#CredentialSecurity

2026-01-24

Rhaetian Railway has confirmed unauthorized access to customer data linked to its Vereina car shuttle ticketing system.

While card data was not impacted, exposed account credentials raise familiar questions around access control, credential storage, and customer-facing attack surfaces in transport infrastructure.

This incident reinforces the importance of continuous monitoring and credential hygiene in public-sector systems.

Follow @technadu for sober, technically grounded cybersecurity reporting.

Source: inside-it.ch/datenleck-bei-der

Thoughts and analysis welcome.

#InfoSec #DataBreach #TransportSecurity #CredentialSecurity #PublicInfrastructure #CyberRisk

Data leak at the Rhaetian Railway
2026-01-20

A recent investigation into malicious Chrome extensions targeting enterprise HR and ERP platforms highlights a persistent challenge: browser extensions operating with elevated trust.

The campaign involved credential cookie exfiltration, session hijacking, and interference with administrative security controls - demonstrating how extensions can bypass traditional perimeter defenses.

This reinforces the need for stronger browser governance, extension allow-listing, and visibility within enterprise environments.

Follow @technadu for neutral, practitioner-focused cybersecurity reporting.

Source: bleepingcomputer.com/news/secu

Thoughtful discussion encouraged.

#InfoSec #EnterpriseSecurity #BrowserHardening #IdentityThreats #CredentialSecurity #SaaSRisk #CyberDefense #SecurityAwareness

Credential-stealing Chrome extensions target enterprise HR platforms
2026-01-17

Recent law enforcement actions against suspected Black Basta affiliates highlight how modern ransomware groups operate.
Investigators say some members focused on credential recovery and access enablement, while leadership coordinated targeting, negotiations, and cryptocurrency payments. Authorities seized digital media and continue forensic analysis.

Defensive implications:
β€’ Credential theft remains a primary entry point
β€’ Ransomware operations are modular and role-based
β€’ Early-stage detection is critical
How are organizations adjusting controls to detect access misuse sooner?

Source:therecord.media/police-raid-ho

Engage with the discussion and follow TechNadu for objective InfoSec coverage.

#InfoSec #Ransomware #ThreatIntelligence #CredentialSecurity #IncidentResponse #CyberDefense #TechNadu

Police raid homes of alleged Black Basta hackers, hunt suspected Russian ringleader
2026-01-12

APT28 is running credential-stealing campaigns to fuel long-term espionage β€” persistence, not noise, remains the real threat. Identity is still the weakest link. πŸ•΅οΈβ€β™‚οΈπŸ”‘ #APT #CredentialSecurity

thehackernews.com/2026/01/russ

2025-10-24

🚨 Collins Aerospace Breached Twice in One Week β€” Everest + Ransomware

Evidence confirms two distinct incidents:
– Everest data exfiltration (Sept 10–11): leveraged old credentials from a 2022 RedLine infection.
– Ransomware attack (Sept 19): separate event, caused system disruptions.

Legacy credentials remain one of the most exploited weaknesses in enterprise networks.

πŸ’¬ How does your team track and rotate long-term credentials? Comment below & follow TechNadu for real-time cyber intelligence.

#CyberSecurity #CollinsAerospace #Everest #Ransomware #RedLineStealer #InfoSec #CredentialSecurity #ThreatIntel #AviationSecurity #CyberDefense #ZeroTrust #TechNadu

collins

AI MCP servers have a glaring security hole: long-lived, static credentials are putting data, code, and production systems at risk. jpmellojr.blogspot.com/2025/10 #AIsecurity #CredentialSecurity #MCP #APISecurity #SecretsManagement #Astrix

Yonhap Infomax Newsinfomaxkorea
2025-09-05

Palo Alto Networks CEO Nikesh Arora warns that agentic AI browsers may face resistance in corporate settings due to security concerns, stressing the need for robust credential controls and highlighting ongoing industry investment in AI models.

en.infomaxai.com/news/articleV

2025-07-15

πŸ” Weak password practices strike againβ€”β€œ123456” led to a breach exposing data of 64M McDonald’s job applicants. Basic hygiene still matters.
#CredentialSecurity #DataBreach πŸ”“πŸ“„

bleepingcomputer.com/news/secu

2025-05-20

πŸˆβ€β¬› Hashcat – A Practical Guide to Password Auditing

Hashcat is a powerful GPU-accelerated password recovery tool used by security professionals to test the strength of passwords in authorized environments.

🧠 What Hashcat is used for:
β€’ Auditing password hashes (e.g., from Windows, Linux, web apps)
β€’ Testing password policies and complexity
β€’ Identifying weak or reused credentials in simulated lab setups

πŸ” Key Features:
β€’ Supports a wide variety of hash types (MD5, SHA1, NTLM, bcrypt, etc.)
β€’ Multiple attack modes: dictionary, brute-force, mask, hybrid, rule-based
β€’ Highly customizable and efficient with GPU acceleration
β€’ Works well for red teamers and defenders validating password hygiene

🎯 When to use it:
β€’ During penetration tests (with permission)
β€’ In password policy assessments
β€’ For internal security audits and training exercises

Disclaimer: This guide is for educational and ethical use only. Only audit password hashes on systems you own or have explicit authorization to test.

#Hashcat #CyberSecurity #PasswordAuditing #EthicalHacking #InfoSec #EducationOnly #RedTeamTools #CredentialSecurity #GPUCracking #SecurityAssessment

2025-04-18

⚠️ CVE-2025-24054 is now under active attack β€” and it only takes a single click to leak NTLM hashes from a Windows system.

CISA has added this medium-severity Windows vulnerability to its Known Exploited Vulnerabilities catalog after confirming exploitation in the wild. The flaw enables attackers to harvest NTLM credentials through specially crafted .library-ms files.

Here’s how it works:
- A user receives a malicious file β€” even a single click (no execution needed) can trigger NTLM hash leakage
- Attackers send these files via phishing emails, often packed in ZIP archives or delivered directly
- Opening the archive or previewing the file initiates an SMB request, leaking NTLMv2-SSP hashes
- These hashes can then be used for pass-the-hash or lateral movement attacks inside the network

Check Point reports that the vulnerability has been exploited in at least 10 campaigns so far, targeting government and private organizations in Poland, Romania, Ukraine, and Colombia.

What makes this threat more dangerous:
- NTLM is deprecated but still present in many environments
- Minimal user interaction is required β€” just download and extract
- It bypasses common detection tools by triggering quietly in Windows Explorer
- It's a variant of a previously exploited flaw (CVE-2024-43451)

Microsoft patched the flaw in March, but exploitation began almost immediately. Agencies under the FCEB have until May 8 to patch β€” but every organization should act sooner.

At @Efani we view this as another reminder that legacy protocols like NTLM are low-hanging fruit for attackers. Even medium-severity flaws can become major risks when they require near-zero user interaction.

Patch. Audit. Replace legacy auth where possible.

#CyberSecurity #NTLM #WindowsVulnerability #CVE202524054 #CredentialSecurity #EfaniSecure

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst