The two groups that took credit for the cyberattack say it was the result of a yearlong operation that penetrated Aeroflot's network, destroyed 7,000 servers, and gained control over the personal computers of the company's employees.
The two groups that took credit for the cyberattack say it was the result of a yearlong operation that penetrated Aeroflot's network, destroyed 7,000 servers, and gained control over the personal computers of the company's employees.
Salting phish
blog.talosintelligence.com/seasoning-em...
The U.S. Pond Hockey Championships on Lake Nokomis started today! With 2,700 players from around the world participating, it should be an incredible week of epic outdoor hockey.
www.cbsnews.com/minnesota/ne...
As recently as last year, social engineering for initial access was primarily confined to western based ransomware groups (LAPSUS & Scattered Spider). That is no longer the case.
via @alexmartin.bsky.social & @therecordmedia.bsky.social
-23 Fahrenheit on the lakes today. Sun dogs and ice fisherman on Detroit Lakes, MN.
π
A new hacking group has leaked the configuration files, IP addresses, and VPN credentials for over 15,000 FortiGate devices for free on the dark web, exposing a great deal of sensitive technical information to other cybercriminals.
Some data breaches include novel information about us, are the result of particularly noteworthy security flaws, or are just so massive theyβre impossible to ignore. Hereβs EFFβs list of some of the most egregious data breaches of 2024.
Want to see what permissions a GCP service account has? This guide walks through using the `testIamPermissions` method to enumerate access. All you need is a service account key or token. Check out the Python script that simplifies the process.
I've been reading up on NAT traversal and how STUN and similar protocols work.
Very useful if you are interested in C2 or data exfiltration.
tailscale.com/blog/how-nat...
community.cisco.com/t5/collabora...
Truth
βA Complete Unknownβ is now out and I really liked it. A must-see for anyone who (a) loves Bob Dylanβs music and his story, (b) is from MN (as Dylan grew up in Hibbing), and (c) wants to see some fantastic performances by TimothΓ©e Chalamet actor and castβ¦
A story about my Christmas obsession!
www.theregister.com/2024/12/25/j...
Merry Christmas and Happy Hanukkah, the first public release of #ghostty is here! ghostty.org
This channel is so great. Watch for a history of #ethernet #networking and why most of us are using twisted-pair cables with RJ-45 connectors.
162 years ago, 38 Dakota men were hung in the largest mass execution in our nationβs history.
The sacrifice of these riders reminds us to recommit to accountability and healing for the Dakota people.
www.mprnews.org/story/2024/1...
Security firm Spur has released a list of 2,400 IP addresses linked to Astrill, a VPN service often used by North Korean IT workers to hide their location
spur.us/astrill-vpn-...
This may be useful as a starting point for a word list, but remember that the methodology does not and can not remove intentionally vulnerable targets. The best use of this list is likely as a starting point for your own honeypot
nordpass.com/most-co...
Iβm shocked, shocked I tell you, that North Korea is behind the largest cryptocurrency theft of 2024.
via @therecordmedia.bsky.social & @jgreig.bsky.social
The US state of Ohio has warned state employees that they might be held personally liable if they fall to online email scams
athensindependent.com/auditor-issu...
Based on interviews with NCA investigators, this is the story of how pulling at the thread of a ransomware groupβs extortion funds ended up unravelling a Russian money-laundering network used by drug traffickers, cybercriminals, elites evading sanctions and even the Kremlinβs espionage operations.
www.popsci.com/technology/f...
Misinformation alert π¨
NIST Quantum Standards: Security Experts Talk Hurdles (I'm in article)
cybermagazine.com/articles/rac...
For the next installment in his malware blog series, Principal Security Consultant Scott Nusbaum walks us through using shared memory sections to inject and execute code in a remote process. Read it now! trustedsec.com/blog/malware...
North Korean hackers escalate their crypto heists, netting an estimated $2.2B through advanced cyber attacks. Discover how theyβre reshaping the digital threat landscape. Cybersecurity #Crypto #Hackers
Read more at -> innovirtuoso.com/cybersecurit...
This is almost double the expected payments to ransomware groups this year. The amount of theft from cryptocurrency platforms is huge and much of it goes to fund North Korea weapons programs.
via @therecordmedia.bsky.social & @jgreig.bsky.social
This is your reminder that Exchange on-prem has effectively been put out to pasture by Microsoft and if you're continuing to use it, you're accepting a huge amount of risk.
You don't have to like it, but if you care about security, M365 is the way.