Geekmaster 👽:system76: · @Geekmaster
166 followers · 1245 posts · Server ioc.exchange
Geekmaster 👽:system76: · @Geekmaster
166 followers · 1244 posts · Server ioc.exchange
zizak · @zizak
0 followers · 60 posts · Server techhub.social
Bob Carver · @cybersecboardrm
83 followers · 96 posts · Server infosec.exchange

Malicious actors can take advantage of "insufficient" forensic visibility into Google Cloud Platform (GCP) to exfiltrate sensitive data, a new research has found.
“Unfortunately, GCP does not provide the level of visibility in its storage logs that is needed to allow any effective forensic investigation, making organizations blind to potential data exfiltration attacks," cloud incident response firm Mitiga said in a report. amp.thehackernews.com/thn/2023

#cybersecurity #google #cloud #dataexfiltration

Last updated 2 years ago

pablolarah · @pablolarah
166 followers · 1270 posts · Server mastodon.social

🚨 Let's build a Chrome extension that steals everything
by Matt Frisbie
@mattfriz

mattfrisbie.substack.com/p/spy

#browser #browserextension #dataexfiltration

Last updated 2 years ago

Microsoft Sentinel's solution for SAP has been made generally available, and five new data exfiltration rules have been released as part of the solution. These rules cover activities such as file downloads from malicious IP addresses, and saving sensitive data to USB drives. techcommunity.microsoft.com/t5

#MicrosoftSentinel #sap #dataexfiltration

Last updated 2 years ago

Kevin Karhan :verified: · @kkarhan
350 followers · 6196 posts · Server mstdn.social

@jessdkant Such -hopping is nothing new.

It doesn't take experts like @stman to turn this into a crude narrowband modem...

And yes, there has been in the wild that does by modulating the speed of fans - just in case someone things unplugging or desoldering a speaker works...

IMHO people owning or having said - in their homes are either dangerously incompetent or dangerous for not banning this shit from prems.

#ignorants #TechIlliterates #appliances #govware #dataexfiltration #Malware #airgap

Last updated 2 years ago

Security researchers have noticed a spike in devices infected with the downloader created by a Russian-speaking hacking group known as Silence.

The threat actor is also using a new custom tool called . Analysis of Silence's attacks over the past months revealed that the gang delivered Clop typically deployed by TA505 hackers, which are associated with the FIN11 group.

bleepingcomputer.com/news/secu

#truebot #malware #dataexfiltration #teleport #ransomware #cybersecurity #infosec

Last updated 2 years ago

Mufasa :paw: · @ne1for23
345 followers · 141 posts · Server betweenthelions.link

A Republican poll worker charged with violating election law admitted he used a personal flash drive to export the electronic poll book at a Michigan precinct


woodtv.com/news/kent-county/te

#michigan #republican #pollworker #dataexfiltration #usbflashdrive #electionlaw

Last updated 2 years ago

Bob Carver · @cybersecboardrm
36 followers · 35 posts · Server infosec.exchange

The mechanism, dubbed COVID-bit, leverages malware planted on the machine to generate electromagnetic radiation in the 0-60 kHz frequency band that's subsequently transmitted and picked up by a stealthy receiving device in close physical proximity.
thehackernews.com/2022/12/covi

#cybersecurity #airgap #covert #dataexfiltration

Last updated 2 years ago

Mufasa · @ne1for23
399 followers · 3723 posts · Server mastodon.sdf.org

A Republican poll worker charged with violating election law admitted he used a personal flash drive to export the electronic poll book at a Michigan precinct


woodtv.com/news/kent-county/te

#michigan #republican #PollWorker #dataexfiltration #usbflashdrive #electionlaw

Last updated 2 years ago

The Hacker News · @hackernews_bot
612 followers · 780 posts · Server social.platypush.tech

Referenced link: thehackernews.com/2022/08/the-
Discuss on discu.eu/q/https://thehackerne

Originally posted by The Hacker News / @TheHackersNews@twitter.com: twitter.com/TheHackersNews/sta

Businesses have mounted formidable defenses against ransomware in recent years. Threat actors have been searching for another opportunity and found one with data exfiltration.

Read: thehackernews.com/2022/08/the-

#TuxCare #Ransomware #dataexfiltration

Last updated 2 years ago

The Hacker News · @hackernews_bot
613 followers · 780 posts · Server social.platypush.tech
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online