I published an article yesterday on CyberAwake looking at how gift cards are misused by threat actors: How Gift Cards are exploited by Cyber Criminals – CyberAwake
Threat actors are always on the lookout for ways to get to you
So a new trend going viral on a social media platform is an ideal place to interfere with and use to spread malware. Just like the “Invisible Body” challenge on TikTok: TikTok ‘Invisible Body’ challenge exploited to push malware (bleepingcomputer.com) Do not be deceived by the offer from the hackers …
Continue reading “Threat actors are always on the lookout for ways to get to you”
CISA adds two vulnerabilities to the Known Exploited Vulnerabilities Catalog
The US government Cybersecurity and Infrastructure Security Agency (CISA) has added advisories for Oracle and Google to the Known Exploited Vulnerabilities Catalog it maintains: CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA
Are your passwords on this list?
They shouldn’t be but you never know: Top 200 Most Common Password List 2021 The infographic above will put you on the right track. My preference where possible is to go passwordless:
National Cyber Security Centre Threat Report 25 November 2022
Threat Report 25 November 2022 – NCSC.GOV.UK
