This alert was created automatically by our award-winning intelligence product Silobreaker Online. Story selection is determined by an algorithm and based on a set of queries initially set by a Silobreaker user. Contact productinfo[at]silobreaker[dot]com for more information.Heat - Trending Malware and Threat ActorsNameHeat 1Heat 7Vol 1Vol 7BlackWater Backdoor12Asnarok Malware11APT4011Magecart Group 813Netwire RAT11VandaTheGod11Chimera APT14Dark Basin11NanoCore RAT11Remcos RAT11 Data Breaches Flaws Could Have Exposed Cryptocurrency Exchanges to Hackers [1]HITBSecNews - Aug 09 2020 22:05 [2]Flaws Could Have Exposed Cryptocurrency Exchanges to Hackers l33tdawg Sun, 08/09/2020 - 22:05InfoSecHotSpot - Flaws Could Have Exposed Cryptocurrency Exchanges to Hackers Flaws Could Have Exposed Cryptocurrency Exchanges to H… https://t.co/5UkadPHg5U [3]InfoSecHotSpot - Twitter - Aug 10 2020 02:28 [4]Flaws Could Have Exposed Cryptocurrency Exchanges to Hackers Flaws Could Have Exposed Cryptocurrency Exchanges to Hackers l33tdawg Sun, 08/09/2020 - 22:05 https://bit.ly/3acC9a7Secnewsbytes - GitHub - SummitRoute/aws_exposable_resources: Resource types that can be publicly exposed on AWS https://t.co/DLpu8nJ0QN [5]Secnewsbytes - Twitter - Aug 09 2020 13:39 [6]GitHub - SummitRoute/aws_exposable_resources: Resource types that can be publicly exposed on AWS https://github.com/SummitRoute/aws_exposable_resourcesSettlement for Google+ Breach Offers Class Members Up to $12 Each (Slashdot) [7]CERT-EU VulnerabilitiesApplications - Aug 09 2020 19:06 [8]"Anyone in the United States who held a Google Plus account between January 1, 2015 and April 2, 2019, and believes they were impacted by a security flaw that Google disclosed in 2018 can now register for a payout from a class action settlement..."... Hacker Groups How to Defend Against Advanced Persistent Threats [9]CERT-EU - Latest Articles Ongoing Threats - RSS - Aug 09 2020 11:38 [10]Advanced Persistent Threats (APTs) are prolonged targeted cyberattacks. During this type of attack, intruders access the network and attempt to remain undetected for as long as possible. This allows the bad actor to access intellectual property and...US Government Exposed the Identity of Anonymous Crypto Hacker’s [11]Reddit - CryptoCurrency - Aug 10 2020 01:51 [12]...Hfuhs - Water Nue Phishing Campaign Targets C-Suite's Office 365 Accounts - https://t.co/btvYl1PmMM [13]Hfuhs - Twitter - Aug 09 2020 18:50 [14]Water Nue Phishing Campaign Targets C-Suite's Office 365 Accounts - http://fuhs.eu/1cwjI am Ironman: DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors [15]Vyagers - RSS - Aug 10 2020 00:03 [16]http://blog.crowdstrike.com/ironman-deep-panda-uses-sakula-malware-target-organizations-multiple-sectors/ Malware JAMESWT_MHT - RT @VK_Intel: 2020-08-08: 👁️[Malware Future] RagnarLocker crime team probably wins the most innovative "award" to hide from detection using… [17]JAMESWT_MHT - Twitter - Aug 09 2020 05:39 [18]RT @VK_Intel: 2020-08-08: 👁️[Malware Future] RagnarLocker crime team probably wins the most innovative "award" to hide from detection using ...VirtualBox for hiding malware artifacts from EDR.
Worthy of watching for Virtual environment packages as...Intro To Malware & Its Types [19]CERT-EU VulnerabilitiesApplications - Aug 09 2020 12:27 [20]We often confuse and mix some cybersecurity-related terms and end up misunderstanding them. The same is the case with types of malware, all these are closely linked to each other as they have only one goal i.e. to perform some malicious task on the...Doki Linux Malware Infected Docker Servers in the Cloud [21]Cyware - Aug 09 2020 18:24 [22]Linux offers great applications for personal and small business financial management making it a widely used OS, which also means notorious network infiltrators have their prying eyes on it. In one of the longest ongoing attack campaigns, hackers... Vulnerabilities Ongoing Campaigns Although Silobreaker has relied on what it regards as reliable sources while compiling the content herein, Silobreaker cannot guarantee the accuracy, completeness, integrity or quality of such content and no responsibility is accepted by Silobreaker in respect of such content. Readers must determine for themselves what reliance they should place on the compiled content herein.
[1] https://news.hitb.org/content/flaws-could-have-exposed-cryptocurrency-exchanges-hackers
[2] https://news.hitb.org/content/flaws-could-have-exposed-cryptocurrency-exchanges-hackers
[3] https://twitter.com/InfoSecHotSpot/status/1292649084352946182
[4] https://twitter.com/InfoSecHotSpot/status/1292649084352946182
[5] https://twitter.com/Secnewsbytes/status/1292455357613211648
[6] https://twitter.com/Secnewsbytes/status/1292455357613211648
[7] https://www.techinvestornews.com/https://www.techinvestornews.com/Google/Latest-Google-News/settlement-for-google-breach-offers-class-members-up-to-12-each
[8] https://www.techinvestornews.com/https://www.techinvestornews.com/Google/Latest-Google-News/settlement-for-google-breach-offers-class-members-up-to-12-each
[9] https://www.deepinstinct.com/2020/08/09/how-to-defend-against-advanced-persistent-threats/
[10] https://www.deepinstinct.com/2020/08/09/how-to-defend-against-advanced-persistent-threats/
[11] https://www.reddit.com/r/CryptoCurrency/comments/i6vvmq/us_government_exposed_the_identity_of_anonymous/
[12] https://www.reddit.com/r/CryptoCurrency/comments/i6vvmq/us_government_exposed_the_identity_of_anonymous/
[13] https://twitter.com/Hfuhs/status/1292533655383027713
[14] https://twitter.com/Hfuhs/status/1292533655383027713
[15] https://vyagers.com/2020/08/10/i-am-ironman-deep-panda-uses-sakula-malware-to-target-organizations-in-multiple-sectors-3/
[16] https://vyagers.com/2020/08/10/i-am-ironman-deep-panda-uses-sakula-malware-to-target-organizations-in-multiple-sectors-3/
[17] https://twitter.com/JAMESWT_MHT/status/1292334694051307520
[18] https://twitter.com/JAMESWT_MHT/status/1292334694051307520
[19] https://medium.com/bugbountywriteup/intro-to-malware-its-types-94033dc9525f?source=rss----7b722bfd1b8d---4
[20] https://medium.com/bugbountywriteup/intro-to-malware-its-types-94033dc9525f?source=rss----7b722bfd1b8d---4
[21] https://cyware.com/news/doki-linux-malware-infected-docker-servers-in-the-cloud-5d9bf8d0
[22] https://cyware.com/news/doki-linux-malware-infected-docker-servers-in-the-cloud-5d9bf8d0
↧