Incident Response
LabHost Phishing Platform is Latest Target of International Law Agencies
The takedown this week of a massive phishing-as-a-service (PhaaS) operation spanned law enforcement agencies from both sides of the Atlantic and is the latest example of an increasingly aggressive approach by authorities ...
Security Boulevard
SIM Swappers Try Bribing T-Mobile and Verizon Staff $300
Richi Jennings | | 2fa, 2FA bypass, 2FA Flaws, 2FA policies, 2FA/MFA, bypass 2FA, Industry Insider, Insider, Insider attack, Insider Attacks, insider breach, Insider Fraud, insider risk, malicious social engineering, MFA, MFA hacks, mfa login, MFA Methods, Multi-Factor Authentication, Multi-Factor Authentication (MFA), Multifactor Authentication, SB Blogwatch, SIM swap, sim swap fraud, SIM swap scams, SIM swapping, sms scam, SMS scams, SMS Spam, SMS Spamming, social engineeering, T-Mobile, t-mobile breach, t-mobile data breach, T-Mobile hack, two factor authentication, two-factor-authentication.2fa, verizon, verizon data breach, Verizon Wireless
Not OK: SMS 2FA — Widespread spam targets carrier employees, as scrotes try harder to evade two-factor authentication ...
Security Boulevard
CSBR Slams Microsoft Over Storm-0558 Attacks | Key Insight
Wajahat Raja | | Cloud Security, CSBR, cyber attacks, cyber defense, Cybersecurity, Cybersecurity News, Data breach, Incident Response, Microsoft, nation state threats, risk management, Security Lapses, Storm-0558, Technology Industry, Vulnerability Management
In recent news, the U.S. Cyber Safety Review Board (CSBR) has raised concerns over Microsoft’s handling of the Storm-0558 attacks, highlighting significant security lapses that allowed a China-based nation-state group to breach ...
Sisense Hacked: CISA Warns Customers at Risk
Richi Jennings | | Amazon Web Services (AWS), aws, AWS access keys, AWS bucket, cisa, CISA Advisories, CISA Advisory, CISA Alert, CISA warning, CISA.gov, depth, NSA/CISA, Sangram Dash, SB Blogwatch, Sisense
A hard-coded credential catastrophe: The analytics firm kept big companies’ secrets in an insecure AWS bucket. Government says victims include the “critical infrastructure sector.” ...
Security Boulevard
Data Detection and Response: Enhancing Threat Intelligence and Incident Response
Katrina Thompson | | Blog, data detection and response, data protection, DDR, Incident Response, Threat Intelligence
As data naturally lives and breathes, gets copied, shared, expanded, collaborated on, and distributed, the many lives of a single piece of information can be extraordinarily hard to keep track of, much ...
Barracuda Report Provides Insight into Cybersecurity Threat Severity Levels
According to Barracuda Networks, 66,000 incidents needed to be escalated to security operations in 2023, and 15,000 required an immediate response ...
Security Boulevard
FCC: Phone Network Bugs Must Be Fixed — But are SS7/Diameter Beyond Repair?
Richi Jennings | | Big Telecom, carrier, Carriers, Diameter, digital telecom, fcc, FCC Failures, FCC Follies, FCC privacy rules, Federal Communications Commission, Federal Government, Location, location access risks, location data, Location data privacy, location history, location intelligence, location privacy, location sharing location tracking, location tracking, mobile carrier, mobile carrier vulnerability, Mobile carriers, Mobile Location Tracking, Mobile Tracking, Phone Carrier, RADIUS, roaming, Ron Wyden, SB Blogwatch, Sen. Ron Wyden, Smartphone Location Tracking, ss7, telco, Telecom, Telecom Cybersecurity, Telecom Industry, Telecom Industry Vulnerabilities, telecommunications, Telecommunications Security, telephone, telephones, U.S. Federal Communications Commission, wireless carrier
Fast enough for government work: The Federal Communications Commission is finally minded to do something about decades-old vulnerabilities ...
Security Boulevard
Biden Review Board Gives Microsoft a Big, Fat Raspberry
Richi Jennings | | Active Directory, Authentication, azure, Azure Active Directory, Azure AD, Azure security, cisa, CISA.gov, CSRB, Cyber Safety Review Board, Cybersecurity Infrastructure Security Administration, Entra ID, Exchange, Microsoft, Microsoft Azure, Microsoft Azure Active Directory, Microsoft Azure Security, Outlook.com, SB Blogwatch, Storm-0558
Storm-0558 forecast: Last year’s Chinese hack of federal agencies’ email is still a mystery, and “should never have occurred,” says CISA ...
Security Boulevard
Sophos: Backups are in Ransomware Groups’ Crosshairs
Enterprises that ignore their data backups, in contemplating ransomware, do so at their own peril, according to cybersecurity firm Sophos. Protecting backups will significantly reduce the harm to a company hit by ...
Security Boulevard
Lacework Adds Visualization Capabilities to CNAPP
Lacework today added multiple capabilities to its namesake cloud-native application protection platform (CNAPP), promising to make it simpler for security analysts to correlate threats using, for example, graph technology the company developed ...
Security Boulevard