Cyber-Safe Shopping: Protect Yourself from Holiday Scams and Cyber Threats
Category Key Details Phishing Scams - Verify sender details before clicking links. - Avoid links…
C2 Hunting: How to Find C2 Servers with Shodan
CategoryDetailsTools for C2 Hunting- Shodan: Search for internet-connected devices.- FOFA: Asia-focused tool for device discovery.-…
Security News This Week: Andrew Tate’s ‘Educational Platform’ Was Hacked
Key DetailInformationUS Ad Data Enabling TrackingUS companies collecting digital ad data allow adversaries to cheaply…
Russia arrests cybercriminal Wazawaka for ties with ransomware gangs
Key DetailsInformationThreat ActorMikhail Pavlovich Matveev (aka Wazawaka, Uhodiransomwar, m1x, Boriselcin)Campaign OverviewMatveev arrested and indicted for…
Tor in Russia: A call for more WebTunnel bridges
Key DetailsInformationRecent Censorship Escalation in RussiaReports indicate increased online censorship, with targeted blocking of Tor,…
OSINT Updates for December 1 , 2024
https://twitter.com/ODNIgov/status/1766231215789453529 The Office of the Director of National Intelligence (ODNI) and the CIA have officially…
THE CHANGING CYBER THREAT LANDSCAPE SOUTHEAST ASIA
CategoryDetailsThreat ActorsMISSION2025, Lazarus, Russian cybercrime syndicatesCampaign OverviewRansomware on critical infrastructure, IoT data exfiltration, social engineering…
OSINT Updates for November 29 , 2024
https://twitter.com/alhasawi/status/1862508731767922768 In the 21st installment of "OT Hunt," a discovery of 2,500 exposed T5 PLCs…
IT threat evolution in Q3 2024. Non-mobile statistics
Category Details Threat Actors LockBit ransomware affiliates, Evil Corp (tracked as GOLD DRAKE), GOLD HERON…
RomCom exploits Firefox and Windows zero days in the wild
CategoryDetailsVulnerability IdentifiedCVE-2024-9680: A use-after-free bug in the animation timeline feature in Firefox, Thunderbird, and Tor…