7 Followers
58 Following
131 Posts
Cyber Hall Monitor at $edu.

Has anyone that's following #HuntersInternational figured out what the attack vector is yet? Is the group relying on exploits or phishing emails/droppers?

#Ransomware #threatintel

Looks like there's a new #ransomware variant called #cloak. I wonder what their MO is or if this is just an existing variant that has been renamed.

Anyone using #zoom in the research or sensitive data space needs to pay close attention to the new terms of service. Avoid providing your company's sensitive data to AI.

https://blog.zoom.us/zooms-term-service-ai/

How Zoom’s terms of service and practices apply to AI features | Zoom Blog

Editor’s note: This blog post was edited on August 11, 2023, to include the most up-to-date information on our terms of service. Following feedback

Zoom Blog
Anyone else seeing Windows update KB5027231 kill Google #Chrome when running an AV besides Defender?

Yesterday, LastPass announced that they were investigating a new breach and it was believed adversaries gained access using information collected from their August intrusion. Is it me, or does it sound like someone didn't fully clean up?

https://blog.lastpass.com/2022/11/notice-of-recent-security-incident/

Notice of Recent Security Incident - The LastPass Blog

We are working diligently to understand the scope of the incident and identify what specific information has been accessed.

The LastPass Blog

Great write up by Elastic on the Google Workspace attack surface. Looking forward to parts 2 and 3 whenever they release.

https://www.elastic.co/google-workspace-attack-surface-part-one

#cybersecurity #GoogleWorkspace #threatdetection

Google Workspace Attack Surface Part One: Surveying the Land

Elastic Blog

PNG Steganography Hides Backdoor

Specifically, hiding #malware in PNG files (a type of image file).

Hey, I learned about this in security+

#cybersecurity

https://decoded.avast.io/martinchlumecky/png-steganography/

PNG Steganography Hides Backdoor - Avast Threat Labs

Our deep analysis of the Worok toolset (previously described by ESET Research) reveals the final stage, hidden in a PNG file, that steals data and provides a multifunctional backdoor using the DropBox repository and API.

Avast Threat Labs
Hello World.