Cyber-Safe Shopping: Protect Yourself from Holiday Scams and Cyber Threats

Category Key Details Phishing Scams - Verify sender details before clicking links. - Avoid links…

C2 Hunting: How to Find C2 Servers with Shodan

CategoryDetailsTools for C2 Hunting- Shodan: Search for internet-connected devices.- FOFA: Asia-focused tool for device discovery.-…

Security News This Week: Andrew Tate’s ‘Educational Platform’ Was Hacked

Key DetailInformationUS Ad Data Enabling TrackingUS companies collecting digital ad data allow adversaries to cheaply…

Russia arrests cybercriminal Wazawaka for ties with ransomware gangs

Key DetailsInformationThreat ActorMikhail Pavlovich Matveev (aka Wazawaka, Uhodiransomwar, m1x, Boriselcin)Campaign OverviewMatveev arrested and indicted for…

Tor in Russia: A call for more WebTunnel bridges

Key DetailsInformationRecent Censorship Escalation in RussiaReports indicate increased online censorship, with targeted blocking of Tor,…

OSINT Updates for December 1 , 2024

https://twitter.com/ODNIgov/status/1766231215789453529 The Office of the Director of National Intelligence (ODNI) and the CIA have officially…

THE CHANGING CYBER THREAT LANDSCAPE SOUTHEAST ASIA

CategoryDetailsThreat ActorsMISSION2025, Lazarus, Russian cybercrime syndicatesCampaign OverviewRansomware on critical infrastructure, IoT data exfiltration, social engineering…

OSINT Updates for November 29 , 2024

https://twitter.com/alhasawi/status/1862508731767922768 In the 21st installment of "OT Hunt," a discovery of 2,500 exposed T5 PLCs…

IT threat evolution in Q3 2024. Non-mobile statistics

Category Details Threat Actors LockBit ransomware affiliates, Evil Corp (tracked as GOLD DRAKE), GOLD HERON…

RomCom exploits Firefox and Windows zero days in the wild

CategoryDetailsVulnerability IdentifiedCVE-2024-9680: A use-after-free bug in the animation timeline feature in Firefox, Thunderbird, and Tor…