JPCERT shares Windows Event Log tips to detect ransomware attacks

The investigation strategy proposed by JPCERT/CC covers four types of Windows Event Logs: Application, Security, System, and Setup logs.

How to manage shadow IT and reduce your attack surface

There is a reason why a lot of organizations shy away from people bringing their own devices to work. https://www.bleepingcomputer.com/news/security/how-to-manage-shadow-it-and-reduce-your-attack-surface/

Microsoft warns of ransomware attacks on US healthcare | CSO Online

The threat actor borrowed initial access from a third-party infection to effect lateral movement within the victim system and place INC encryption on their network.

The cyberattack cycle: First comes outage, next comes phishing

Threat Actors are quick to try to take advantage of tech issues, much in the same way “repair scammers” jump in after storms cause damage at homes. https://www.securityintelligence.com/news/cyberattack-cycle-first-outage-then-phishing/

Revolver Rabbit gang registers 500,000 domains for malware campaigns

A cybercriminal gang that researchers track as Revolver Rabbit has registered more than 500,000 domain names for infostealer campaigns that target Windows and macOS systems.

Don’t Fall for It: Hackers Pounce on CrowdStrike Outage With Phishing Emails | PCMag

Banks and health-care providers saw their services disrupted and TV broadcasters went offline as businesses worldwide grappled with the ongoing outage. Air travel has been hit hard, too, with planes grounded and services delayed.

Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks

“These compromised accounts serve as valuable resources, enabling the group to enhance the credibility and effectiveness of their spear-phishing efforts, establish persistence within targeted organizations, and evade detection by blending in with legitimate network traffic.”

Six Types of Social Engineering Attacks

Some examples of social engineering attacks include phishing, pretexting, scareware, baiting, vishing, smishing and CEO fraud. If you are unsure what qualifies as social engineering, imagine how many ways someone can manipulate you to reveal private information. Threat actors use these psychological techniques, both in person and online, to gain access to your personal or organizational information. These bad actors can install malware on your device, steal your information and even take your identity.

How to Identify and Protect Against Phishing Attacks

Data brokers collect your personal information from various sources and compile detailed profiles. That’s why cybercriminals love data brokers. They hoard your info from everywhere: public records (voter rolls, property ownership), online stuff (browsing history, social media profiles, newsletter signups), and even commercial sources (loyalty programs, purchases). This intel helps them craft compelling and realistic phishing scams or impersonate you or trusted sources to steal private info or money.

Evolution of Cybercrime Investigations

Cybercrime costs trillions, rising yearly. Criminals operate globally, teaching their methods. This article explores major cyberattacks from 1962 to 2024 and how investigators use advanced technology to combat them.