👥 🤝 An organic relationship between the #Rhysida and #ViceSociety ransomware teams? We are almost certain that it exists. The reasons❓ 🔷 Firstly, have a look at the Vice Society & Rhysida #IOCs on our GitHub: https://lnkd.in/eSZxnjVx 🔶 Secondly, you can have a look at our supporting findings in the graphics below 👇 Based on these findings, we assess the situation with two potential hypotheses that are expected to happen in the following weeks/months: 1️⃣ As the Vice Society team recently gained too much attention from the Law Enforcement community, they must divert it to continue their operations. Therefore, we anticipate they will soon shut down Vice Society and focus on the Rhysida team. 2️⃣ They will have sold their business and notorious name to other threat actors. In this situation, we will independently track two separate threat activity clusters and migrate the TTPs from the Vice Society to the Rhysida. 👉 We expect the first option is likely to happen. So keep an eye on our updates to stay informed about the newest developments! #ransomware #cybersecurity #securityupdate #threatintelligence
PRODAFT’s Post
Others also viewed
-
Attacking network protocols ebook Part1 part 2 in my profile: https://lnkd.in/dymeMsG2 #infosec #infosecurity #cybersec #cybersecurity #ethicalhacking #penetrationtesting #pentesting #bugbounty #bugbountytips #kalilinux #hacking #hacker #androidsecurity #android #apk #apktesting #privilegeescalation #privilegedaccessmanagement #bugcrowd #vulnerability
To view or add a comment, sign in
-
Attacking network protocols ebook Part2 #infosec #infosecurity #cybersec #cybersecurity #ethicalhacking #penetrationtesting #pentesting #bugbounty #bugbountytips #kalilinux #hacking #hacker #androidsecurity #android #apk #apktesting #privilegeescalation #privilegedaccessmanagement #bugcrowd #vulnerability
To view or add a comment, sign in
-
Last time, took MGT-478, recently joined the MGT-473, Organizational Cybersecurity Information Sharing, organized by CIAS-ISAO (cooperation with DHS-FEMA). Its a very good training. . Very good session, a free training by the way. They have NCPC, National Cybersecurity Preparedness Consortium. . I think, Malaysia, Its time. . Free training or courses doesnt mean no quality, sometimes paid training or courses have less value to make us more competent, just a “Certified”. How “Certified” is “Certified”, it depends on you.
To view or add a comment, sign in
-
-
Want to get into Cybersecurity, look at this summarized study. You've got oppoturnity. Use information wisely and to your advantage.
These statistics from a research by AccessCyber give some interesting insights to entry-level cybersecurity jobs. Take a minute to check it out and see if something interests you.
To view or add a comment, sign in
-
who is ready for the next generation of how we work in cybersecurity? You may have heard about Microsoft copilot, the GPT AI powered assistant that is coming to Microsoft 365 soon. This is only the beginning, i am VERY excited to try out Security Copilot that is currently in private preview. If you've ever worked in a Security Operations Center, you know it can feel like mayhem with more open browser tabs than you can count, and alerts and incidents popping up all the time. Security Co-pilot is different. It helps you simplify and focus. Here are some of the key features that we know of so far: 1️⃣ Defend with AI security: Amplify your team’s impact and efficiency with AI security guidance informed by 65 trillion daily signals. 2️⃣ Simplify the complex: During an attack, complexity can cost you. Microsoft Security Copilot synthesizes data from multiple sources into clear, actionable insights, enabling you to respond to incidents in minutes instead of hours or days. 3️⃣ Catch what others miss: Triage signals at machine speed, surface threats early, and get predictive guidance to help you thwart an attacker’s next move. 4️⃣ Address the talent gap: The demand for skilled defenders vastly exceeds the supply. Help your team make the most impact and build their skills with step-by-step instructions for mitigating risks. 5️⃣ Turn questions into action: Ask Security Copilot questions in natural language and receive actionable responses. You can ask for a summary of a vulnerability, or you can feed in files, URLs, or code snippets and ask for information about them. 6️⃣ Immutable audit trail: Security Co-Pilot provides an immutable audit trail so that an organization can always go back into the investigation to understand exactly what data went in and what came out. 7️⃣ Collaboration and feedback: You can share your findings, export them, and collaborate on them with others. If you find something that's useful to your team, you can pin it to the pin board. Your pin board holds the responses as you work through an investigation. This is a game-changer for organizations looking to bolster their security posture. By leveraging the power of AI, we can detect threats, manage incidents, and improve security more efficiently than ever before. With Security Co-Pilot, you can do in minutes what used to take all day. Learn more about Microsoft Security Copilot with the link in the comments. #Microsoft #Cybersecurity #AI #SecurityCopilot #healthcareit #healthcarecybersecurity #k12it #fintech #manufacturingit #higheredit
To view or add a comment, sign in
-
-
Discover 977 concealed methods, seldom revealed by your IT manager or provider, indicating the compromise of the products they sell you. If every lock on your doors and windows failed to function, and the CCTV system remained deactivated, would you dare to depart from your dwelling, leaving behind all your precious possessions? How do you rest assured that what data is precious to you and your customers is secured ?
🚀 Cybersecurity Alert: Unveiling 977 Known Exploited Vulnerabilities 🚀 💡 Discover the Top 12 Vulnerable Technology Categories 💡 1. Operating System - 235 entries (Windows, Linux, Apple OS...) 2. Network Devices - 182 entries (Cisco, Fortinet, F5, etc.) 3. Browser - 96 entries (Microsoft Edge/IE, Mozilla, Google chrome...) 4. Productivity Software - 66 entries (Microsoft Office, Atlassian confluence...) 5. Development Platform - 65 entries (.net, Adobe Coldfusion...) 6. Open Source Software - 51 entries 7. Email - 34 entries (Microsoft Exchange, Zimbra...) 8. Mobile Devices - 32 entries (Samsung Electronics, Apple IOS) 9. Browser Plug-in - 31 entries (Adobe flash) 10. Content Management System - 23 entries (WordPress, Drupal Project...) 11. Virtualization - 20 entries (VMware, Oracle...) 12. Security Tools - 19 entries (Microsoft defender, Trend Micro...) 🔍 Dive into Interactive Data Visualization by Patrick Garrity: https://lnkd.in/g5xG5CEv #CybersecurityInsights #ProtectYourNetwork #StaySafeOnline #InfoSec #DataViz #VulnerabilityManagement
To view or add a comment, sign in
-
When people ask me "how can I learn ethical hacking?", I point them to my favourite resources 📚 They are all free (or have a free option) and I always stress that the primary constraint is time, not money ⏳ If you get through all of these practical resources (you won't), there's also list of my favourite video creators in the security space 😉 Check out the full list here: https://lnkd.in/e2TA4Zk8 💜 #ctf #capturetheflag #web #websecurity #bugbounty #pentesting #ethicalhacking #cybersecurity #infosec #resources
To view or add a comment, sign in
-
-
My latest research has been published on Picus Security blog. Securing macOS: A Closer Look At Built-In macOS Application Security https://lnkd.in/dsjtiPni
To view or add a comment, sign in
-
Incident Response & Digital Forensics @ITI || SOC Analyst || NTI Trainee || Security Analyst || BARQ Systems Trainee || CYLERT SOC Internship || CCNAv7 || Top 2% TryHackMe || SIEM (Splunk - ELK)
LetsDefend - SOC202 - FakeGPT Malicious Chrome Extension This incident response report investigates and analyzes a Chrome extension alert linked to a malicious extension named "ChatGPT For Google." The alert was triggered by the suspicious addition of the extension, suggesting a potential security threat. The analysis uncovered that the malicious extension impersonated ChatGPT and targeted Facebook accounts. Although it was removed from the Chrome Web Store, many users had already installed it, raising concerns about the impact on their accounts and personal information. The extension's network activity confirmed its malicious nature, presenting a significant risk to users. The report emphasizes the importance of understanding such threats and implementing recommended security measures for better protection in the future. 🔗Link: https://lnkd.in/dpUTVxGa Protect Your Digital Presence & Stay Cyber Safe. . . . #letsdefend #socanalyst #incidentresponse
SOC202 - FakeGPT Malicious Chrome Extension
0xelshazly.github.io
To view or add a comment, sign in
-
Hello everyone, In my report, I will be analyzing the tactics, techniques, and procedures (TTP) of Reg.exe by simulating it using the Atomic Red Team tool and observing its activities within various security loggers and system logs. This analysis aims to provide insights into how adversaries leverage Reg.exe, allowing organizations to better detect and prepare against potential attacks. I would like to thank my InfinitumIT teammates for their contributions to my report. I hope this report proves beneficial to the cybersecurity community. #Cybersecurity #LoLBiN #ThreatAnalysis #Splunk #CrowdStrike #WindowsLogs #CyberDefense #DigitalThreats #ThreatHunting
To view or add a comment, sign in