[ThreatPost] Attackers Will Flock to Crypto Wallets, Linux in 2022: Podcast

That’s just the start of what cyberattackers will zero in on as they pick up APT techniques to hurl more destructive ransomware & supply-chain attacks, says Fortinet’s Derek Manky.

Source: Read More (Threatpost)

You might be interested in …

Daily NCSC-FI news followup 2021-08-06

Angry Affiliate Leaks Conti Ransomware Gang Playbook threatpost.com/affiliate-leaks-conti-ransomware-playbook/168442/ A security researcher shared a comment from an online forum allegedly posted by someone who did business with Conti that included information integral to its ransomware-as-as-service (RaaS) operation, according to a report. Data revealed by the post included the IP addresses for the group’s Cobalt Strike command-and-control […]

Read More

[SANS ISC] Microsoft August 2021 Patch Tuesday, (Tue, Aug 10th)

All posts, Sans-ISC

This month we got patches for 51 vulnerabilities. Of these, 7 are critical, 2 were previously disclosed and 1 is being exploited according to Microsoft. The exploited vulnerability is an elevation of privilege Windows Update Medic Service (CVE-2021-36948). This vulnerability requires no user interaction low privileges and has a low attack complexity. The CVSS v3 for […]

Read More

[HackerNews] North Korean Hackers Target Cybersecurity Researchers with Trojanized IDA Pro

All posts, HackerNews

Lazarus, the North Korea-affiliated state-sponsored group, is attempting to once again target security researchers with backdoors and remote access trojans using a trojanized pirated version of the popular IDA Pro reverse engineering software. The findings were reported by ESET security researcher Anton Cherepanov last week in a series of tweets. IDA Pro is an Interactive Disassembler that’s Source: Read […]

Read More