• Brazil Blocks Meta’s AI, Ethereum Newsletter Hacked, HFS Hackathon
    Jul 5 2024

    In today's episode, we explore the exploitation of HTTP File Server (HFS) vulnerabilities by hackers leveraging CVE-2024-23692 to drop malware and Monero miners (https://www.bleepingcomputer.com/news/security/hackers-attack-hfs-servers-to-drop-malware-and-monero-miners/). We also discuss Brazil's temporary ban on Meta's AI data processing due to privacy concerns and its impact on AI development in the region (https://thehackernews.com/2024/07/brazil-halts-metas-ai-data-processing.html). Lastly, we cover the Ethereum mailing list breach, which exposed 35,000 users to a crypto-draining phishing attack (https://www.bleepingcomputer.com/news/security/ethereum-mailing-list-breach-exposes-35-000-to-crypto-draining-attack/).

    Video Episode: https://youtu.be/WLbxQW5oxO8

    Sign up for digestible cyber news delivered to your inbox: news.thedailydecrypt.com

    Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/

    Logo Design by https://www.zackgraber.com/

    Tags

    Hackers, Monero, AhnLab, CVE-2024-23692, Brazil, Meta, AI data processing, Privacy, Phishing, Ethereum, Lido DAO, Safeguard

    Search Phrases
    1. How hackers exploit HFS vulnerabilities
    2. Monero mining malware spread by hackers
    3. AhnLab CVE-2024-23692 cybersecurity warning
    4. Protecting HFS from CVE-2024-23692
    5. Brazil stops Meta AI data processing
    6. Privacy risks in AI data processing
    7. Meta AI data processing ban in Brazil
    8. Ethereum phishing attack on 35,000 users
    9. Preventing phishing in crypto wallets
    10. Lido DAO collaboration phishing scam
    Show More Show Less
    7 mins
  • Infostealer Logs Unmask Pedophiles, Twilio API Hack, Rockwell Device Vulnerabilities
    Jul 4 2024

    In today's episode, we discuss how infostealer malware logs helped Recorded Future's Insikt Group identify 3,324 unique accounts involved in child sexual abuse activities (https://www.bleepingcomputer.com/news/security/infostealer-malware-logs-used-to-identify-child-abuse-website-members/). We also unpack the Twilio Authy API breach, where an unauthenticated endpoint exposed millions of MFA user phone numbers, making them vulnerable to SIM swapping attacks (https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/). Lastly, Microsoft researchers warn of critical vulnerabilities in Rockwell Automation PanelView Plus devices that could lead to remote code execution and denial of service attacks if not properly patched (https://www.cybersecuritydive.com/news/microsoft-warns-risk-rockwell-automation/720608/).

    Video Episode: https://youtu.be/cEplej8E11k

    Sign up for digestible cyber news delivered to your inbox: news.thedailydecrypt.com

    Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/

    Logo Design by https://www.zackgraber.com/

    Tags: Recorded Future, malware, infostealer, child sexual abuse material, CSAM, law enforcement, Twilio, API endpoint, Authy, MFA, SIM swapping, Microsoft, Rockwell Automation, PanelView Plus, vulnerabilities, cyber security, stolen credentials, hackers, denial-of-service, industrial operations

    Search Phrases:

    1. Recorded Future infostealer investigation
    2. malware logs exposing CSAM offenders
    3. Twilio unsecured API vulnerability
    4. Authy MFA phone number breach
    5. SIM swapping attack prevention
    6. Microsoft Rockwell Automation vulnerabilities
    7. protecting PanelView Plus devices
    8. critical vulnerabilities in industrial devices
    9. law enforcement using stolen malware logs
    10. safeguarding against API endpoint breaches
    Show More Show Less
    9 mins
  • 700,000 OpenSSH Servers at Risk, TeamViewer Breach, Cisco Zero-Day – CyberSecurity news
    Jul 2 2024

    In today's episode, we discuss TeamViewer's security breach by Midnight Blizzard, who extracted encrypted employee credentials but left customer data untouched (https://www.cybersecuritydive.com/news/teamviewers-breached-employee-credentials/720306/). We also cover Cisco's response to a zero-day flaw in NX-OS exploited by the Velvet Ant cyberespionage group to install custom malware (https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP). Additionally, we explore the critical OpenSSH vulnerability, "regreSSHion," putting 700,000 servers at risk of remote code execution attacks (https://www.cybersecuritydive.com/news/openssh-remote-code-cve/720315/).

    Video Episode: https://youtu.be/sX082aW6clg

    Sign up for digestible cyber news delivered to your inbox: news.thedailydecrypt.com

    Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/

    Logo Design by https://www.zackgraber.com/

    Tags

    TeamViewer, Midnight Blizzard, breach, cyber threats, cybersecurity, employee data, network security, Velvet Ant, Cisco, NX-OS, CVE-2024-20399, vulnerability, OpenSSH servers, remote code execution, Qualys

    Search Phrases
    1. TeamViewer breach by Midnight Blizzard
    2. Midnight Blizzard cyber attack
    3. TeamViewer data security incident
    4. Velvet Ant Cisco NX-OS vulnerability
    5. Cisco NX-OS zero-day exploit
    6. CVE-2024-20399 patch details
    7. Critical OpenSSH server vulnerability
    8. Qualys remote code execution vulnerability
    9. Securing OpenSSH servers against regreSSHion
    10. Modern cybersecurity threats 2024
    Show More Show Less
    5 mins
  • Former IT Employee Data Breach, Critical D-Link Router Flaw, Microsoft Discloses More
    Jul 1 2024

    In today's episode, we discuss hackers exploiting a critical vulnerability in D-Link DIR-859 routers (CVE-2024-0769), compromising user credentials (source: https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-d-link-dir-859-router-flaw-to-steal-passwords/). We also cover Microsoft's recent notification about the widespread impact of Midnight Blizzard's password-spray attacks on enterprise emails (source: https://www.cybersecuritydive.com/news/microsoft-customers-compromised-threat-group/720173/). Lastly, we highlight a data breach at Geisinger, affecting over 1 million patients due to unauthorized access by a former Nuance employee (source: https://www.geisinger.org/about-geisinger/news-and-media/news-releases/2024/06/24/18/17/geisinger-provides-notice-of-nuances-data-security-incident).

    Video Episode: https://youtu.be/17B6IbSaarg

    Sign up for digestible cyber news delivered to your inbox: news.thedailydecrypt.com

    Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/

    Logo Design by https://www.zackgraber.com/

    Tags: Hackers, D-Link DIR-859, flaw, passwords, routers, network security, Microsoft, Midnight Blizzard, Sunburst attacks, enterprise email, cyber threats, Geisinger, data breach, sensitive data, IT security

    Search Phrases:

    1. How to secure D-Link DIR-859 router
    2. Hackers exploiting D-Link router flaws
    3. Midnight Blizzard Microsoft email breach
    4. Sunburst attacks enterprise impact
    5. Geisinger data breach patient safety
    6. Identifying misuse after a data breach
    7. Microsoft enterprise email vulnerability
    8. Protecting sensitive data from hackers
    9. Steps to secure outdated routers
    10. Recognizing red flags in data records
    Show More Show Less
    Less than 1 minute
  • I like to MOVEit MOVEit, Apple AirPods Eavesdropping, GitHub Credentials EXPOSED
    Jun 27 2024

    In today's episode, we delve into the recent vulnerabilities disclosed by Progress Software affecting MOVEit file-transfer service, explore how Apple patched a Bluetooth vulnerability in AirPods that could allow eavesdropping, and discuss Aqua Security's findings on the long-term exposure of sensitive data in Git repositories. For detailed information, visit the articles at https://www.cybersecuritydive.com/news/moveit-file-transfer-cves/719933/, https://thehackernews.com/2024/06/apple-patches-airpods-bluetooth.html, and https://www.helpnetsecurity.com/2024/06/26/git-exposed-secrets/. Join us to understand the implications and recommended actions to protect your data.

    Sign up for digestible cyber news delivered to your inbox: news.thedailydecrypt.com

    Video Episode: https://youtu.be/CEvyUdyil_A

    Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/

    Logo Design by https://www.zackgraber.com/

    Cyberattacks, vulnerabilities, MOVEit, Progress Software, Apple, Bluetooth, AirPods, eavesdropping, Aqua Security, GitHub repositories, sensitive data, credentials, API tokens, cybersecurity, digital threats

    How to protect against MOVEit vulnerabilities, Apple fixes Bluetooth vulnerability in AirPods, preventing eavesdropping in AirPods, cybersecurity tips for MOVEit, Progress Software vulnerabilities update, Aqua Security reveals GitHub repository risks, securing sensitive data on GitHub, credentials exposed on GitHub, safeguarding against digital eavesdroppers, protecting sensitive data in software development

    Show More Show Less
    Less than 1 minute
  • Fake Crypto Recovery Firms, WordPress Plugins Backdoored, WikiLeaks Julian Assange Released
    Jun 26 2024

    In today's episode, we discuss the FBI's latest warning about fake law firms scamming crypto victims: https://www.bleepingcomputer.com/news/security/fbi-warns-of-fake-law-firms-targeting-crypto-scam-victims/. Also, we cover Julian Assange's release from a U.K. prison and subsequent move to Australia: https://apnews.com/article/assange-plea-deal-wikileaks-justice-department-d329ba4614dbfa77b5eb968d07fd9bd0. Lastly, we delve into compromised WordPress plugins creating rogue admin accounts and injecting SEO spam: https://thehackernews.com/2024/06/multiple-wordpress-plugins-compromised.html.

    Video Episode: https://youtu.be/CvDQHJ2mQac

    00:00 - Intro

    01:13 - FBI Alerts on Fake Crypto Recovery Firms

    03:34 - WordPress Plugins Backdoored: Rogue Admins Created

    06:36 - Julian Assange Released, Heads to Australia

    Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/

    Logo Design by https://www.zackgraber.com/

    Tags:

    Cybercriminals, cryptocurrency, FBI, law firms, WikiLeaks, Julian Assange, U.S. Department of Justice, plea deal, WordPress, hackers, plugins, compromised, podcast, crypto fraud, cybersecurity, software supply chain attack, website security, legal news, international law, classified information

    Search Phrases:

    1. How to identify crypto fraud recovery scams
    2. Cybercriminals posing as law firms for cryptocurrency scams
    3. FBI warnings on crypto fraud
    4. Julian Assange U.S. Department of Justice plea deal
    5. WikiLeaks founder Julian Assange release news
    6. Signs of compromised WordPress plugins
    7. Recent WordPress plugin backdoor attacks
    8. Protecting WordPress sites from hackers
    9. Latest podcast on cybersecurity and legal news
    10. Updates on Julian Assange legal saga
    Show More Show Less
    Less than 1 minute
  • Rafel RAT Android Threats, Russian AI Influence, Europcar Fake Data Breach
    Jun 25 2024

    In today's episode, we explore the widespread deployment of the open-source Android malware 'Rafel RAT,' its exploitation by threat actors like APT-C-35 (DoNot Team), and its impact on outdated devices, particularly Android versions 11 and older. We also explore the influence network CopyCop, potentially aligned with the Russian government, which has pivoted its focus to the 2024 US elections using AI-generated content and fake journalist personas. Lastly, we cover the Energy Department’s cybersecurity guidelines for suppliers and end users to combat rising threats in the manufacturing sector, and the growing trend of fake data breaches, exemplified by the Europcar incident, where hackers manipulated generative AI to create counterfeit customer data.

    Video Episode: https://youtu.be/kU4OOHtB7cM

    Learn more:

    • https://www.bleepingcomputer.com/news/security/rafel-rat-targets-outdated-android-phones-in-ransomware-attacks/
    • https://www.recordedfuture.com/copycop-expands-to-cover-us-elections-target-political-leaders
    • https://www.cybersecuritydive.com/news/energy-department-cybersecurity-manufacturing-supply-chain-best-practices/719612/
    • https://www.helpnetsecurity.com/2024/06/24/faking-data-breaches/

    00:00 Intro

    01:11 Rafel RAT Exploits Outdated Android Devices

    04:02 Why Are Hackers Faking Data Breaches?

    08:07 CopyCop Targets 2024 US Elections with AI

    Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/

    Logo Design by https://www.zackgraber.com/

    Tags: Rafel RAT, Android, Malware, Ransomware, Cybersecurity, Open-source, Telegram, Cybercriminals, Attack, Outdated devices, Governments, High-profile organizations, CopyCop, Russian influence network, AI, Political content, Fake journalist personas, US elections, Manipulation, U.S. Critical Manufacturing, Cyberattack, Cybersecurity guidelines, Energy Department, Idaho National Laboratory, Europcar, Data breach, Generative AI, Hoax, Cybercriminals

    Search Phrases:

    1. How to protect Android from Rafel RAT malware
    2. Ransomware attacks using Rafel RAT
    3. Russian influence network targeting 2024 elections
    4. AI-generated political content on new websites
    5. Cybersecurity guidelines for U.S. manufacturing
    6. Europcar data breach hoax
    7. Detecting fake data breaches with AI
    8. Cyberattack frequency in critical manufacturing
    9. Steps to counter Russian influence networks
    10. New cybersecurity measures by Energy Department
    Show More Show Less
    Less than 1 minute
  • Jetflicks Piracy Convictions, Kaspersky Sanctions, UnitedHealth Ransomware Devastation
    Jun 24 2024
    In today's episode, we discuss the conviction of five men behind the illegal streaming service Jetflicks (https://www.bleepingcomputer.com/news/legal/five-men-convicted-for-operating-illegal-streaming-site-jetflicks/), the U.S. Treasury's sanctions on 12 Kaspersky executives following a software ban (https://thehackernews.com/2024/06/us-treasury-sanctions-12-kaspersky.html), and the details of the Change Healthcare ransomware attack that exposed sensitive medical data for millions (https://www.bleepingcomputer.com/news/security/change-healthcare-lists-the-medical-data-stolen-in-ransomware-attack/). We cover the implications of these events on national security, legal consequences, and the impact on affected individuals. 00:00 Intro 01:00 Five Men Convicted for Jetflicks Piracy Empire 03:30 U.S. Treasury Targets 12 Kaspersky Execs in Sanctions 06:06 UnitedHealth Confirms Massive Data Breach Details 09:56 Outro Video Episode: https://youtu.be/gEFHGaSbbCI Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags: Jetflicks, illegal streaming service, pirated, FBI, movie piracy, TV show piracy, online piracy, streaming crackdown, illicit streaming, cybersecurity, U.S. Treasury, sanctions, Kaspersky, cyber threats, ransomware attack, UnitedHealth, Change Healthcare, health data breach, personal information theft, medical data theft Search Phrases: How did Jetflicks operate as an illegal streaming serviceTactics used by Jetflicks for piracyFBI shuts down Jetflicks streaming serviceImpact of Jetflicks on movie and TV industryU.S. Treasury sanctions on Kaspersky executivesCyber threats from Kaspersky cybersecurity banDetails on the Change Healthcare ransomware attackUnitedHealth data breach impactTypes of information stolen in Change Healthcare attackConsequences of UnitedHealth's health data breach Five men convicted for operating illegal streaming site Jetflicks https://www.bleepingcomputer.com/news/legal/five-men-convicted-for-operating-illegal-streaming-site-jetflicks/ Key Information: Conviction Details: A federal jury in Las Vegas convicted five individuals for operating Jetflicks, a significant illegal streaming service.Jetflicks ran from 2007 to 2019 before the FBI shut it down. Service Scale: Jetflicks offered over 10,500 movies and 183,000 TV episodes, pirated from platforms like Netflix, Hulu, and Amazon Prime.The service attracted tens of thousands of paid subscribers, providing new episodes often the day after their TV release. Financial Impact: The operation generated millions of dollars in illicit gains.The U.S. Department of Justice noted substantial financial damages to copyright owners but did not provide specific figures. Individuals Involved: Kristopher Dallmann, Douglas Courson, Felipe Garcia, Jared Jaurequi, and Peter Huber were all convicted.Dallmann faces additional charges for money laundering, making his potential sentence up to 48 years in prison.The other four face maximum sentences of five years each. Next Steps: Sentencing will be decided by a federal district court judge, with the date yet to be scheduled.` U.S. Treasury Sanctions 12 Kaspersky Executives Amid Software Ban https://thehackernews.com/2024/06/us-treasury-sanctions-12-kaspersky.html `- Sanctions Announcement: The U.S. Treasury's Office of Foreign Assets Control (OFAC) sanctioned 12 senior executives at Kaspersky Lab, following a ban by the Commerce Department on Kaspersky software and services in the U.S.Actionable Insight: Be aware of potential impacts on global cybersecurity dynamics and consider alternative security solutions if currently relying on Kaspersky products.Commitment to Cybersecurity Integrity: Brian E. Nelson, Under Secretary of the Treasury for Terrorism and Financial Intelligence, emphasized the U.S. commitment to protecting its cyber domain from malicious threats.Question for Listeners: How do you think these sanctions will affect global cybersecurity policies? Share your thoughts with us. Scope of Sanctions: Sanctions target 12 C-suite and senior-level executives but do not extend to Kaspersky Lab itself or its founder and CEO, Eugene Kaspersky.Engagement Tip: Consider discussing in your team meetings how leadership changes at major cybersecurity firms could impact your organization's security posture. List of Sanctioned Executives: Key roles affected include the COO, Deputy CEO, Chief Business Development Officer, and several vice presidents and heads of business units.Critical Implication: Monitoring the leadership shakeup can provide insights into potential changes in Kaspersky's operational strategies. Commerce Department Ban: As of July 20, 2024, Kaspersky is prohibited from offering its software and services in the U.S., having been added to the Entity List due to national security concerns.Efficiency Note: Prioritize reviewing and updating any Kaspersky-related security protocols before the ban takes effect. ...
    Show More Show Less
    Less than 1 minute