In a new blog, Proofpoint threat research engineers disclosed their discovery of Amatera Stealer, a newly rebranded and upgraded malware-as-a-service (MaaS) version of the ACR Stealer.

Read the blog: https://brnw.ch/21wTvkx

While maintaining its roots in ACR Stealer, the latest variant, #Amatera, introduces new features—including sophisticated delivery mechanisms, anti-analysis defenses, and a revamped control structure—making it stealthier and dangerous.

See the Threat Research Engineering blog for IOCs and Emerging Threat signatures.

#securityengineering #detectionengineering #securitycontrols

Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication | Proofpoint US

Key takeaways  Proofpoint identified a new, rebranded stealer based on ACR Stealer called Amatera Stealer.   It is delivered via web injects featuring sophisticated attack

Proofpoint
Shein Enhances Security Controls Amid EU Pressure

Shein, a fast-fashion company, is beefing up its product safety and quality tests. The move comes after the European Union raised concerns about possible

Blaze Trends

Topics like #cybersecurity and #encryption are difficult to talk about plainly because they are complex. While it's usefully reductionist to tell users that HTTPS is more secure than unencrypted HTTP, it can also lead to oversimplification (and thus a lack of adequate #infosec funding) when designing and implementing #securitycontrols. Consider the following excerpted information I recently shared in one of the LinkedIn communities when trying to explain why a URL or TCP/IP socket by itself doesn't create a secure connection.

The "HTTPS" in a URL is a URI scheme that is interpreted by the browser as an instruction to establish a TLS connection over which the HTTP protocol can be be negotiated. The actual TCP/IP transport layer handshake, TLS and HTTP protocol negotiations, and encrypted payload communications between client and server are handled in other layers.

Useful References

Hypertext, URIs, and Schemes
: https://www.rfc-editor.org/rfc/rfc9110#section-4.2.2
: https://www.rfc-editor.org/rfc/rfc8820#name-uri-schemes
: https://en.wikipedia.org/wiki/List_of_URI_schemes

TLS (sometimes still referred to as "SSL" for historical reasons)
: https://www.rfc-editor.org/rfc/rfc8446

RFC 9110: HTTP Semantics

The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.

@knowprose Part of the challenge is that OpenPGP is complex, and the #UI (even the graphical ones) can only do so much to simplify what is fundamentally a very technical set of operations. To be honest, even I find some of the recent changes to @GnuPG (which I've been using for decades) have forced me to re-read the manuals and change how I interact with the tool.

That's not a criticism of the developers, who are amazing people donating their work for free to the community. It's just a reality when dealing with cryptographic operations that don't rely on a central authority like #SMIME does.

If you think about it, most people don't even really understand how electricity works, but we depend on it for light, heating, computing, cooking, and lots of other stuff. People understand light switches, at least at a pragmatic level. That doesn't mean they know how to generate or distribute the stuff. The same is true of combustion engines; most people just put gas in the car and get their oil changed from time to time.

Computing and #cybersecurity are really the only domains I know of where we typically expect users to be experts for some reason. It's a natural tendency for those of us who were in on it all from the beginning, but it's not actually a reasonable expectation. It's an odd sort of bias, and one that I think #infosec people are all prone to. I fall prey to it myself sometimes, and often have to remind myself that what seems self-evident to me is pretty much voodoo and cargo-culting for most of society. Being aware of that inherent bias is essential for good #threatmodeling and developing good #securitycontrols.

Great blog post by a colleague of mine who asks why "Security through obscurity" is not dead in 2023! How many "#cybersecurity #incidents" is it going to take to finally realize that keeping your #securitycontrols a secret is a good thing? How many times does the #cybercommunity have to demonstrate that sharing of #threatintelligence, #TTPs, #IOCs, #securityconcepts, #AwarenessTraining methods, #zerodays, and everything else that goes along with having a #DefenseInDepth approach to a #HealthySecurityProgram, is ACTUALLY THE GOOD THING 🤨

(ahem)

You want to know about the platform I architected? No problem! 👌🏻
You want to know what Threat Intelligence I gather? Check my GitHub (link on my profile 😁).
You want the keys to my kingdom? 🤣 No, but thanks for playing 👍🏻

I'm NOT saying #compromise yourself or open some dark #backdoor to your systems. Just share the knowledge of how you're protecting stuff! Everyone is more #secure for it, and the next generation will make it better.

https://kalahari.substack.com/p/security-through-obscurity?sd=pf

Security Through Obscurity

Why is it not dead yet?

Kalahari Security Musings
Data Security Analyst

How to Apply Submit both a cover letter and resume to provide the hiring team with a sense of your experience. In the cover letter, please let us know how …

infosec-jobs.com
Zoom Takes on Zoom-Bombers Following FTC Settlement - The videoconferencing giant has upped the ante on cybersecurity with three fresh disruption contro... https://threatpost.com/zoom-bombers-ftc-settlement/161312/ #disruptiveparticipants #atriskmeetingnotifier #newsecurityfeatures #endtoendencryption #securitycontrols #cloudsecurity #ftcsettlement #cryptography #cyberattacks #zoom-bombing #websecurity #encryption #privacy #e2ee #zoom
Zoom Takes on Zoom-Bombers Following FTC Settlement

The videoconferencing giant has upped the ante on cybersecurity with three fresh disruption controls.

Threatpost - English - Global - threatpost.com