On January 21, a threat actor posted in a forum selling the source code of an Android bot.
Cybersixgill's Adi Bleih uncovers how for just $300, purchasers can use malware to gain access to Android devices. Visit C6G News: https://hubs.ly/Q01zLN7Q0
Continuously exposing the earliest indications of risk. http://news.cybersixgill.com
On January 21, a threat actor posted in a forum selling the source code of an Android bot.
Cybersixgill's Adi Bleih uncovers how for just $300, purchasers can use malware to gain access to Android devices. Visit C6G News: https://hubs.ly/Q01zLN7Q0
Some scammers are gaming the cybersecurity certification process by faking diplomas, cheating on exams, and leaking courses on the deep and dark web.
Visit Cybersixgill News to learn more: https://hubs.ly/Q01zLglT0
RT @DanPatterson@twitter.com
Some scammers are gaming the cybersecurity certification process by faking diplomas, cheating on exams, and leaking courses on the deep and dark web. https://news.cybersixgill.com/cybersecurity-certification-fraud-ciso/ via @Cybersixgill@twitter.com
🐦🔗: https://twitter.com/DanPatterson/status/1620393183116148737
Cybersixgill's Gabi Reish made an appearance on TechTime's podcast - a platform that provides daily news coverage in business and tech.
Reish talks about the main cyber threats of 2023, how cyber attackers use AI, and much more!
Listen here: https://hubs.ly/Q01zG3ht0
In 2022, an estimated 22 billion private records were exposed in publicly disclosed data breaches.
Cybersixgill's Delilah Schwartz uncovers what happens when banks, insurance providers, and cellphone data companies fall victim to a data breach, in light of #DataPrivacyWeek!
Cybersixgill discovered a Windows-specific vulnerability in the Git GUI tool, allowing attackers to execute malicious code on vulnerable systems.
Ilana Touboul & Ebin Sandler uncover the details in our latest blog!
Visit C6GNews: https://hubs.ly/Q01zl0dc0
(Via @ITBrew@twitter.com)
“The cyberintelligence firm Cybersixgill found another asset that gets better-looking with age: Amazon accounts.”
Cybersixgill's @DovLerner@twitter.com weighs into the discussion of how scammers gain trust through ‘aged’ domains.
@MorningBrew@twitter.com
https://itbrew.com/stories/2023/01/24/scammers-gain-trust-through-aged-domains
Dive into the latest coverage courtesy of @CyberNews@twitter.com:
“In a recently published study of Russia and China, global cybersecurity analyst Cybersixgill highlights an increased tendency for independent threat actors.”
Over the past year, there has been an approximately 91% increase in posts advertising counterfeit banknotes to underground cybercrime markets.
Dive deep into the #DarkWeb with Cybersixgill's Adi Bleih and Dov Lerner to learn why: https://hubs.ly/Q01zjYPQ0
VOTE Cybersixgill as the best #ThreatIntelligence platform for the Cybersecurity Excellence Awards!
Cybersixgill continuously collects and exposes the earliest indications of risk produced by threat actors moments after they surface across the web:
https://hubs.ly/Q01zfZ280
The proliferation of unrestricted, encrypted messaging platforms with millions of users has made it easy for extremists to coordinate attacks across time zones and borders.
Radical political extremists are understandably cautious with their communication:
https://hubs.ly/Q01zcNtd0
Cybersixgill's Christopher Strand is featured in Trendeepro's Patient Privacy Report, Volume 23, Issue 1, 2023 Outlook:
“(Strand) said he expects cybercriminals to continue to use a variety of social engineering attacks, such as phishing, in 2023.”
Revisit our #BlakCyber podcast, whwere George McPherson speaks with Ken Underhill, CEO & Executive Producer of Cyber Life.
An award-winning cybersecurity expert, Ken discusses his cybersecurity journey, finding purpose and focusing on the positives: https://hubs.ly/Q01z3C0f0
Elon Musk’s takeover of Twitter prompted mass migration to a social network called #Mastodon. What is it, and what does it mean for the #cyberthreat intelligence community?
#Ebook download - The Top 5 Cyber Risks: How to Prevent & Protect with Threat Intelligence.
In it you'll discover how to defend against the five most pernicious cyber risks using threat intel from the deep and dark web: https://hubs.ly/Q01z3FZ80
Ransomware attacks make headlines daily, and we want to ensure our organization doesn’t make the evening news a cyber victim.
Download our Ebook, How To Protect Critical Assets Through Systematic, Proactive Threat Intelligence, to learn more:
https://hubs.ly/Q01z3hfF0
The threat posed by compromised credentials has never been more acute.
Here’s how fraudsters exploit usernames, passwords, and other personal data to hack businesses and governments: https://hubs.ly/Q01yV8Fz0
RT @EUNOMATIX1@twitter.com
NASA contract worker defied blacklist to export military software to China
https://cybernews.com/news/nasa-blacklist-military-software-china/
@Sophos@twitter.com @McAfee@twitter.com @IBMSecurity@twitter.com @Mandiant@twitter.com @Splunk@twitter.com @CyberSixgill@twitter.com @CISAGov@twitter.com @Cyber@twitter.com @threatpost@twitter.com
#cybersecurity #malware #eunomatix #zeroday #cyberattack #apt #forensic #breach #hack
🐦🔗: https://twitter.com/EUNOMATIX1/status/1616319339078062084
RT @DanPatterson@twitter.com
Geopolitics, tumultuous economic conditions, and emerging technology like artificial intelligence will accelerate the cyberthreats facing business and government, says @Cybersixgill@twitter.com Chief Product Officer Gabi Reish
https://news.cybersixgill.com/heres-how-ai-could-rewrite-the-fundamentals-of-cyber-defense-and-threat-intelligence/
🐦🔗: https://twitter.com/DanPatterson/status/1616494828547674128
Scammers are purchasing e-commerce accounts on the deep and dark web in unprecedented numbers to enable fraudulent transactions.
Visit Cybersixgill News to learn how: https://hubs.ly/Q01yzDd10