BERT Ransomware Group Targets Asia and Europe on Multiple Platforms

BERT is a newly emerged ransomware group active in Europe, Asia, and the US, targeting multiple sectors including healthcare and technology with Windows and Linux variants. Their tactics involve PowerShell loaders, privilege escalation, and fast multi-threaded encryption, including forced shutdowns of ESXi virtual machines to maximize damage. #BERT #WaterPombero #ESXi #PowerShell…

Read More
Cybersecurity jobs available right now: July 1, 2025 – Help Net Security

The article lists multiple cybersecurity job openings worldwide, detailing roles ranging from Application Security Engineer to Threat Intelligence Lead, each with specific responsibilities related to securing systems, managing risks, and conducting threat analysis. These positions emphasize expertise in areas such as CI/CD security, cloud environments, incident response, and compliance with security standards. #CI_CD #MITRE_ATTCK #Threat_Intelligence #Cloud_Security

Read More
A New Maturity Model for Browser Security: Closing the Last-Mile Risk

The Secure Enterprise Browser Maturity Guide highlights the importance of addressing browser security, a critical yet overlooked layer in modern enterprise cybersecurity. It offers a practical framework for CISOs and security teams to enhance visibility, control, and integration of browser-layer security amidst growing threats like GenAI misuse and shadow SaaS.
#BrowserSecurity #GenAIrisks…

Read More
80 Percent of Phishing Clues Are in the Header PhishHound Finds Them with YAML Logic

PhishHound is an open-source Python tool designed to help analysts quickly triage suspicious email headers, focusing on common authentication failure indicators. It enhances phishing detection by providing customizable rules, heuristic scoring, and clear risk assessments, aiding security teams in identifying malicious emails early. #PhishHound #EmailHeaderAnalysis

Read More
Mastering Threat Hunting with Criminal IP: The Dorks Query Playbook (Part 2)

This article explores the importance of manual threat reconnaissance and proactive hunting strategies using Criminal IP’s Tag and Filter functions to identify malicious infrastructure. These real-world query examples help cybersecurity professionals detect C2 servers, exposed DevOps platforms, SSL VPNs, and compromised systems, improving early attack detection. #Mythic #C2servers #DevOps #SSLVPN #ThreatDetection

Read More
Microsoft Entra ID OAuth Phishing and Detections

Elastic’s TRADE team analyzed OAuth phishing attacks targeting Microsoft Entra ID, inspired by Volexity’s findings on UTA0352 threat actor exploiting OAuth workflows to access Microsoft 365 resources. Their research includes hands-on emulation of attacks, revealing token abuse mechanics, device registration, and detection strategies to mitigate such identity-based threats. #UTA0352 #MicrosoftEntraID #ROADtools

Read More
Cybersecurity Jobs available right now: June 24, 2025 – Help Net Security

The article lists various global cybersecurity job openings, detailing roles from Cyber Security Analyst to Senior Penetration Tester across multiple industries and countries. Each position emphasizes responsibilities such as incident response, threat intelligence, security architecture, vulnerability management, and compliance. #CyberSecurityJobs #IncidentResponse #ThreatIntelligence #VulnerabilityManagement

Read More
Cybersecurity News | Daily Recap [21 Jun 2025]

Cybersecurity incidents this week include Kairos ransomware stealing nearly 2 TB of data from Taos County and demanding ransom, while Aflac faces a breach linked to Scattered Spider attacks exposing sensitive information. Additionally, the Tonga Ministry of Health experiences a ransomware attack disrupting healthcare services, and North Korean Lazarus group conducts an $11 million crypto theft via social engineering. Experts highlight critical vulnerabilities in IBM QRadar SIEM and Versa Director SD-WAN, alongside innovative malware campaigns like PowerShell loaders and NodeInitRAT. Massive DDoS attacks, such as Cloudflare’s record-breaking 7.3 Tbps mitigation, demonstrate ongoing network threats. Hashtags: #KairosRansomware #ScatteredSpider #LazarusGroup #NodeInitRAT #CloudflareDDoS

Read More