10 Jan 2025 22:37:54 GMT
- Fake CrowdStrike ‘Job Interviews’ Become Latest Hacker Tactic by darkreading on Fri, 10 Jan 2025 20:53:13 GMT
- Russia Carves Out Commercial Surveillance Success Globally by darkreading on Fri, 10 Jan 2025 20:22:31 GMT
- The Path Toward Championing Diversity in Cybersecurity Education by darkreading on Fri, 10 Jan 2025 15:00:00 GMT
- Chinese APT Group Is Ransacking Japan’s Secrets by darkreading on Fri, 10 Jan 2025 02:00:00 GMT
- Banshee 2.0 Malware Steals Apple’s Encryption to Hide on Macs by darkreading on Thu, 09 Jan 2025 22:47:15 GMT
- Hacking Group ‘Silk Typhoon’ Linked to US Treasury Breach by darkreading on Thu, 09 Jan 2025 21:11:38 GMT
- New AI Challenges Will Test CISOs & Their Teams in 2025 by darkreading on Thu, 09 Jan 2025 15:00:00 GMT
- India Readies Overhauled National Data Privacy Rules by darkreading on Thu, 09 Jan 2025 02:00:00 GMT
- Fed ‘Cyber Trust’ Label: Good Intentions That Fall Short by darkreading on Wed, 08 Jan 2025 22:25:17 GMT
- CrowdStrike Achieves FedRAMP Authorization for New Modules by darkreading on Wed, 08 Jan 2025 22:20:59 GMT
- Trend Micro and Intel Innovate to Weed Out Covert Threats by darkreading on Wed, 08 Jan 2025 22:09:40 GMT
- Zivver Report Reveals Critical Challenges in Email Security for 2025 by darkreading on Wed, 08 Jan 2025 22:02:29 GMT
- Palindrome Technologies Approved as Cybersecurity Label Administrator for FCC’s IoT Program by darkreading on Wed, 08 Jan 2025 21:43:48 GMT
- Green Bay Packers’ Online Pro Shop Sacked by Payment Skimmer by darkreading on Wed, 08 Jan 2025 21:40:27 GMT
- New Docuseries Spotlights Hackers Who Shaped Cybersecurity by darkreading on Wed, 08 Jan 2025 18:06:34 GMT
- Unconventional Cyberattacks Aim to Take Over PayPal Accounts by darkreading on Wed, 08 Jan 2025 16:07:08 GMT
- Best Practices & Risks Considerations in LCNC and RPA Automation by darkreading on Wed, 08 Jan 2025 15:00:00 GMT
- Ransomware Targeting Infrastructure Hits Telecom Namibia by darkreading on Wed, 08 Jan 2025 07:00:00 GMT
- 1Password Acquires SaaS Access Management Provider Trelica by darkreading on Tue, 07 Jan 2025 23:25:51 GMT
- Sharing of Telegram User Data Surges After CEO Arrest by darkreading on Tue, 07 Jan 2025 22:42:45 GMT
- Pentagon Adds Chinese Gaming Giant Tencent to Federal Ban by darkreading on Tue, 07 Jan 2025 20:49:15 GMT
- CISA: Third-Party Data Breach Limited to Treasury Dept. by darkreading on Tue, 07 Jan 2025 17:20:00 GMT
- PhishWP Plug-in Hijacks WordPress E-Commerce Checkouts by darkreading on Tue, 07 Jan 2025 15:58:11 GMT
- Name That Edge Toon: Greetings and Salutations by darkreading on Tue, 07 Jan 2025 15:38:11 GMT
- Cybercriminals Don’t Care About National Cyber Policy by darkreading on Tue, 07 Jan 2025 15:00:00 GMT
- Veracode Buys Package Analysis Technology From Phylum by darkreading on Tue, 07 Jan 2025 01:28:48 GMT
- In Appreciation: Amit Yoran, Tenable CEO, Passes Away by darkreading on Mon, 06 Jan 2025 22:15:29 GMT
- China’s Salt Typhoon Adds Charter, Windstream to Telecom Victim List by darkreading on Mon, 06 Jan 2025 21:39:46 GMT
- FireScam Android Spyware Campaign Poses ‘Significant Threat Worldwide’ by darkreading on Mon, 06 Jan 2025 21:12:00 GMT
- EagerBee Backdoor Takes Flight Against Mideast ISPs, Government Targets by darkreading on Mon, 06 Jan 2025 19:42:30 GMT
- IoT’s Regulatory Reckoning Is Overdue by darkreading on Mon, 06 Jan 2025 15:00:00 GMT
- Will AI Code Generators Overcome Their Insecurities This Year? by darkreading on Mon, 06 Jan 2025 14:33:58 GMT
- QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 10 Jan 2025 11:29:21 +0000
- Weaponized LDAP Exploit Deploys Information-Stealing Malware by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 10 Jan 2025 11:26:01 +0000
- New NonEuclid RAT Evades Antivirus and Encrypts Critical Files by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 10 Jan 2025 11:22:23 +0000
- Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data by GBHackers Security | #1 Globally Trusted Cyber Security News Platform on Fri, 10 Jan 2025 11:18:53 +0000
- The Metaverse Will Become More Popular Than the Real World: Will Reality Disappear? by Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News on Sun, 12 Jan 2025 22:07:13 +0000
- Fake CrowdStrike Recruiters Distribute Malware Via Phishing Emails by Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News on Sat, 11 Jan 2025 14:36:46 +0000
- Fake PoC Exploit Targets Cybersecurity Researchers with Malware by Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News on Sat, 11 Jan 2025 13:47:03 +0000
- Muddling Meerkat Linked to Domain Spoofing in Global Spam Scams by Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News on Sat, 11 Jan 2025 10:51:22 +0000
- Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways by Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News on Fri, 10 Jan 2025 21:21:27 +0000
- Banshee Stealer Hits macOS Users via Fake GitHub Repositories by Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News on Fri, 10 Jan 2025 11:21:15 +0000
- Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense by Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News on Thu, 09 Jan 2025 18:16:49 +0000
- Cybersecurity Risks in Crypto: Phishing, Ransomware and Other Emerging Threats by Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News on Thu, 09 Jan 2025 15:28:26 +0000
- Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace by Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News on Thu, 09 Jan 2025 15:00:12 +0000
- Thousands of Live Hacker Backdoors Found in Expired Domains by Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News on Thu, 09 Jan 2025 12:56:49 +0000
- Ransomware Gets Smarter: HexaLocker V2 Introduces Powerful New Mechanisms by The Cyber Express on Fri, 10 Jan 2025 09:29:43 +0000
- Cyble Dominates G2 Winter 2025 Report as a Leader Across Various Verticals of Cybersecurity by The Cyber Express on Fri, 10 Jan 2025 08:30:54 +0000
- $12.9 Billion Opportunity: India’s Cybersecurity Market Set to Explode by 2030 by The Cyber Express on Fri, 10 Jan 2025 08:29:55 +0000
- BayMark Health Services Reports Data Breach, Exposing Patient Information by The Cyber Express on Fri, 10 Jan 2025 07:20:36 +0000
- How CISA Is Fighting Back Against Rising Threats in Schools by The Cyber Express on Fri, 10 Jan 2025 05:53:40 +0000
- Meet, Learn, Dominate: 10 Cybersecurity Conferences You Need to Be At in 2025 by The Cyber Express on Thu, 09 Jan 2025 12:21:45 +0000
- The Good, the Bad, and the Vulnerable: Highlights from Australia’s 2024 Cybersecurity Report by The Cyber Express on Thu, 09 Jan 2025 12:01:41 +0000
- Why CISOs Need Full Board Support to Tackle Today’s Cyber Threats by The Cyber Express on Thu, 09 Jan 2025 09:38:57 +0000
- The best VPN for streaming in 2025: Expert tested and reviewed by Latest stories for ZDNET in Security on Fri, 10 Jan 2025 20:32:24 GMT
- The best travel VPNs of 2025: Expert tested and reviewed by Latest stories for ZDNET in Security on Fri, 10 Jan 2025 19:48:00 GMT
- Using a VPN is no longer enough. Protect your entire network with WireGuard - here’s how by Latest stories for ZDNET in Security on Fri, 10 Jan 2025 15:07:29 GMT
- How AI will transform cybersecurity in 2025 - and supercharge cybercrime by Latest stories for ZDNET in Security on Fri, 10 Jan 2025 10:00:17 GMT
- How to encrypt any email - in Outlook, Gmail, and other popular services by Latest stories for ZDNET in Security on Thu, 09 Jan 2025 17:33:00 GMT
- We have named the 12 winners for the official Best of CES 2025 awards by Latest stories for ZDNET in Security on Thu, 09 Jan 2025 17:33:00 GMT
- Update Chrome and Firefox now to patch these critical security flaws by Latest stories for ZDNET in Security on Wed, 08 Jan 2025 16:06:00 GMT
- How to protect yourself from phishing attacks in Chrome and Firefox by Latest stories for ZDNET in Security on Wed, 08 Jan 2025 10:10:40 GMT
- Buying a smart home device? Look for this new cybersecurity seal - here’s why by Latest stories for ZDNET in Security on Tue, 07 Jan 2025 18:13:08 GMT
- 5 browser extension rules to live by to keep your system safe in 2025 by Latest stories for ZDNET in Security on Tue, 07 Jan 2025 09:53:00 GMT
- This iOS 18 feature shares your photos with Apple for analysis. Should you be worried? by Latest stories for ZDNET in Security on Mon, 06 Jan 2025 19:13:37 GMT
- Apple’s $95 million Siri settlement could mean a payout for you - here’s how much by Latest stories for ZDNET in Security on Mon, 06 Jan 2025 19:06:00 GMT
- McAfee’s new AI tool detects email and text scams before you fall for them by Latest stories for ZDNET in Security on Mon, 06 Jan 2025 17:46:09 GMT
- I found a malicious Chrome extension on my system - here’s how and what I did next by Latest stories for ZDNET in Security on Mon, 06 Jan 2025 16:32:00 GMT
Personal Feeds #
Security Operations Centers (SOCs) are facing key transformation drivers such as cloud migration, Managed Detection and Response (MDR) adoption, and DevOps evolution. SOCs must focus on data correlation and aggregation using SIEM and SOAR technologies to manage the complexity of distributed cloud environments effectively (Future of SOC: Transform the ‘How’).
Recent blockchain security incidents include vulnerabilities in token template code leading to price oracle exploits. These have highlighted the ongoing risks in decentralized finance (DeFi) platforms, similar to previous reentrancy attacks (BlockThreat - Week 1, 2025, BlockThreat - Week 52, 2024).
A zero-day vulnerability in Ivanti VPN is being actively exploited, underscoring the need for immediate patching and heightened monitoring of VPN infrastructure to prevent unauthorized access (Zero-Day Vulnerability in Ivanti VPN).
There is a resurgence of hacking activities targeting cryptocurrency platforms, with significant operations by law enforcement against ransomware groups such as LockBit, highlighting ongoing threats from ransomware-as-a-service platforms (Analysis of Counter-Ransomware Activities in 2024).
A sophisticated voice phishing operation is exploiting legitimate services from tech giants like Apple and Google, leveraging system-level messaging to deceive users. Organizations need to reinforce communication verification protocols and educate users about unsolicited contacts (A Day in the Life of a Prolific Voice Phishing Crew).
New developments in malware distribution, such as the CVE-2017-0199 vulnerability, chain steganography, and malicious loaders, indicate evolving infection tactics. Security teams should remain vigilant and update their threat detection and response strategies accordingly (2025-01-09: CVE-2017-0199 XLS –> HTA –> VBS –> Steganography –> DBatLoader/GuiLoader style malware).
Security data lakes are becoming more prevalent as organizations shift towards scalable, vendor-agnostic solutions using technologies like Apache Iceberg, which can facilitate seamless data integration and querying across various security tools (Icebergs in the Data Lake).
Articles #
- New Paper: “Future of SOC: Transform the ‘How’” (Paper 5) by Anton on Security - Medium on Fri, 10 Jan 2025 18:07:43 GMT
- BlockThreat - Week 1, 2025 by Blockchain Threat Intelligence on Thu, 09 Jan 2025 05:07:23 GMT
- BlockThreat - Week 52, 2024 by Blockchain Threat Intelligence on Thu, 09 Jan 2025 01:00:57 GMT
- 2025-01-09: CVE-2017-0199 XLS –> HTA –> VBS –> steganography –> DBatLoader/GuiLoader style malware by Malware-Traffic-Analysis.net - Blog Entries on Sat, 11 Jan 2025 07:23 +0000
- Analysis of Counter-Ransomware Activities in 2024 by @BushidoToken Threat Intel on 2025-01-12T04:52:00.000-08:00
- Cyber Deception: The Ultimate Game Changer for CISOs by CISO Tradecraft® Newsletter on Tue, 07 Jan 2025 17:00:47 GMT
- Most Popular Cyber Blogs from 2024 by Lohrmann on Cybersecurity on Sun, 12 Jan 2025 10:05:00 GMT
- Icebergs in the Data Lake by Detection at Scale on Mon, 06 Jan 2025 14:07:46 GMT
- Canadian man loses a cryptocurrency fortune to scammers – here’s how you can stop it happening to you by Graham Cluley on Fri, 10 Jan 2025 13:46:33 +0000
- Smashing Security podcast #399: Honey in hot water, and reset your devices by Graham Cluley on Thu, 09 Jan 2025 20:03:09 +0000
- Space Bears ransomware: what you need to know by Graham Cluley on Thu, 09 Jan 2025 18:17:32 +0000
- United Nations aviation agency hacked, recruitment database plundered by Graham Cluley on Thu, 09 Jan 2025 11:07:20 +0000
- The AI Fix #32: Agentic AI, killer robot fridges, and the robosexual revolution by Graham Cluley on Tue, 07 Jan 2025 19:10:26 +0000
- A Day in the Life of a Prolific Voice Phishing Crew by Krebs on Security on Tue, 07 Jan 2025 23:41:53 +0000
- Pro-Russia hackers NoName057 targets Italy again after Zelensky’s visit to the country by Security Affairs on Sun, 12 Jan 2025 20:39:21 +0000
- SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 28 by Security Affairs on Sun, 12 Jan 2025 18:45:37 +0000
- Security Affairs newsletter Round 506 by Pierluigi Paganini – INTERNATIONAL EDITION by Security Affairs on Sun, 12 Jan 2025 18:02:51 +0000
- How a researcher earned $100,000 hacking a Facebook server by Security Affairs on Sun, 12 Jan 2025 10:12:51 +0000
- DoJ charged three Russian citizens with operating crypto-mixing services by Security Affairs on Sat, 11 Jan 2025 19:21:56 +0000
- U.S. cannabis dispensary STIIIZY disclosed a data breach by Security Affairs on Sat, 11 Jan 2025 11:39:31 +0000
- A novel PayPal phishing campaign hijacks accounts by Security Affairs on Sat, 11 Jan 2025 09:04:51 +0000
- Banshee macOS stealer supports new evasion mechanisms by Security Affairs on Fri, 10 Jan 2025 21:09:43 +0000
- Researchers disclosed details of a now-patched Samsung zero-click flaw by Security Affairs on Fri, 10 Jan 2025 14:45:46 +0000
- Friday Squid Blogging: Cotton-and-Squid-Bone Sponge by Schneier on Security on Fri, 10 Jan 2025 22:06:47 +0000
- Apps That Are Spying on Your Location by Schneier on Security on Fri, 10 Jan 2025 16:27:17 +0000
- Zero-Day Vulnerability in Ivanti VPN by Schneier on Security on Thu, 09 Jan 2025 17:16:38 +0000
- US Treasury Department Sanctions Chinese Company Over Cyberattacks by Schneier on Security on Tue, 07 Jan 2025 12:00:42 +0000
- Privacy of Photos.app’s Enhanced Visual Search by Schneier on Security on Mon, 06 Jan 2025 12:06:52 +0000
- 362 Cyber Acquisitions in 2024 by The Security Industry on Fri, 10 Jan 2025 15:42:41 GMT
- TCP #70: Horizontal Security; Icebergs; and Product News by The Cybersecurity Pulse (TCP) on Wed, 08 Jan 2025 15:16:11 GMT
- Weekly Update 434 by Troy Hunt on Sun, 12 Jan 2025 22:59:48 GMT
- Weekly Update 433 by Troy Hunt on Mon, 06 Jan 2025 05:20:31 GMT
Community Feeds #
A newly identified sophisticated cryptomining malware dubbed ‘redtail’ is observed exploiting multiple systems for unauthorized cryptocurrency mining. The malware deploys innovative techniques, including identifying CPU architectures of victim systems and removing competing cryptomining software, leveraging vulnerabilities such as a recent critical flaw in Palo Alto Networks’ PAN-OS (CVE-2024-3400), underscoring the importance of timely patching and security updates (Examining Redtail Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics).
Phishing attacks targeting Apple iMessage users are convincing individuals to disable security protections, increasing the susceptibility to further unauthorized access and exploitation. This highlights the need for continuous user education on recognizing and mitigating phishing attempts (Phishing texts trick Apple iMessage users into disabling protection).
A rise in credential stuffing attacks has been noted, with tools like ‘Open Bullet 2’ favored by fraudsters for their versatile use in deploying such attacks. Organizations need to enhance their preventive measures, such as implementing multi-factor authentication, to mitigate these escalating threats (Overview of Open Bullet 2, fraudsters preferred credential stuffing tool).
A botnet identified as ‘Gayfemboy’ has been discovered leveraging zero-day exploits in Four-Faith industrial routers. The attack underlines the potential vulnerabilities in industrial IoT devices and the need for robust security protocols in supply chain and industrial systems (Gayfemboy: A Botnet Deliver Through a Four-Faith Industrial Router 0-day Exploit).
A significant scam involving YouTube crypto tutorials has been exposed, where approximately $2 million was laundered through fraudulent means. This incident calls attention to the persistent risks associated with cryptocurrency investments and the importance of due diligence ($2m laundered: the YouTube crypto tutorials’ huge scam).
Articles #
- Pastor who saw crypto project in his “dream” indicted for fraud by cybersecurity on 2025-01-12T20:35:01+00:00
- Best way to become an effective IAM security analyst? by cybersecurity on 2025-01-12T19:04:19+00:00
- Phishing texts trick Apple iMessage users into disabling protection by cybersecurity on 2025-01-12T20:35:51+00:00
- The most overlooked thing about hiring by cybersecurity on 2025-01-12T13:21:31+00:00
- What would you consider a job hopper? by cybersecurity on 2025-01-12T13:56:36+00:00
- Malicious Life is looking for new sponsorship by cybersecurity on 2025-01-12T22:11:33+00:00
- Cyber Threat Dashboard by cybersecurity on 2025-01-12T14:03:24+00:00
- Best of 3 Clouds for Security Aggregation by cybersecurity on 2025-01-12T19:21:43+00:00
- Cybersecurity pros, how do you use RSS feed reader? by cybersecurity on 2025-01-12T11:20:47+00:00
- KnowBe4 End User Cybersecurity Awareness Training by cybersecurity on 2025-01-11T23:18:28+00:00
- Security related subs by cybersecurity on 2025-01-12T16:57:51+00:00
- Predictive Cyber Defense - Early Warning Intelligence (Presentation) by cybersecurity on 2025-01-12T16:33:02+00:00
- Honestly I’m lost by cybersecurity on 2025-01-12T08:43:26+00:00
- Overview of Open Bullet 2, fraudsters preferred credential stuffing tool by cybersecurity on 2025-01-12T11:25:44+00:00
- Amazon v. Google Security Engineer/Cloud Security Engineer, etc. v. Standard/General Cybersecurity Certs? by cybersecurity on 2025-01-12T00:52:58+00:00
- Pryx: Hellcat, DangerZone, and a Server-Side Information-Stealer by cybersecurity on 2025-01-12T02:33:21+00:00
- What are the biggest lies in Cyber? by cybersecurity on 2025-01-11T03:23:23+00:00
- Arch Linux vs Windows + Kali WSL: Which Cybersecurity Setup Wins? by cybersecurity on 2025-01-12T19:50:33+00:00
- Coding challenge for a Cyber Security Engineer role? by cybersecurity on 2025-01-11T13:46:50+00:00
- Two different job offers, career wise would you choose a cybersec specialised company, even if the job offer seems a bit vague, or a consulting firm? by cybersecurity on 2025-01-12T10:38:08+00:00
- Daily updates seeking by cybersecurity on 2025-01-12T17:43:14+00:00
- $2m laundered: the YouTube crypto tutorials’ huge scam (investigation) by Technical Information Security Content & Discussion on 2025-01-11T20:33:28+00:00
- Exploitation Walkthrough and Techniques - Ivanti Connect Secure RCE (CVE-2025-0282) - watchTowr Labs by Technical Information Security Content & Discussion on 2025-01-12T08:55:57+00:00
- Gayfemboy: A Botnet Deliver Through a Four-Faith Industrial Router 0-day Exploit. by Technical Information Security Content & Discussion on 2025-01-11T00:32:00+00:00
- ACE up the sleeve: Hacking into Apple’s new USB-C Controller by Technical Information Security Content & Discussion on 2025-01-10T17:31:35+00:00
- How to jailbreak most/all LLMs using Assistant Prefill by Technical Information Security Content & Discussion on 2025-01-10T15:23:37+00:00
- Exploiting SSTI in a Modern Spring Boot Application (3.3.4) by Technical Information Security Content & Discussion on 2025-01-10T08:48:58+00:00
- Do Secure-By-Design Pledges Come With Stickers? - Ivanti Connect Secure RCE (CVE-2025-0282) - watchTowr Labs by Technical Information Security Content & Discussion on 2025-01-10T01:35:45+00:00
- WorstFit: Unveiling Hidden Transformers in Windows ANSI! by Technical Information Security Content & Discussion on 2025-01-09T16:10:18+00:00
- Top 10 web hacking techniques of 2024: nominations open by Technical Information Security Content & Discussion on 2025-01-09T08:26:23+00:00
- Bypassing File Upload Restrictions To Exploit Client-Side Path Traversal (CSPT, CSPT2CSRF) by Technical Information Security Content & Discussion on 2025-01-09T08:25:31+00:00
- Abuse a time-based SQL injection by customizing SQLMAP by Technical Information Security Content & Discussion on 2025-01-09T09:31:51+00:00
- Backdooring Your Backdoors - Another $20 Domain, More Governments - watchTowr Labs by Technical Information Security Content & Discussion on 2025-01-08T11:12:34+00:00
- SYN Spoof Scanner - a simple tool to perform SYN port scan with spoofed source IPs for offensive deception by Technical Information Security Content & Discussion on 2025-01-08T08:32:38+00:00
- Magic/Tragic Email Links: Don’t make them the only option by Technical Information Security Content & Discussion on 2025-01-08T14:16:45+00:00
- Help Net Security - A FOSS tool to analyse IOC by Technical Information Security Content & Discussion on 2025-01-08T11:44:49+00:00
- SMB3 Kernel Server (ksmbd) fuzzing and vulns by Technical Information Security Content & Discussion on 2025-01-07T15:45:00+00:00
- Scanning the Entire Internet on Port 80 by Technical Information Security Content & Discussion on 2025-01-07T16:31:57+00:00
- Argo Workflows - Uncovering the Hidden Misconfigurations by Technical Information Security Content & Discussion on 2025-01-06T11:13:09+00:00
- Multi-OLE, (Sun, Jan 12th) by SANS Internet Storm Center, InfoCON: green on Sun, 12 Jan 2025 11:44:08 GMT
- Wireshark 4.4.3 Released, (Sat, Jan 11th) by SANS Internet Storm Center, InfoCON: green on Sun, 12 Jan 2025 07:44:13 GMT
- ISC Stormcast For Friday, January 10th, 2025 https://isc.sans.edu/podcastdetail/9274, (Fri, Jan 10th) by SANS Internet Storm Center, InfoCON: green on Fri, 10 Jan 2025 01:26:17 GMT
- Windows Defender Chrome Extension Detection, (Fri, Jan 10th) by SANS Internet Storm Center, InfoCON: green on Fri, 10 Jan 2025 00:37:58 GMT
- Examining Redtail Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics [Guest Diary], (Thu, Jan 9th) by SANS Internet Storm Center, InfoCON: green on Thu, 09 Jan 2025 01:45:26 GMT
- ISC Stormcast For Thursday, January 9th, 2025 https://isc.sans.edu/podcastdetail/9272, (Thu, Jan 9th) by SANS Internet Storm Center, InfoCON: green on Thu, 09 Jan 2025 01:32:18 GMT
- ISC Stormcast For Wednesday, January 8th, 2025 https://isc.sans.edu/podcastdetail/9270, (Wed, Jan 8th) by SANS Internet Storm Center, InfoCON: green on Wed, 08 Jan 2025 01:31:58 GMT
- PacketCrypt Classic Cryptocurrency Miner on PHP Servers, (Tue, Jan 7th) by SANS Internet Storm Center, InfoCON: green on Tue, 07 Jan 2025 11:40:39 GMT
- ISC Stormcast For Tuesday, January 7th, 2025 https://isc.sans.edu/podcastdetail/9268, (Tue, Jan 7th) by SANS Internet Storm Center, InfoCON: green on Tue, 07 Jan 2025 01:26:19 GMT
Disclaimer #
The summaries in this brief are generated autonomously by the OpenAI LLM model based on the provided system and user prompts. While every effort is made to consolidate accurate and relevant insights, the model may occasionally misinterpret, misrepresent, or hallucinate information. Readers are strongly advised to verify all key points by consulting the original sources linked in the brief for complete context and accuracy.
This document is created with BlackStork and is based on the template available on GitHub.
Reach out if you have questions or suggestions.