(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Continue ReadingAuthor: GRC Hive Admin
SSH “regreSSHion” Remote Code Execution Vulnerability in OpenSSH., (Mon, Jul 1st)
Qualys published a blog posts with details regarding a critical remote code execution vulnerability [1] This week is far from ideal to have to deal with a critical vulnerability in widely used software like OpenSSH. So
Continue ReadingSupport of SSL 2.0 on web servers in 2024, (Fri, Jun 28th)
We last discussed SSLv2 support on internet-exposed web servers about a year ago, when we discovered that there were still about 450 thousand web servers that supported this protocol left on the internet[1]. We also found
Continue ReadingISC Stormcast For Friday, June 28th, 2024 https://isc.sans.edu/podcastdetail/9040, (Fri, Jun 28th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Continue ReadingRussia-Linked CopyCop Expands to Cover US Elections, Target Political Leaders
Insikt Group's report reveals that CopyCop, a likely Russian government-aligned influence network, has shifted its focus to the 2024 US elections. Using AI and inauthentic websites, CopyCop creates and spreads political content. The network registered 120
Continue ReadingChinese State-Sponsored RedJuliett Intensifies Taiwanese Cyber Espionage via Network Perimeter Exploitation
From November 2023 to April 2024, Insikt Group identified cyber-espionage activities conducted by RedJuliett, a likely Chinese state-sponsored group, primarily targeting government, academic, technology, and diplomatic organizations in Taiwan. RedJuliett exploited known vulnerabilities in network edge
Continue Reading5 Threat Intelligence Solution Use Cases
Cyber threats are becoming increasingly sophisticated and frequent, making it imperative for organizations to leverage cyber threat intelligence to stay ahead of potential cyber attacks. Organizations across all industries are recognizing the importance of implementing robust
Continue ReadingSombres Influences: Russian and Iranian Influence Networks Target French Elections
SummaryInsikt Group's research assesses that Russian and Iranian influence networks are targeting the upcoming French elections, and so far, they are having a negligible impact. The Russia-linked Doppelgnger network uses cloned websites and social media bots
Continue ReadingCaught in the Net: Using Infostealer Logs to Unmask CSAM Consumers
SummaryIn this proof-of-concept report, Recorded Future's Identity Intelligence analyzed infostealer malware data to identify consumers of child sexual abuse material (CSAM). Approximately 3,300 unique users were found with accounts on known CSAM sources. A notable 4.2%
Continue ReadingIsrael-Hamas Conflict and US Elections Drive Violent Extremist Threats in 2024
The ongoing Israel-Hamas conflict, the upcoming 2024 US presidential election, and the rise of violent extremist content online are likely to escalate homegrown and domestic violent extremist (HVE and DVE) threats. HVEs and DVEs are expected
Continue Reading