שירות MXDR שלנו מבוסס SentinelOne ייתן לכם שקט נפשי:
תגובה מהירה לאיומים
ניטור 24/7 ע”י מומחי סייבר
חקירה וזיהוי מתקפות בזמן אמת
הגנה מנוהלת שמזהה, מגיבה ומנטרלת.
דברו איתנו עכשיו #CyberSecurity #MXDR #SentinelOne
| website | https://attgm.com |
הגדרה ותחזוקה שוטפת של Web Application Firewall זה לא פרויקט חד פעמי.
אנחנו נדאג:
🔹 לחסימה חכמה של מתקפות
🔹 לעדכון חוקים רציף
🔹 לאופטימיזציה בלי לפגוע בחוויית המשתמש
הגנה לאפליקציות מתחילה ב-WAF חכם.
צרו קשר עוד היום #WAF #AppSecurity #CyberDefense
2025-02-14 RDP #Honeypot IOCs - 6669 scans
Thread with top 3 features in each category and links to the full dataset
#DFIR #InfoSec
Top IPs:
59.12.49.138 - 5709
13.127.138.112 - 651
68.183.88.109 - 213
Top ASNs:
AS4766 - 5709
AS16509 - 651
AS14061 - 213
Top Accounts:
hello - 6603
Test - 12
glc6z2mf - 12
Top ISPs:
Korea Telecom - 5709
Amazon Technologies Inc - 651
DigitalOcean, LLC - 213
Top Clients:
Unknown - 6669
Top Software:
Unknown - 6669
Top Keyboards:
Unknown - 6669
Top IP Classification:
Unknown - 5733
hosting - 918
proxy - 18
Pastebin links with full 24-hr RDP Honeypot IOC Lists:
https://pastebin.com/THNSMr55
Telegram captcha tricks you into running malicious PowerShell scripts
Threat actors on X are exploiting the news around Ross Ulbricht to direct unsuspecting users to a Telegram channel that tricks them into run PowerShell code that infects them with malware. The attack, spotted by vx-underground, is a new variant of the “Click-Fix” tactic that has become very popular among threat actors to distribute malware over the past year. However, instead of being fixes for common errors, this variant pretends to be a captcha or verification system that users must […]https://whalers.ir/blog/telegram-captcha-tricks-you-into-running-malicious-powershell-scripts/4917/
Telegram captcha tricks you into running malicious PowerShell scripts Alireza Gharib Blog From advanced cybersecurity strategies to Unix-based automation and infrastructure solutions, discover tools, tips, and resources for modern IT professionals.
@GossiTheDog Widespread DUO outage for legacy auth (sms,phone call), risk based auth, and access to admin panel.
Palo-Alto
Runnin’ PHP as root
Gotta make your authentication moot
Patch CVE-2025-0108
It’s under mass spray
and was also used as a zero day
Attached: 1 image 🚨 CVE-2025-0108 is being actively exploited! 🚨 GreyNoise sees live attacks on PAN-OS firewalls. Patch now. Restrict access. Stay ahead. 🔗 https://www.greynoise.io/blog/greynoise-observes-active-exploitation-of-pan-os-authentication-bypass-vulnerability-cve-2025-0108
2024-12-10 RDP #Honeypot IOCs - 3699 scans
Thread with top 3 features in each category and links to the full dataset
#DFIR #InfoSec
Top IPs:
165.232.162.88 - 69
178.128.26.227 - 66
167.172.95.3 - 63
Top ASNs:
AS14061 - 3444
AS37963 - 51
AS396982 - 36
Top Accounts:
142.93.8.59 - 3429
hello - 117
Test - 42
Top ISPs:
DigitalOcean, LLC - 3303
DIGITALOCEAN - 141
Hangzhou Alibaba Advertising Co - 51
Top Clients:
Unknown - 3699
Top Software:
Unknown - 3699
Top Keyboards:
Unknown - 3699
Top IP Classification:
hosting - 2823
hosting & proxy - 738
Unknown - 102
Pastebin links with full 24-hr RDP Honeypot IOC Lists:
https://pastebin.com/FcqLMPrf
Krispy Kreme has filed an 8K with the SEC for a cybersecurity incident. They say it will have a material impact on their business.
I have been tracking a ransomware group which I believe gained access to them in that timeframe.
https://www.sec.gov/ix?doc=/Archives/edgar/data/1857154/000185715424000123/dnut-20241211.htm