Request Information
Ready to find out what 海角社区 can do for you? We鈥檝e got you covered.
Multiple scholarships are being offered by the ISSA Education Foundation for current and future Cybersecurity professionals.
Scholarships for undergraduate studies range from $2,000 to $3,500 and the window for applications closes June 15th, at the latest.
The Cybersecurity Center is hosting our next live-fire training event in June.
If you are interested in the opportunity to experience a virtual hack in a live environment please fill out our contact form and be sure the reference “June Live-Fire” in your message. Final dates will be shared with qualified candidates.
We will not be able to respond to each application individually but appreciate your interest if you decide to apply!
Dive into the thrilling world of cybersecurity and build skills that will set you apart in the tech industry with Centurion Secured.
Responsibilities:
Outcomes:
To get started, email your interest to [email protected]
Dive into the thrilling world of cybersecurity and build skills that will set you apart in the tech industry with Centurion
Cybersecurity firm Morphisec has issued a warning about a new malware strain called ResolverRAT, which has been seen recently in attacks on healthcare and pharmaceutical organizations.
Remote Access Trojans [RATs] are a type of malware disguised as legitimate software designed to give hackers unauthorized access to a victim鈥檚 computer. This access can take the form of viewing, modifying, deleting files; monitoring device activity such as keystrokes, screen content, webcam, or mic; and installing more malware to further compromise the system.
ResolverRAT is very advanced, using in-memory execution, layered evasion techniques, and runtime resolution mechanisms. It spreads through phishing emails, often referencing legal or copyright issues.
Once a user clicks the link and downloads the file, ResolverRAT runs through a process called DLL hijacking to infect the system. It鈥檚 payload is compressed and encrypted with AES-256. One decrypted, it stays hidden by existing only in memory
Learn more about how ResolverRAT works and what it鈥檚 being used to do .
The Cybersecurity and Infrastructure Security Agency [CISA] has extended its government contract with MITRE for another 11 months, after nearly allowing its contract with MITRE to maintain the Common Vulnerabilities and Exposures [CVE] and related programs to expire on April 16th.
One such related program includes the Common Weakness Enumeration [CWE] program, that lists software and hardware weaknesses, helping organizations and individuals understand and address vulnerabilities at a deeper, structural level. The CWE program highlights known flaws in software design, implementation, and configuration, and presents it all to create a roadmap for improving security practices and reducing or mitigating future risk.
Meanwhile, the CVE program focuses on identifying, defining, and cataloging publicly disclosed cybersecurity vulnerabilities. Each CVE entry contains standardized information on a specific vulnerability including its severity, affected systems, and mitigation strategies. This allows for professionals to assess the relevance of known vulnerabilities in their environment, prioritize patching and updates, and stay informed of the latest disclosed threats.
Both of these programs make it easier to manage and understand vulnerabilities, facilitating faster identification of weaknesses, improved risk management, and contributes immensely to broader cybersecurity community by sharing this important knowledge. The widespread use of these programs underscore their importance, described in a LinkedIn post by former CISA director Jen Easterly as the 鈥淒ewey Decimal System for cybersecurity.鈥
Moving forward, MITRE may need to get funding from the private sector, a possibility the CVE board has already been working on for over a year鈥攕tarting a new CVE Foundation to supply it.
Generative AI has made it much easier to create convincing text and images, which threat actors have been able to successfully leverage in their workflows.
Microsoft鈥檚 Cyber Signals Report discloses a sharp rise in AI-powered scams, identifying two major attack vectors:
Threat actors have pulled off a convincing scam by spoofing Google using a DKIM Replay Attack. DomainKeys Identified Mail [DKIM] is an email security standard designed to prove that an email comes from the claimed sender鈥檚 domain and hasn鈥檛 been tampered with. It works by giving specific headers and the body of the message a digital signature- generated with the sender鈥檚 private key- at the time it鈥檚 sent.
The malicious email came from a real Google address, passed the standard DKIM, DMARC, and SPF security checks, had no typos, and contained no suspicious links. The email claimed a law enforcement subpoena needed access to the user鈥檚 Google Account, linking to a Google Sites page designed to mimic a Google support portal. This Sites page is where they were able to harvest credentials鈥攊f their target clicked a button, waited to be redirected to a fake Google login page, and entered their Google Account credentials to log in when prompted.
How the Attack Worked
Lessons Learned
Phishing attempts often create urgency, fear, or appeal to authority to seem more credible. If an email seems unusual or triggers a strong emotional response, don鈥檛 click any links鈥攑ause, review it carefully, verify the source, or report it.
For any inquires, please reach out to the Cybersecurity Center using our contact form and we will respond as quickly as we are able