CYBERSECURITY / DEFENSE / INTELLIGENCE

  • Mobile users in Brazil are the target of a new malware campaign that delivers a new Android banking trojan named Rocinante. “This malware family is capable of performing keylogging using the Accessibility Service, and is also able to steal PII from its victims using phishing screens posing as different banks,” Dutch security company ThreatFabric said. “Finally, it can use all this exfiltrated

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In the digital realm, secrets (API keys, private keys, username and password combos, etc.) are the keys to the kingdom. But what if those keys were accidentally left out in the open in the very tools we use to collaborate every day? A Single Secret Can Wreak Havoc Imagine this: It’s a typical Tuesday in June 2024. Your dev team is knee-deep in sprints, Jira tickets are flying, and Slack is

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or access sensitive data by circumventing the operating system’s permissions-based model, which revolves around the Transparency, Consent, and Control (TCC) framework. “If successful, the adversary could gain any privileges already granted to the affected

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A 57-year-old man from the U.S. state of Missouri has been arrested in connection with a failed data extortion campaign that targeted his former employer. Daniel Rhyne of Kansas City, Missouri, has been charged with one count of extortion in relation to a threat to cause damage to a protected computer, one count of intentional damage to a protected computer, and one count of wire fraud. He was

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception in February 2024, the U.S. government said. The victims span various sectors, including water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services,

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The company’s new product covers every base for digital legacies, resulting in the industry’s first truly comprehensive product.

    SafeTech Labs, a company specializing in pioneering blockchain development and technology, announced today that its releasing Inheriti® 2.0, which enables users to create secure, lasting, decentralized digital inheritance plans to pass down digital assets—anything from social media accounts to cryptocurrency to secret family recipes. The product fills a gap in the market where users have more online accounts than ever—an average of 100 according to one report—but no comprehensive means to pass them down to loved ones.

    “Existing solutions either focus too heavily on only cryptocurrency or don’t offer a secure enough solution for massive stores of cryptocurrency,” says Jürgen Schouppe, CEO and co-founder of SafeTech. “We’ve revamped Inheriti® completely so that web2 and web3 users alike can use it without any user experience challenges, regardless of whether they want to leave behind crypto keys or a poem. It’s all secured using the same patented tech.”

    The platform offers two interfaces, one for those familiar with blockchain and cryptocurrency, and another for those who aren’t. In both cases, Inheriti® utilizes a proprietary, multi-patented encryption and storage technology called Secure Share Distribution Protocol (SSDP). The technology is currently patented by SafeTech in the USA (US11316668B2), Europe (EP3654578B1), and has a patent pending in China.

    Once completed, users’ digital inheritance plans are stored in smart contracts on one of several well-known public blockchains, such as:

    • Ethereum
    • Vechain
    • Optimism
    • With more chains being added frequently.

     “Blockchain technology and smart contracts have several native features that make them the only reliable way to secure the high-value assets often involved in digital legacies,” says Schouppe.

    Version 2.0 introduces Backup Plans, a massive upgrade from V1.0 that allows users to create backups of their digital data.

    Businesses can use the feature to ensure business continuity.

    Users can stipulate that either only one or multiple share owners merge their shares to decrypt the backup plan.

    Inheriti® 2.0 also offers the following core improvements over V1.0:

    • A mobile app for secure storage of encrypted shares.
    • More extensive options to tailor each plan.
    • Total user interface (UI) overhaul for an exceptional user experience (UX).
    • Latest security enhancements.
    • Invoicing for private and business users.
    • 100% privacy regulation compliance.

    The above is in addition to the following, already-proven features that made Inheriti® V1 a success:

    • Tamper-proof data protection.
    • Military-grade encryption.
    • Fast, immutable and low-cost digital inheritance planning.
    • Plan triggers to ensure the data owner is in full agreement with releasing backed up data.

    The Inheriti® service will be available starting on August 29, 2024 and users can create their inheritance plans here: https://www.inheriti.com/.

    For more information about Inheriti® V2.0, visit https://www.inheriti.com/.

    About SafeTech Labs: SafeTech Labs is a Belgian-based technology company specializing in blockchain services, custom blockchain development, and security engineering. SafeTech Labs holds multiple patents for encryption, multiparty storage, and delivery of digitized information.

    Contact

    CEO
    Jürgen Schouppe
    SafeTech Labs
    press@safetech.io

    The post SafeTech Labs Takes Aim at $52B Digital Legacy Industry with World’s First Fully Comprehensive Digital Legacy Solution appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and attackers are becoming more sophisticated. In this high-stakes game, security leaders need every advantage they can get. That’s where Artificial Intelligence (AI) comes in. AI isn’t just a buzzword; it’s a game-changer for vulnerability management. AI is poised to revolutionize vulnerability

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note: on August 29, the FBI and CISA issued a joint advisory as part of their ongoing #StopRansomware effort to help organizations protect against ransomware. The latest advisory, AA24-242A, describes a new cybercriminal group and its attack methods. It also details three important actions to take today to mitigate

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once again underscoring how threat actors continue to exploit the trust in the open-source ecosystem to deliver malware. “By mimicking the popular ‘noblox.js’ library, attackers have published dozens of packages designed to steal sensitive data and compromise systems,” Checkmarx

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • You can spot a proficient crew with less shooting than you think.

    Go to source

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶