多家保险公司遭受网络攻击,内容偏向勒索方向。

类型: 暗网情报

更新时间: June 24, 2025, 2:39 p.m.

地区: 其他

内容: More insurance companies being compromised

链接:

SprocketSec推出连续渗透测试(CPT),模拟真实攻击者进行日常测试,提升网络安全。

类型: 漏洞与威胁

更新时间: June 24, 2025, 2:28 p.m.

地区: 其他

内容: 🛠ï¸� Legacy pentests give you a snapshot. Attackers see a live stream. @SprocketSec's Continuous Penetration Testing (CPT) mimics real-world attackers—daily, not annually—so you can fix what matters. â�¡ï¸� Learn more: https://t.co/zj81PdGxCX #cybersecurity #pentesting #sponsored

链接:

LYNX勒索软件组织在暗网上新增两家受害者:Lurie Glass和Moto Sport de la Capitale。

类型: 勒索事件

更新时间: June 24, 2025, 2:22 p.m.

地区: 其他

内容: 🚨 Ransomware Alert: LYNX ransomware group has added 2 new victims to their dark web portal. - Lurie Glass🇺🇸 - Moto Sport de la Capitale🇨🇦

链接:

研究人员使用XMRogue和坏数据块关闭年收益2.6万美元的加密货币挖矿程序,使其哈希率瞬间归零。

类型: 漏洞与威胁

更新时间: June 24, 2025, 2:18 p.m.

地区: 其他

内容: 💥 Researchers just shut down a cryptominer making $26K/year, dropping its hashrate from 3.3M to zero in seconds using XMRogue and bad shares! This method forced the attacker to lose 76% of revenue and disrupt their operation. Details here → https://t.co/S0gWA39mMQ

链接:

NoName声称对以色列多个市政网站和企业实施了DDoS攻击

类型: 勒索事件

更新时间: June 24, 2025, 2:10 p.m.

地区: 以色列

内容: 🚨 DDoS Alert: NoName claims to have targeted multiple websites in Israel. - Arraba Municipality - Municipality of Eilat - Lod Municipality - Efrat Municipality - Plasto Kargel Group - BG Bond - Municipality of Ariel

链接:

内容讨论CTEM优于漏洞管理,并提供了实施方法链接,未提及具体漏洞或系统影响。

类型: 漏洞与威胁

更新时间: June 24, 2025, 2:09 p.m.

地区: 其他

内容: âš¡ You patch CVEs. Hackers exploit what’s exposed—over-permissioned accounts, forgotten assets, weak logins. Top CISOs explain why CTEM > vuln management—and how to make it work in the real world. Here’s how they’re doing it → https://t.co/h4HNAw7btI

链接:

160亿用户名和密码泄露,来自过去数据,将被用于凭证填充、钓鱼和大规模账户接管攻击。

类型: 勒索事件

更新时间: June 24, 2025, 1:54 p.m.

地区: 其他

内容: 16 billion usernames and passwords—compiled from past leaks, sold in bulk, and repackaged for new attacks. This isn’t “just another breach.â€� It’s a ticking time bomb of recycled exposure—ready to be used in credential stuffing, phishing, and account takeovers on a massive scale. In our latest blog, https://t.co/MG5DMBfAMn breaks down: Why this leak matters even if it’s not “newâ€� What threat actors can do with this data How businesses and individuals can defend against the ripple effect ğŸ”� Read the full blog: https://t.co/Xeh7MeDaiP #DataBreach #CyberSecurity #CredentialStuffing #Phishing #AccountTakeover #ThreatIntelligence #DataProtection #CyberAwareness #FalconFeeds

链接:

新黑客行动主义联盟TEAM FEARLESS和SECTOR 16宣布结盟,未提及勒索、漏洞或大模型信息。

类型: 勒索事件

更新时间: June 24, 2025, 1:48 p.m.

地区: 其他

内容: 🚨 Alert: New Hacktivist Alliance TEAM FEARLESS and SECTOR 16 have officially announced a new alliance.

链接:

美国众议院因安全担忧禁止员工设备使用WhatsApp。

类型: 漏洞与威胁

更新时间: June 24, 2025, 1:47 p.m.

地区: 其他

内容: US House bans WhatsApp on staff devices over security concerns https://t.co/t7DEH7asRy #Security #Government #Legal

链接:

美国众议院因安全顾虑禁止员工设备使用WhatsApp

类型: 漏洞与威胁

更新时间: June 24, 2025, 1:44 p.m.

地区: 其他

内容: US House bans WhatsApp on staff devices over security concerns - @billtoulas https://t.co/mdAE4EViK1 https://t.co/mdAE4EViK1

链接:

Akira勒索软件组织攻击了两家公司:德国热镀锌制造商Seppeler Gruppe和瑞士财务服务公司Access Financial,窃取了大量企业信息和员工个人资料。

类型: 勒索事件

更新时间: June 24, 2025, 1:30 p.m.

地区: 德国,瑞士

内容: 🚨 Ransomware Alert: The Akira ransomware group has added two new victims to their dark web portal: - Seppeler Gruppe 🇩🇪 A Germany-based manufacturing company specializing in hot-dip galvanizing. The compromised data includes 11 GB of corporate and employee personal information, such as dates of birth, addresses, identification numbers, financial data, payment details, project-related documents, etc. - Access Financial 🇨🇭 A Switzerland-based financial services company specializing in contract management and outsourced payroll. The compromised data includes 13 GB of corporate information, including confidential agreements, internal correspondence, employee personal documents, financial records, NDAs, etc.

链接:

攻击者劫持Microsoft Exchange登录页,利用隐形JavaScript键盘记录器窃取明文密码,已影响26国65名受害者。

类型: 漏洞与威胁

更新时间: June 24, 2025, 1:27 p.m.

地区: 其他

内容: 🚨 Attackers are hijacking Microsoft Exchange login pages to steal passwords in plain text. No malware download. No outbound traffic. Just invisible JavaScript keyloggers hiding in plain sight. 65 victims across 26 countries—and counting. Details → https://t.co/8XjrOUXAHI

链接:

以色列多家医疗中心遭受DDoS攻击,包括Yoseftal、Hadassah等医院

类型: 勒索事件

更新时间: June 24, 2025, 1:17 p.m.

地区: 以色列

内容: 🚨 DDoS Alert: SERVER KILLERS claims to have targeted multiple websites in Israel. - Yoseftal Medical Center - Hadassah Medical Center - Schneider Children’s Medical Center of Israel - Shaare Zedek Medical Center - Rabin Medical Center - Soroka - University Medical Center

链接:

BD Anonymous Team和Mr. Hamza宣布成立新黑客联盟

类型: 勒索事件

更新时间: June 24, 2025, 12:49 p.m.

地区: 其他

内容: 🚨 Alert: New Hacktivist Alliance 🚨 BD Anonymous Team and Mr. Hamza have officially announced a new alliance.

链接:

内容讨论如何发现扫描覆盖之外的10-20%端点,解决漏洞管理中的盲点问题,使用Prelude的聚合库存和自动化发现过程。

类型: 漏洞与威胁

更新时间: June 24, 2025, 12:30 p.m.

地区:

内容: Even the best vulnerability management programs are missing devices—and most tools make it difficult to find out which ones. Join Pete Constantine, CPO at @Preludeorg, for a live session on how to uncover how 10–20% of endpoints often fall outside scan coverage. In this session, you’ll learn: ✅ Where blind spots in scan visibility typically hide ✅ How to close gaps using aggregate inventory ✅ How to automate this discovery process in Prelude Save your seat: https://t.co/yfU5nuwsVw

链接: