An illicit market in account restoration. Resilience and the cyber workforce: a snapshot. New post-exploitation technique in Amazon Web Services.
An illicit market in account restoration. Resilience and the cyber workforce. New post-exploitation techniques in Amazon Web Services. Incursions into Norwegian government networks went on for four months. Rob Boyce from Accenture Security describes a “Perfect Storm” in the Dark Web threat landscape. Carole Theriault shares mental health social media warnings for teens. And the Russian legislation seeks to reduce or eliminate online privacy.
Selected reading.
Amazon employees leak secret info that marketplace sellers can buy on Telegram (CNBC)
Cyber Workforce Benchmark Report (Immersive Labs)
Mitiga Security Advisory: Abusing the SSM Agent as a Remote Access Trojan (Mitiga)
Cado Security Labs 2023 Threat Findings Report (Cado Security)
Cyberattack on Norway Ministries Lasted at Least Four Months (Bloomberg)
CISA and International Partner NCSC-NO Release Joint Cybersecurity Advisory on Threat Actors Exploiting Ivanti EPMM Vulnerabilities (Cybersecurity and Infrastructure Security Agency)
Putin Outlaws Anonymity: Identity Verification For Online Services, VPN Bypass Advice a Crime (TorrentFreak)
Russia Is Returning to Its Totalitarian Past (Foreign Policy)