kid

joined 7 months ago
MODERATOR OF
 
  • 28% increase in phishing emails sent between April 1st – June 30th vs January 1st – March 31st, 2024

  • 82% of phishing toolkits mentioned deepfakes and 74.8% referenced AI

  • During a commodity attack, on average organisations experience a 2,700% increase in phishing attacks compared to the normal baseline

  • 72.3% of commodity attacks used a hyperlink as its payload, followed by QR codes at 14.0%

  • 52.5% of advanced persistent threat (APT) campaigns were classified as zero-day attacks, while only 35.4% contained a previously identified payload

  • 89% of phishing emails involve impersonation; Adobe was the most impersonated brand, followed by Microsoft

  • 14.9% of impersonation emails were classed as ‘payloadless’, relying solely on social engineering tactics

  • 44% of phishing emails were sent from compromised accounts, helping them bypass authentication protocols

[–] kid@sh.itjust.works 12 points 2 weeks ago (1 children)

Update: Israel Planted Explosives in Pagers Sold to Hezbollah, Officials Say (https://www.nytimes.com/2024/09/17/world/middleeast/israel-hezbollah-pagers-explosives.html)

[–] kid@sh.itjust.works 8 points 1 month ago

You can use https://tails.net/ booting from another flash drive in memory only.

[–] kid@sh.itjust.works 3 points 1 month ago

Take that with a grain of salt.

[–] kid@sh.itjust.works 5 points 2 months ago

I like to use the 2013 Target breach case. They lost $1 billion due to the attack, their stocks dropped significantly after the attack, had several lawsuits, they closed a few stores, and changed the CEO and CIO. But a few months later, all was forgiven, their stocks recovered, and life went on.

Don't get me wrong, the risks of a cyber attack have to be taken seriously. But I feel that I have overestimated the impacts of reputational damage my whole life, as an infosec professional. My thinking was always like this: if you get reputational damage, you are done, no chance to recover, it is the end of it.

I'm following the Crowdstrike case, but I would bet that they will lose some market share (mostly prospects), perhaps some layoffs, but stocks will come up eventually.

[–] kid@sh.itjust.works 3 points 2 months ago

Not as much as if it contained passwords, for sure. Bu it gives a nice mailing list for phishing and so on.

[–] kid@sh.itjust.works 10 points 2 months ago

Depends of the country. Disrupt with Internet/communications may be a crime in some countries.

[–] kid@sh.itjust.works 14 points 2 months ago

Kudos to SOC team.

[–] kid@sh.itjust.works 2 points 3 months ago

Well, depends. If the user go to a captive portal to "authenticate" before the VPN could closes, than no. But, if the VPN can "pierce" through it (without any intervention from the AP), than yes. Anyways, If the user is willing to provide authentication data (like social media accounts, etc), nothing matters.

[–] kid@sh.itjust.works 3 points 3 months ago (2 children)

Yes.

303,481 servers worldwide, according to Shodan.

view more: next ›