Security
Cybersecurity News Roundup: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & More!
into plain text. This includes things like photos, messages, and emails sent to your previous email address. Users can change back to their previous email address at any time, but they cannot create a new Google Account email ending in gmail.com for the next 12 months. The new email address cannot be deleted either.
Understanding the Risks of API Call Sequences in Cybersecurity
Abstract Security highlighted the dangers of chaining together specific API calls in cybersecurity practices. By utilizing PutEventSelectors to create “invisible activity zones,” StopEventDataStoreIngestion, and DeleteEventDataStore to halt or destroy long-term forensic visibility, and disabling anomaly detection via PutInsightSelectors, attackers can effectively erase evidence and evade detection entirely. These seemingly routine maintenance tasks, when combined, pose a significant threat to security.
LofyGang Introduces Dual-Payload RAT Through Fake npm Package
LofyGang, a notorious threat actor, recently introduced a malicious npm package called “undicy-http” that delivers a dual-payload attack. This attack includes a Node.js-based Remote Access Trojan (RAT) with live screen streaming capabilities and a native Windows PE binary. The RAT is designed to steal sensitive information from various web browsers and cryptocurrency wallet extensions, while the native binary targets popular platforms like Roblox, Instagram, Spotify, and more. JFrog reported that the Node.js layer operates independently as a full RAT with multiple capabilities, all controlled through a WebSocket C2 panel.
Each of these incidents, when viewed individually, may not seem significant. However, the true risk lies in the pattern and sequence of actions taken by threat actors. By understanding the interconnectedness of seemingly benign actions, organizations can better protect themselves from evolving cybersecurity threats.
Recognizing these subtle patterns and changes in cybersecurity practices is crucial in staying ahead of malicious actors. By being vigilant and understanding the implications of seemingly routine actions, organizations can enhance their security posture and mitigate potential risks effectively.
-
Facebook5 months agoEU Takes Action Against Instagram and Facebook for Violating Illegal Content Rules
-
Facebook6 months agoWarning: Facebook Creators Face Monetization Loss for Stealing and Reposting Videos
-
Facebook6 months agoFacebook Compliance: ICE-tracking Page Removed After US Government Intervention
-
Facebook4 months agoFacebook’s New Look: A Blend of Instagram’s Style
-
Facebook4 months agoFacebook and Instagram to Reduce Personalized Ads for European Users
-
Facebook6 months agoInstaDub: Meta’s AI Translation Tool for Instagram Videos
-
Facebook4 months agoReclaim Your Account: Facebook and Instagram Launch New Hub for Account Recovery
-
Apple5 months agoMeta discontinues Messenger apps for Windows and macOS

