Cyber Amulet
cyberamulet.bsky.social
Cyber Amulet
@cyberamulet.bsky.social
A one-stop shop for news on cybersecurity incidents and breaches.
We also touch upon new vulnerabilities and emerging threats.
Reposted by Cyber Amulet
This is what oligarchy looks like.
February 16, 2025 at 9:57 PM
Reposted by Cyber Amulet
Let's add a fun twist/new rule: If you have to file the SEC breach disclosure, some cyber agency equivalent to the USCSB is mandated to post-mortem the incident and it ends up on said agency's Youtube channel.

www.youtube.com/watch?v=JplA...
Animation of 2015 Explosion at ExxonMobil Refinery in Torrance, CA
YouTube video by USCSB
www.youtube.com
December 17, 2024 at 12:41 AM
Reposted by Cyber Amulet
Drowning in Cyber Threats: Water Systems Urged to Secure HMIs Against Hack Attacks

Secure your water systems! Protect against cyberattacks by securing HMIs and following EPA and CISA guidelines. Don't let hacktivists control your water.
https://buff.ly/3VKrNqR
Drowning in Cyber Threats: Water Systems Urged to Secure HMIs Against Hack Attacks
The US government is urging water and wastewater systems to secure internet-exposed HMIs against cyberattacks. Hacktivists have manipulated these interfaces, causing chaos in operations. To prevent such shenanigans, facilities should disconnect HMIs, use strong passwords, and implement MFA. As always, never underestimate the power of not having your water pumps go rogue.
buff.ly
December 17, 2024 at 1:14 PM
Reposted by Cyber Amulet
Cybersecurity Leaders Cautiously Embrace GenAI: ROI Wins, But Trust Issues Linger

GenAI integration is hot in cybersecurity, but leaders are cautious. 76% prefer tailored tools, yet only 6% have fully adopted GenAI, according to a CrowdStrike survey.
https://buff.ly/3OXiMXR
Cybersecurity Leaders Cautiously Embrace GenAI: ROI Wins, But Trust Issues Linger
GenAI integration is a hot topic for cybersecurity leaders, but not at any price, says a CrowdStrike survey. While 64% are exploring GenAI tools, only 6% have implemented them. ROI is favored over cost, yet concerns about data exposure and AI hallucinations persist. A platform approach is preferred for multifaceted use.
buff.ly
December 17, 2024 at 1:10 PM
Reposted by Cyber Amulet
Who here is inclined to agree?
December 11, 2024 at 8:45 PM
Reposted by Cyber Amulet
The Texas Tech University Health Sciences Center has confirmed that hackers accessed the personal and sensitive health data of over 1.4 million individuals during a September cyberattack techcrunch.com/2024/12/17/t...
Texas medical school says hackers stole sensitive health data of 1.4 million individuals | TechCrunch
The university's incident website blocks search engines from listing the site, making it more difficult for affected individuals to find the website in search results.
techcrunch.com
December 17, 2024 at 1:26 PM
Reposted by Cyber Amulet
CISA Sounds the Alarm: Microsoft and Adobe Vulnerabilities Join the Exploit Hall of Fame

CISA adds Windows and ColdFusion flaws to its Known Exploited Vulnerabilities catalog. Time to patch up before hackers RSVP to your network!
https://buff.ly/4iC3NQH
CISA Sounds the Alarm: Microsoft and Adobe Vulnerabilities Join the Exploit Hall of Fame
CISA's adding spice to its Known Exploited Vulnerabilities Catalog with two new stars: a Windows Kernel-Mode Driver flaw and an Adobe ColdFusion issue. They're the cybersecurity world's latest "bad boys," with CISA urging agencies to fix them before they crash the party.
buff.ly
December 17, 2024 at 9:36 AM
Reposted by Cyber Amulet
Chinese hackers using the same methods as people trying to evade the GFW. I have come across big repositories of ShadowSocks keys and when running tests on the servers, quite a number were in the “malicious” category”. www.techradar.com/pro/vpn/chin...
Chinese hackers are using this open-source VPN to mask spying activities
The target list also includes the EU, ESET researchers can reveal
www.techradar.com
December 17, 2024 at 6:56 AM
Reposted by Cyber Amulet
From Joyce to feminist re-imaginings to a Stephen Fry retelling to an Uberto Pasolini film: Kate Maltby on why Homer's Odyssey continues to inspire.

www.ft.com/content/63ee...
‘The Return’ and the enduring appeal of Homer’s Odyssey
From Joyce to 21st-century feminism to a new on-screen reimagining: why this millennia-old poem and its complicated hero continue to inspire
www.ft.com
December 16, 2024 at 3:36 AM
Reposted by Cyber Amulet
Not suspicious at all
December 15, 2024 at 11:09 AM
Reposted by Cyber Amulet
Telecom Namibia has advised its clients to update their passwords to protect their personal information from further cyber attackers, following the cyber attack on customer’s data on 13 December.
December 17, 2024 at 5:32 AM
Reposted by Cyber Amulet
If you are experiencing internet difficulties tonight - it’s a state sponsored 🇨🇳 cyber attack on U.S. Infrastructure. Every major network provider is experiencing disruptions this evening. downdetector.com
Status overview
downdetector.com
December 9, 2024 at 3:57 AM
Reposted by Cyber Amulet
Steganography in Cyber Espionage —  Hidden Data in Multimedia Files as a Stealth Attack Vector
link.medium.com
December 8, 2024 at 4:04 PM
Reposted by Cyber Amulet
If Ukraine has been Russia’s cyber espionage/attack front line over several decades, the Tibetan community in exile has had that unfortunate distinction while on the receiving end of Chinese government attacks. Great to see @tibcert.bsky.social putting out this expansive report on the subject.
December 10, 2024 at 3:30 PM
Reposted by Cyber Amulet
Hackers launch cyber attack on Showjumping Ireland – but send ransom demand to wrong organisation

www.independent.ie/irish-news/h...
Hackers launch cyber attack on Showjumping Ireland – but send ransom demand to wrong organisation
Hackers launched a cyber attack on Showjumping Ireland — but issued a ransom demand threatening to release stolen data to the wrong organisation.
www.independent.ie
December 9, 2024 at 12:25 PM
Reposted by Cyber Amulet
Steve Gibson & @leolaporte.me break down the 'Salt Typhoon' cyber attack on U.S. telecom providers, exploring the latest cybersecurity threats and implications in this week's #SecurityNow. Plus, insights into China's sophisticated hacking strategies revealed. twit.tv/shows/security-now/episodes/1004
A Chat with GPT | TWiT.TV
This week, Steve and Leo discuss the recent 'Salt Typhoon' hack of U.S. telecom providers by China, TPM 2.0 requirement for Windows 11, Microsoft's newly hacked Windows
twit.tv
December 12, 2024 at 1:20 AM
Reposted by Cyber Amulet
New: The Salt Typhoon attacks have raised discussions of hacking back against China. In classified settings, lawmakers have often asked intel + national security officials why American cyber forces don’t go on the attack more often, one senator told me —>
www.nextgov.com/cybersecurit...
Salt Typhoon attacks prompt talk of hacking back against China
In classified settings, lawmakers have often asked national security officials why American cyber forces don’t go on the attack more often, one senator said.
www.nextgov.com
December 12, 2024 at 4:45 PM
Reposted by Cyber Amulet
Reposted by Cyber Amulet
Call President Biden

202-456-1414 Tuesday to Thursday 11am to 4 pm

Proof already in Romania,cand Georgia Cyber Attack on their elections via eLon Starlink, and they get a do over election.

Tell Uncle Joe jail Elon Musk, and disqualify tRump for cyber attack on Swing State votes!

Make public#
December 11, 2024 at 6:07 PM