Lara De Jong
-

The Dawn of Quantum Computing: A New Era for Cybersecurity?
An exploration of the profound implications of quantum computing on cybersecurity and the development of quantum-resistant solutions.
-

The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations
Security Operations Centers (SOCs) are struggling to keep pace with the volume of daily alerts, often dedicating significant time to false positives and reactive adjustments to detection rules. A lack of environmental context and relevant threat intelligence hampers analysts’ ability to efficiently verify malicious alerts, leading to excessive manual triage of benign notifications. Addressing the…
-

Microsoft’s Urgent Patch Addresses Critical Windows RCE Vulnerability
Microsoft has released an emergency out-of-band patch to address a critical remote code execution (RCE) vulnerability in Windows (CVE-2023-38831). The issue, discovered by Google TAG and attributed to North Korea-linked “Royal Icing,” is actively exploited and allows attackers to execute arbitrary code. Users are urged to apply the patch immediately and exercise caution with suspicious…
-

LinkedIn’s AI Data Training Sparks Privacy Concerns in Europe
LinkedIn’s use of European user data for AI training has triggered significant privacy concerns and regulatory scrutiny across the EU, highlighting the ongoing debate on data consent and control in the age of artificial intelligence.
-

User of Phishing Platform LabHost Sentenced to 300 Days in Prison
A Dutch court has sentenced a 37-year-old man to 300 days in prison, with 226 days suspended, for utilizing the sophisticated phishing-as-a-service platform, LabHost. The ruling underscores the serious legal ramifications for individuals who engage with criminal infrastructure designed to facilitate online fraud.
-

TruffleNet Infrastructure Abuses AWS for Large-Scale Financial Fraud
An attacker infrastructure named TruffleNet is using stolen credentials and open-source tools to systematically compromise AWS environments, abusing the AWS Simple Email Service (SES) for Business Email Compromise (BEC) attacks and financial fraud.
-

Cloudflare Data Shows Major Internet Shifts in Turkmenistan, Corroborating Reports of Unblocking and Firewall Testing
Cloudflare’s network data reveals a significant increase in HTTP requests from Turkmenistan starting mid-June 2024, aligning with reports of the nation unblocking billions of IP addresses. The analysis also uncovers major shifts in TCP connection patterns, suggesting the possible testing of a new national firewall system.
-

Remote Monitoring Tools Weaponized in Escalating Cargo Freight Hijacks
Threat actors are increasingly weaponizing legitimate remote monitoring and management (RMM) tools to hijack cargo freight, leading to significant disruptions in global supply chains. This sophisticated cyber-physical attack strategy involves compromising broker load boards, deploying phishing campaigns, and leveraging RMM tools to orchestrate the physical theft of goods, often in collaboration with organized crime groups.…
-

SleepyDuck Malware Redefines C2 Resilience with Ethereum Blockchain
A dangerous new remote access trojan (RAT), dubbed SleepyDuck, is leveraging an Ethereum blockchain contract to maintain an incredibly resilient command and control (C2) infrastructure. This isn’t just another piece of malware; it’s a sophisticated threat that can update its C2 server address on the fly, making it notoriously difficult to shut down. This innovative,…
-

New Vulnerabilities Found in Windows Graphics Core, Raising Security Concerns
Security researchers have uncovered critical vulnerabilities in Microsoft’s Windows Graphics Device Interface (GDI), potentially allowing remote code execution and information disclosure. Patches have been released, but continuous vigilance is crucial for Windows users.
