Sneak preview: Wie es weiterging mit "Elon Musk" (mehr dazu morgen früh im Podcast)
Wir hatten Streit, wer hier in Wirklichkeit ist, was er behauptet... Da hat ChatGPT mir schnell einen E-Mail-Screenshot gebastelt.
#scam #elon #cybersecurity
Sneak preview: Wie es weiterging mit "Elon Musk" (mehr dazu morgen früh im Podcast)
Wir hatten Streit, wer hier in Wirklichkeit ist, was er behauptet... Da hat ChatGPT mir schnell einen E-Mail-Screenshot gebastelt.
#scam #elon #cybersecurity
A misconfigured database tied to college recruiting platform PrepHero exposed personal info of 3M+ students-athletes, parents, and coaches including passport images and email data.
Read: https://hackread.com/prephero-database-exposed-students-coaches-data/
Stay ahead of AI challenges with "Defending Against Deepfakes in the AI Era."
Discover strategies to combat digital deception in this insightful read. Check it out here: https://thehackernews.com/2025/05/deepfake-defense-in-age-of-ai.html
What a decade of data tells us about the state of open source security, via @TechRadar. #OpenSource #CyberSecurity #OSSRA #Tech #Technology https://flip.it/ITrry9
A security loophole in ASUS DriverHub permits harmful websites to execute commands with administrator privileges. #Cybersecurity #ASUS #Vulnerability
How to protect my #Android or #iPhone from #ransomware in 2025
https://tuta.com/blog/how-to-protect-android-iphone-from-ransomware
Explore the evolution of ransomware by 2025. Dive into the analysis here: https://securelist.com/state-of-ransomware-in-2025/116475/
Enhance Red Team operations with Adversarial Exposure Validation, a technique boosting effectiveness tenfold. Simulating advanced threats helps security teams identify vulnerabilities and strengthen defenses. Organizations using this strategy significantly improve breach detection. For more insights, visit the article on BleepingComputer. #CyberSecurity #RedTeamOps
ENISA launches European Vulnerability Database.
ENISA: Consult the European Vulnerability Database to enhance your digital security! https://www.enisa.europa.eu/news/consult-the-european-vulnerability-database-to-enhance-your-digital-security @enisa_eu #cybersecurity #Infosec
Here's the site: https://euvd.enisa.europa.eu/
Interesting. North Korea is all in.
Proofpoint: TA406 Pivots to the Front https://www.proofpoint.com/us/blog/threat-insight/ta406-pivots-front
More:
The Hacker News: North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress https://thehackernews.com/2025/05/north-korean-konni-apt-targets-ukraine.html @thehackernews #cybersecurity #infosec #malware
Popular student engagement platform iClicker’s website was hacked with a fake "I'm not a robot" check which is a textbook example of a ClickFix attack.
Read: https://hackread.com/iclicker-website-hacked-fake-captcha-clickfix-attack/
Ever wondered what hidden gems lie within your network traffic? My latest article in the #100sSeries dives into extracting secrets using Wireshark
Read more: https://osintteam.blog/wireshark-101-extracting-secrets-from-captured-network-data-8f40bd3252f9 #Wireshark #NetworkAnalysis #CyberSecurity #InfoSec
I do want to know more about malware analysis on Linux machines. I feel that some malware isn't cross platform, as in it won't work for all OSes. I think open source OSes may have that advantage.
However, it all depends on what programming language is used, and the method for which the malware elevates user privileges (thereby taking advantage of them.) (My guess.)
Eh, I can look up malware analysis on linux later. I know about Kali/Ghidra.
I don't like being interrupted when I am binging a topic. That makes eating hard. I can go back to spinning after eating but it's hard to go back into cybersec deep dives if I'm interrupted. Hate it.
(Going to finish the video presentation later today.) I might knit during, this time.
As for spinning... I'm running out of spindles for this yarn. I need to probably make a plying ball so I can free up some supported spindles. Not fun.
Was spinning yarn and watching a malware analysis tutorial from RSA cybersecurity conference.
I am spinning a rather pink-peach DK yarn on support spindles. It has sari silk and mulberry silk in it. Can share more later.
I keep forgetting I have an eclectic mix of hobbies. Well, cybersec can be a career or a hobby
The malware was for Windows (b/c businesses are most likely to need help with Windows Malware.)
https://m.youtube.com/watch?v=20xYpxe8mBg&
Malicious #npm Packages Infect 3,200+ #Cursor Users With Backdoor, Steal Credentials
https://thehackernews.com/2025/05/malicious-npm-packages-infect-3200.html
Spectre-Angriffe sind zurück! Selbst perfekt implementierte Sicherungen können umgangen werden. Sie sollten Ihre Systeme regelmäßig aktualisieren und wachsam bleiben. Mehr Infos bei heiseonline: https://www.heise.de/news/Perfekt-implementierte-Sicherungen-ausgehebelt-Spectre-Angriffe-sind-zurueck-10381851.html #ITSecurity #Spectre #Cybersecurity
#newz
Kurzlink: https://heise.de/-10381851
New ransom group blog post!
Group name: kairos
Post title: Looper Goodwine
Info: https://cti.fyi/groups/kairos.html