🎥Watch the video recording of the talk: “Operational Twilight: APTs, OT, and the geopolitics of a dying climate.” from Adversary Village at @defcon 33 Creator Stage, delivered by Cybelle O., Cyber Threat Intelligence Researcher at Malwarelandia.
https://youtu.be/Ekp5iMPEgVw?si=lZMd2Z04egnYI7QK

#AdversaryVillage #DEFCON33 #AccessEverywhere #APTs #OTSecurity #ThreatIntelligence #AdversaryTradecraft

DEF CON 33 - Operational Twilight: APTs, OT, & geopolitics of a dying climate - Cybelle Oliveira

YouTube
I wonder if it is possible and what would happen if any #APTs would combine #BlobURL #Bypass and this: https://cyberplace.social/@GossiTheDog/115724133289781495. Any ideas? 🤔 Probably nothing good, for sure…

In diesem praxisorientierten Training lernen Sie die Grundlagen der IT- und Informationssicherheit kennen. Profitieren Sie von der über 20-jährigen Erfahrung unseres Trainers, der Ihnen aktuelle und relevante Einblicke bietet.

In unserer zweitägigen Schulung stehen folgende Themen im Mittelpunkt:
- Grundbegriffe der IT- und Informationssicherheit
- Unterschied zwischen IT-Sicherheit und Datenschutz
- Aktuelle Bedrohungen und Angriffstechniken
- Social Engineering und die Cyber Kill Chain
- Schadprogramme: Funktionsweisen und Schutzstrategien
- Advanced Persistent Threats (APTs) und DDoS-Angriffe
- Schutzmaßnahmen und Strategien zur Risikominderung
- Zero-Trust-Ansätze und effektives Richtlinien-Management
- Schwachstellen- und Patch-Management
- Systemhärtung und Netzwerkzugangskontrolle
- Risikomanagement und Sicherheitsstandards
- Grundlagen der Risikobewertung und relevante Standards (z.B. ISO 27001)
- Einführung in das Security Incident Management
Nach dem Training sind Sie in der Lage, zentrale Begriffe der IT-Sicherheit zu verstehen, Bedrohungen für Ihr Unternehmen realistisch einzuschätzen und passende Maßnahmen abzuleiten.
Sichern Sie sich jetzt Ihren Platz und legen Sie das Fundament für eine sichere IT! 💪🔒

https://cirosec.de/trainings/crashkurs-it-und-informationssicherheit/

#crashkurs #ITSicherheit #Informationssicherheit #Datenschutz #CyberSecurity #Bedrohungen #Angriffstechniken #SocialEngineering #Malware #Schutzstrategien #APTs #DDoS #ZeroTrust #Netzwerksicherheit #ISO27001.

👾 #Lumma, #Remcos, and #XWorm became the top uploaded threats in Q2 2025.

From top #malware to active #APTs, Malware Trends Report for Q2 '25 has all the intel every SOC needs to make smarter decisions.

👨‍💻 Read now: https://any.run/cybersecurity-blog/malware-trends-q2-2025/?utm_source=mastodon&utm_medium=post&utm_campaign=malware_trends_q2_2025&utm_term=060825&utm_content=linktoblog

#cybersecurity #infosec

Malware Trends Report, Q2 25: Know Key Risks to Your Business

Discover the key insights into the current threat landscape with ANY.RUN's Q2 2025 report to ensure effective security planning.

ANY.RUN's Cybersecurity Blog
Microsoft catches Russian hackers targeting foreign embassies https://arstechni.ca/sdF8 #secretblizzard #embassies #Security #Biz&IT #russia #apts
Microsoft catches Russian hackers targeting foreign embassies

End goal is the installation of a malicious TLS root certificate for use in intel gathering.

Ars Technica

🚨 From top #malware to active #APTs, Malware Trends Report for Q2 '25 has all the intel every SOC needs to make smarter decisions.

See key threats to businesses and prepare for the next attack before it's too late.
👨‍💻 Read now: https://any.run/cybersecurity-blog/malware-trends-q2-2025/?utm_source=mastodon&utm_medium=post&utm_campaign=malware_trends_q2_2025&utm_term=290725&utm_content=linktoblog

#cybersecurity #infosec

#BREAKING #ESETResearch has been monitoring the recently discovered #ToolShell zero-day vulnerabilities in #SharePoint Server: CVE-2025-53770 and CVE-2025-53771. SharePoint Online in Microsoft 365 is not impacted. https://www.welivesecurity.com/en/eset-research/toolshell-an-all-you-can-eat-buffet-for-threat-actors/
ESET first detected an attempt to exploit part of the execution chain on July 17 in Germany 🇩🇪. Here, the final #webshell payload was not delivered. The first time we registered the payload was on July 18 in Italy 🇮🇹. We have since seen active ToolShell exploitation all over the world.
We have uncovered several IP addresses that were used in the attacks from July 17 to July 22. The charts show the timeline of the attacks from the three most active of these IP addresses.
ToolShell is being exploited by all sorts of threat actors, from petty cybercriminals to state-sponsored groups, among them China 🇨🇳-aligned #APTs. We expect these attacks to continue taking advantage of unpatched systems.
IoCs available in our GitHub repo: https://github.com/eset/

📢 Malware Trends Report for Q2 '25 is here.
See key threats to businesses, prepare for the next attack before it's too late.

From top #malware to active #APTs, it has all the intel every SOC needs to make smarter decisions.

Get it now 👇
https://any.run/cybersecurity-blog/malware-trends-q2-2025/?utm_source=mastodon&utm_medium=post&utm_campaign=malware_trends_q2_2025&utm_term=210725&utm_content=linktoblog

#cybersecurity #infosec

Malware Trends Report, Q2 25: Know Key Risks to Your Business

Discover the key insights into the current threat landscape with ANY.RUN's Q2 2025 report to ensure effective security planning.

ANY.RUN's Cybersecurity Blog
Comienza la ponencia de Marc Rivero "Lumma Stealer: El Auge del Malware-as-a-Service y la Industria del Cibercrimen" para examinar un ejemplo de
Malware-as-a-Service (MaaS) #ESCVIII #Malware #APTs #Bypassing @Seifreed