The investigation strategy proposed by JPCERT/CC covers four types of Windows Event Logs: Application, Security, System, and Setup logs.
Tag: #cyberattacks
How to manage shadow IT and reduce your attack surface
There is a reason why a lot of organizations shy away from people bringing their own devices to work. https://www.bleepingcomputer.com/news/security/how-to-manage-shadow-it-and-reduce-your-attack-surface/
Microsoft warns of ransomware attacks on US healthcare | CSO Online
The threat actor borrowed initial access from a third-party infection to effect lateral movement within the victim system and place INC encryption on their network.
The cyberattack cycle: First comes outage, next comes phishing
Threat Actors are quick to try to take advantage of tech issues, much in the same way “repair scammers” jump in after storms cause damage at homes. https://www.securityintelligence.com/news/cyberattack-cycle-first-outage-then-phishing/
Revolver Rabbit gang registers 500,000 domains for malware campaigns
A cybercriminal gang that researchers track as Revolver Rabbit has registered more than 500,000 domain names for infostealer campaigns that target Windows and macOS systems.
Don’t Fall for It: Hackers Pounce on CrowdStrike Outage With Phishing Emails | PCMag
Banks and health-care providers saw their services disrupted and TV broadcasters went offline as businesses worldwide grappled with the ongoing outage. Air travel has been hit hard, too, with planes grounded and services delayed.
Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks
“These compromised accounts serve as valuable resources, enabling the group to enhance the credibility and effectiveness of their spear-phishing efforts, establish persistence within targeted organizations, and evade detection by blending in with legitimate network traffic.”
How to Identify and Protect Against Phishing Attacks
Data brokers collect your personal information from various sources and compile detailed profiles. That’s why cybercriminals love data brokers. They hoard your info from everywhere: public records (voter rolls, property ownership), online stuff (browsing history, social media profiles, newsletter signups), and even commercial sources (loyalty programs, purchases). This intel helps them craft compelling and realistic phishing scams or impersonate you or trusted sources to steal private info or money.
Evolution of Cybercrime Investigations
Cybercrime costs trillions, rising yearly. Criminals operate globally, teaching their methods. This article explores major cyberattacks from 1962 to 2024 and how investigators use advanced technology to combat them.