Parler, a social network used to plan the storming of the U.S. Capitol last week, has been hit by a massive data leak. Researchers collected swaths of user data before Parler got kicked from various service providers. I am now crawling URLs of all videos uploaded to Parler. Sequentially from latest to oldest. VIDXXX.txt files […]
A suspected Russia-led cyberattack that reportedly breached several U.S. government agencies seemingly exploited software from Texas-based software company SolarWinds, with malware pushed via booby-trapped updates. Orion—is used by “hundreds of thousands of organizations globally,” The Associated Press (AP) reported on Sunday. Shares of SolarWinds (NYSE:SWI) have gotten crushed today, down by 17% as of 12:05 […]
#1 – Disable Macros One of the most-used initial access attacks is macros. The question an organization needs to ask themselves is: do we really need macros at all? #2 – Disable Extensions Another useful thing you can do that is really easy to implement is to disable the execution of typical phishing extensions. A […]
Microsoft has issued a warning about Adrozek, a new strain of browser modifier that, according to the company, “adds browser extensions, modifies a specific DLL per target browser, and changes browser settings to insert additional, unauthorized ads into web pages.” Once installed, the malware makes changes to several browser extensions and .DLLs. Both Firefox and […]
Ransomware attacks reported against US K-12 schools jumped from 28% in January through July to 57% in August and September. “Cyber actors likely view schools as targets of opportunity, and these types of attacks are expected to continue through the 2020/2021 academic year. These issues will be particularly challenging for K–12 schools that face resource […]
Whats the key differences and how to approach them both.
Potential lateral movement around your network could be devastating!
Threat Actors evolve monthly, Shouldn’t Your Security?