Artwork

المحتوى المقدم من SecureResearch. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة SecureResearch أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

Phishing for the News - Daily Edition - January 14, 2025

31:02
 
مشاركة
 

Manage episode 461123992 series 3619852
المحتوى المقدم من SecureResearch. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة SecureResearch أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Here are some high level bullet points of the top security priorities, based on the the SecureResearch Cyber Intelligence Brief:

  • Multiple zero-day vulnerabilities are being actively exploited, making patching extremely urgent. These vulnerabilities have been discovered in platforms such as Aviatrix, BeyondTrust, and FortiGate. Organizations should implement enhanced vulnerability management practices and expedite patching to mitigate risks.
  • Ransomware continues to be a significant threat, and is evolving through the use of AI for development, potentially leading to more damaging attacks. The recent Telefonica breach, which resulted in the theft of customer data and Jira tickets, demonstrates the persistent threat of ransomware.
  • Supply chain and third-party risks require increased attention. The CISA guidance stresses the importance of prioritizing security in operational technology procurement and vendor management. The Nominet breach through an Ivanti zero-day vulnerability highlights the potential risks from compromised suppliers. Organizations should implement strict access controls, perform comprehensive audits, and establish shared responsibility models to mitigate these risks.
  • The illicit underground economy is evolving, posing new challenges. HuiOne, an illicit marketplace operating on Telegram, has overtaken Hydra in cryptocurrency proceeds. Organizations and law enforcement agencies must work together to disrupt this activity and counter criminal safe havens.

For more information in the SecureResearch Daily Cyber Intelligence Brief, email [email protected]

  continue reading

37 حلقات

Artwork
iconمشاركة
 
Manage episode 461123992 series 3619852
المحتوى المقدم من SecureResearch. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة SecureResearch أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Here are some high level bullet points of the top security priorities, based on the the SecureResearch Cyber Intelligence Brief:

  • Multiple zero-day vulnerabilities are being actively exploited, making patching extremely urgent. These vulnerabilities have been discovered in platforms such as Aviatrix, BeyondTrust, and FortiGate. Organizations should implement enhanced vulnerability management practices and expedite patching to mitigate risks.
  • Ransomware continues to be a significant threat, and is evolving through the use of AI for development, potentially leading to more damaging attacks. The recent Telefonica breach, which resulted in the theft of customer data and Jira tickets, demonstrates the persistent threat of ransomware.
  • Supply chain and third-party risks require increased attention. The CISA guidance stresses the importance of prioritizing security in operational technology procurement and vendor management. The Nominet breach through an Ivanti zero-day vulnerability highlights the potential risks from compromised suppliers. Organizations should implement strict access controls, perform comprehensive audits, and establish shared responsibility models to mitigate these risks.
  • The illicit underground economy is evolving, posing new challenges. HuiOne, an illicit marketplace operating on Telegram, has overtaken Hydra in cryptocurrency proceeds. Organizations and law enforcement agencies must work together to disrupt this activity and counter criminal safe havens.

For more information in the SecureResearch Daily Cyber Intelligence Brief, email [email protected]

  continue reading

37 حلقات

Todos los episodios

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع

استمع إلى هذا العرض أثناء الاستكشاف
تشغيل