Cybersecurity

5968 readers
279 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
1326
1327
1328
1329
1330
1331
1332
 
 

An international coalition of police agencies have resurrected the dark web site of the notorious LockBit ransomware gang, which they had seized earlier

1333
1334
1335
19
submitted 8 months ago by kid to c/cybersecurity
1336
1337
1338
1339
1340
 
 

APT42, an Iranian cyber espionage group believed to be sponsored by the state and operating under the Islamic Revolutionary Guard Corps Intelligence Organization (IRGC-IO), employs sophisticated social engineering tactics to infiltrate networks, particularly targeting NGOs, media, academia, legal services, and activists in the West and Middle East. The group uses impersonation of journalists and event organizers to build trust and harvest credentials, which are then used to access cloud environments and exfiltrate data of strategic interest to Iran. In addition to cloud-based espionage, APT42 deploys custom backdoors, such as NICECURL and TAMECAT, through spear-phishing campaigns to establish initial access and possibly facilitate further malware deployment. These activities align with the IRGC-IO's objectives of countering foreign threats and domestic instability. APT42's operations exhibit significant overlap with other threat actors, including those identified by various cybersecurity firms. Mandiant's detailed analysis reveals APT42's extensive use of masquerading techniques, credential harvesting, and multi-factor authentication bypass, as well as their reliance on built-in features and open-source tools to reduce detection.

1341
1342
1343
1344
1345
1346
1347
1348
1349
 
 

LONDON, May 2 (Reuters) - An Israeli private investigator wanted by the United States was arrested in London over allegations that he carried out a cyberespionage campaign on behalf of an unidentified American PR firm, a London court heard on Thursday.

1350
view more: ‹ prev next ›