Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More

Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More

The Federal Bureau of Investigation and Cybersecurity & Infrastructure Security Agency warned in a joint advisory about a threat actor deploying a botnet that makes use of the Androxgh0st malware. This malware is capable of collecting cloud credentials, such as those from AWS or Microsoft Azure and more, abusing the Simple Mail Transfer Protocol, and scanning for Amazon Simple Email Service parameters. What is the Androxgh0st malware? The Androxgh0st malware was exposed in December 2022…

Read More

Ivanti Secure VPN Zero-Day Vulnerabilities Allow Chinese Threat Actor to Compromise Systems

Ivanti Secure VPN Zero-Day Vulnerabilities Allow Chinese Threat Actor to Compromise Systems

Two zero-day vulnerabilities have been discovered in Ivanti Secure VPN, a popular VPN solution used by organizations worldwide. The vulnerabilities are currently being exploited in the wild by at least one Chinese nation-state threat actor dubbed UTA0178. The chaining of the two vulnerabilities allow any attacker to execute remote code without any authentication and compromise affected systems. What are the Ivanti Secure VPN zero-day vulnerabilities? Ivanti published an official security advisory and knowledge base article…

Read More

Uncertainty Is the Biggest Challenge to Australia’s Cyber Security Strategy

Uncertainty Is the Biggest Challenge to Australia’s Cyber Security Strategy

Just the highlights Australia’s cyber security vision extends to 2030, with two federal elections occurring in that time frame. A lack of bipartisan agreement means businesses don’t have certainty on the long-term vision. A change in government might disrupt the later starters of the vision. The Australian government announced the 2023-2030 Australian Cyber Security Strategy, which aims to “help realise the Australian Government’s vision of becoming a world leader in cyber security.” Overall, the strategy…

Read More

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence

Risk mitigation tips are provided for each of these cybersecurity threats. Cybersecurity company ESET released its H2 2023 threat report, and we’re highlighting three particularly interesting topics in it: the abuse of the ChatGPT name by cybercriminals, the rise of the Lumma Stealer malware and the Android SpinOk SDK spyware. Jump to: ChatGPT name is being abused by cybercriminals In the second half of 2023, ESET has blocked 650,000 attempts to access malicious domains whose…

Read More

Third-Party Supply Chain Risk a Challenge for Cyber Security Professionals in Australia

Third-Party Supply Chain Risk a Challenge for Cyber Security Professionals in Australia

Third-party supply chain risk is a key concern from Australian cyber security professionals. With enterprises typically relying on an expanding network of interconnected systems — often suppliers of suppliers — it is becoming difficult to maintain data control to ensure security. Tesserent CEO Kurt Hansen said security professionals need strong governance and processes to ensure they are aware of all business activities. He added they need to be more conscious of how geopolitical tensions could…

Read More

BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort

BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort

The ransomware group, which has distributed ransomware to more than 1,000 victims, reportedly recovered control of its website on Tuesday. Learn how to defend against ransomware. Image: Adobe/igor.nazlo On Dec. 19, the Department of Justice announced the FBI had been working on a disruption campaign against the ransomware group known as ALPHV, Noberus or BlackCat that resulted in the seizure of several of the group’s websites, visibility into their network and a decryption tool that…

Read More

How Education Institution Technology Needs to Evolve

How Education Institution Technology Needs to Evolve

The 2023 Education Summit event – co-hosted by Cisco and CAUDIT – provided higher education technology leaders an opportunity to gain new insights and perspectives on some of the rapid technology innovation and developments that will continue to transform the sector. The summit also provided delegates with a chance to share their experiences and to engage with peers from the sector. While Australia’s higher education institutions have a major role to play in harnessing digital…

Read More

Securing AI: Navigating the Complex Landscape of Models, Fine-Tuning, and RAG

Securing AI: Navigating the Complex Landscape of Models, Fine-Tuning, and RAG

Almost overnight, Artificial Intelligence (AI) has become a priority for most organizations. A concerning trend is the increasing use of AI by adversaries to execute malicious activities. Sophisticated actors leverage AI to automate attacks, optimize breach strategies, and even mimic legitimate user behaviors, thereby escalating the complexity and scale of threats. This blog discusses how attackers might manipulate and compromise AI systems, highlighting potential vulnerabilities and the implications of such attacks on AI implementations. By…

Read More

How to Use Google's Titan Security Keys With Passkey Support

How to Use Google's Titan Security Keys With Passkey Support

Google’s updated Titan Security Keys can serve as a multifactor authenticator and store passkeys to replace passwords. Google announced the availability of Titan Security Keys with passkey support in mid-November 2023; the initial Titan Security Keys edition was used solely for multifactor authentication. Security keys offer a tangible token in the form of a device you may attach to a keyring and place in a pocket. For many people, a security key can be easier…

Read More

Cybersecurity career training for the real world

Cybersecurity career training for the real world

Riccardo Nobili’s passion for cybersecurity career training is palpable. Not only is Nobili the Head of Network at Leroy Merlin, a global home improvement and gardening retailer, but he is also a Cisco Networking Academy instructor where he enables students to become future cybersecurity defenders. If you’re also passionate about cybersecurity, check out our open opportunities. Scalable: Networks and student growth As the Head of Network at Leroy Merlin, Nobili is accountable for all parts…

Read More
1 19 20 21 22 23 29