LYNX勒索软件组织在暗网上新增两家受害者:Lurie Glass和Moto Sport de la Capitale。

类型: 勒索事件

更新时间: June 24, 2025, 2:22 p.m.

地区: 其他

内容: 🚨 Ransomware Alert: LYNX ransomware group has added 2 new victims to their dark web portal. - Lurie Glass🇺🇸 - Moto Sport de la Capitale🇨🇦

链接:

研究人员使用XMRogue和坏数据块关闭年收益2.6万美元的加密货币挖矿程序,使其哈希率瞬间归零。

类型: 漏洞与威胁

更新时间: June 24, 2025, 2:18 p.m.

地区: 其他

内容: 💥 Researchers just shut down a cryptominer making $26K/year, dropping its hashrate from 3.3M to zero in seconds using XMRogue and bad shares! This method forced the attacker to lose 76% of revenue and disrupt their operation. Details here → https://t.co/S0gWA39mMQ

链接:

NoName声称对以色列多个市政网站和企业实施了DDoS攻击

类型: 勒索事件

更新时间: June 24, 2025, 2:10 p.m.

地区: 以色列

内容: 🚨 DDoS Alert: NoName claims to have targeted multiple websites in Israel. - Arraba Municipality - Municipality of Eilat - Lod Municipality - Efrat Municipality - Plasto Kargel Group - BG Bond - Municipality of Ariel

链接:

内容讨论CTEM优于漏洞管理,并提供了实施方法链接,未提及具体漏洞或系统影响。

类型: 漏洞与威胁

更新时间: June 24, 2025, 2:09 p.m.

地区: 其他

内容: âš¡ You patch CVEs. Hackers exploit what’s exposed—over-permissioned accounts, forgotten assets, weak logins. Top CISOs explain why CTEM > vuln management—and how to make it work in the real world. Here’s how they’re doing it → https://t.co/h4HNAw7btI

链接:

160亿用户名和密码泄露,来自过去数据,将被用于凭证填充、钓鱼和大规模账户接管攻击。

类型: 勒索事件

更新时间: June 24, 2025, 1:54 p.m.

地区: 其他

内容: 16 billion usernames and passwords—compiled from past leaks, sold in bulk, and repackaged for new attacks. This isn’t “just another breach.â€� It’s a ticking time bomb of recycled exposure—ready to be used in credential stuffing, phishing, and account takeovers on a massive scale. In our latest blog, https://t.co/MG5DMBfAMn breaks down: Why this leak matters even if it’s not “newâ€� What threat actors can do with this data How businesses and individuals can defend against the ripple effect ğŸ”� Read the full blog: https://t.co/Xeh7MeDaiP #DataBreach #CyberSecurity #CredentialStuffing #Phishing #AccountTakeover #ThreatIntelligence #DataProtection #CyberAwareness #FalconFeeds

链接:

新黑客行动主义联盟TEAM FEARLESS和SECTOR 16宣布结盟,未提及勒索、漏洞或大模型信息。

类型: 勒索事件

更新时间: June 24, 2025, 1:48 p.m.

地区: 其他

内容: 🚨 Alert: New Hacktivist Alliance TEAM FEARLESS and SECTOR 16 have officially announced a new alliance.

链接:

美国众议院因安全担忧禁止员工设备使用WhatsApp。

类型: 漏洞与威胁

更新时间: June 24, 2025, 1:47 p.m.

地区: 其他

内容: US House bans WhatsApp on staff devices over security concerns https://t.co/t7DEH7asRy #Security #Government #Legal

链接:

美国众议院因安全顾虑禁止员工设备使用WhatsApp

类型: 漏洞与威胁

更新时间: June 24, 2025, 1:44 p.m.

地区: 其他

内容: US House bans WhatsApp on staff devices over security concerns - @billtoulas https://t.co/mdAE4EViK1 https://t.co/mdAE4EViK1

链接:

Akira勒索软件组织攻击了两家公司:德国热镀锌制造商Seppeler Gruppe和瑞士财务服务公司Access Financial,窃取了大量企业信息和员工个人资料。

类型: 勒索事件

更新时间: June 24, 2025, 1:30 p.m.

地区: 德国,瑞士

内容: 🚨 Ransomware Alert: The Akira ransomware group has added two new victims to their dark web portal: - Seppeler Gruppe 🇩🇪 A Germany-based manufacturing company specializing in hot-dip galvanizing. The compromised data includes 11 GB of corporate and employee personal information, such as dates of birth, addresses, identification numbers, financial data, payment details, project-related documents, etc. - Access Financial 🇨🇭 A Switzerland-based financial services company specializing in contract management and outsourced payroll. The compromised data includes 13 GB of corporate information, including confidential agreements, internal correspondence, employee personal documents, financial records, NDAs, etc.

链接:

攻击者劫持Microsoft Exchange登录页,利用隐形JavaScript键盘记录器窃取明文密码,已影响26国65名受害者。

类型: 漏洞与威胁

更新时间: June 24, 2025, 1:27 p.m.

地区: 其他

内容: 🚨 Attackers are hijacking Microsoft Exchange login pages to steal passwords in plain text. No malware download. No outbound traffic. Just invisible JavaScript keyloggers hiding in plain sight. 65 victims across 26 countries—and counting. Details → https://t.co/8XjrOUXAHI

链接:

以色列多家医疗中心遭受DDoS攻击,包括Yoseftal、Hadassah等医院

类型: 勒索事件

更新时间: June 24, 2025, 1:17 p.m.

地区: 以色列

内容: 🚨 DDoS Alert: SERVER KILLERS claims to have targeted multiple websites in Israel. - Yoseftal Medical Center - Hadassah Medical Center - Schneider Children’s Medical Center of Israel - Shaare Zedek Medical Center - Rabin Medical Center - Soroka - University Medical Center

链接:

BD Anonymous Team和Mr. Hamza宣布成立新黑客联盟

类型: 勒索事件

更新时间: June 24, 2025, 12:49 p.m.

地区: 其他

内容: 🚨 Alert: New Hacktivist Alliance 🚨 BD Anonymous Team and Mr. Hamza have officially announced a new alliance.

链接:

内容讨论如何发现扫描覆盖之外的10-20%端点,解决漏洞管理中的盲点问题,使用Prelude的聚合库存和自动化发现过程。

类型: 漏洞与威胁

更新时间: June 24, 2025, 12:30 p.m.

地区:

内容: Even the best vulnerability management programs are missing devices—and most tools make it difficult to find out which ones. Join Pete Constantine, CPO at @Preludeorg, for a live session on how to uncover how 10–20% of endpoints often fall outside scan coverage. In this session, you’ll learn: ✅ Where blind spots in scan visibility typically hide ✅ How to close gaps using aggregate inventory ✅ How to automate this discovery process in Prelude Save your seat: https://t.co/yfU5nuwsVw

链接:

CISA警告,疑似有更广泛的SaaS攻击,利用应用密钥和云配置错误。

类型: 漏洞与威胁

更新时间: June 24, 2025, 12:08 p.m.

地区: 其他

内容: CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs https://t.co/zU3NDohtZ7 #Cybersecurity #SaaS #CloudSecurity #DataProtection #CISA

链接:

NoName声称针对多个NATO网站发起DDoS攻击,涉及NATO多个重要机构和系统。

类型: 勒索事件

更新时间: June 24, 2025, 11:40 a.m.

地区: 其他

内容: 🚨 DDoS Alert: NoName claims to have targeted multiple NATO websites. - NATO Allied Command Transformation 🇺🇸 - NATO Centre for Maritime Research and Experimentation 🇮🇹 - NATO Joint Warfare Centre 🇳🇴 - Munitions Safety Information Analysis Center 🇧🇪 - NATO AEW&C Programme Management Agency 🇧🇪 - NATO Parliamentary Assembly 🇳🇱 - NATO Multimedia 🇧🇪 - NEC CCIS System Support Centre 🇳🇴 - NATO STO 🇫🇷

链接: