Infostealer Logs Unmask Pedophiles, Twilio API Hack, Rockwell Device Vulnerabilities

Поделиться
HTML-код
  • Опубликовано: 3 июл 2024
  • In today's episode, we discuss how infostealer malware logs helped Recorded Future's Insikt Group identify 3,324 unique accounts involved in child sexual abuse activities (www.bleepingcomputer.com/news.... We also unpack the Twilio Authy API breach, where an unauthenticated endpoint exposed millions of MFA user phone numbers, making them vulnerable to SIM swapping attacks (www.bleepingcomputer.com/news.... Lastly, Microsoft researchers warn of critical vulnerabilities in Rockwell Automation PanelView Plus devices that could lead to remote code execution and denial of service attacks if not properly patched (www.cybersecuritydive.com/new....
    Sign up for digestible cyber news delivered to your inbox: news.thedailydecrypt.com
    Thanks to Jered Jones for providing the music for this episode. www.jeredjones.com/
    Logo Design by www.zackgraber.com/
    *Tags:*
    Recorded Future, malware, infostealer, child sexual abuse material, CSAM, law enforcement, Twilio, API endpoint, Authy, MFA, SIM swapping, Microsoft, Rockwell Automation, PanelView Plus, vulnerabilities, cyber security, stolen credentials, hackers, denial-of-service, industrial operations
    *Search Phrases:*
    1. Recorded Future infostealer investigation
    2. malware logs exposing CSAM offenders
    3. Twilio unsecured API vulnerability
    4. Authy MFA phone number breach
    5. SIM swapping attack prevention
    6. Microsoft Rockwell Automation vulnerabilities
    7. protecting PanelView Plus devices
    8. critical vulnerabilities in industrial devices
    9. law enforcement using stolen malware logs
    10. safeguarding against API endpoint breaches

Комментарии • 9

  • @titanicoftitanfall8730
    @titanicoftitanfall8730 17 дней назад +3

    Almost nothing to improve. Fantastic vid, good subject, good explanations, good mic and camera (alongside camera angle). Hope you make it big soon

    • @DailyDecrypt
      @DailyDecrypt  17 дней назад

      @@titanicoftitanfall8730 wow thanks so much! If you do think of more constructive feedback, I’m all ears.

  • @disfeed
    @disfeed 17 дней назад +1

    This is excellent content. You will definitely start growing soon.
    As for any feedback, maybe add a few screenshots/images throughout the video, just to add a bit more depth into the content.

    • @DailyDecrypt
      @DailyDecrypt  17 дней назад

      @@disfeed I appreciate the feedback! I was thinking the same thing, maybe a still of the source or something.

  • @geroffmilan3328
    @geroffmilan3328 17 дней назад

    Any service which only supports SMS for MFA is unfit for purpose.
    No exceptions: there's no excuse.

    • @DailyDecrypt
      @DailyDecrypt  17 дней назад +1

      @@geroffmilan3328 ugh I couldn’t agree more. I only use 1 that still used it and it’s absolutely critical or else I’d give it up.

    • @geroffmilan3328
      @geroffmilan3328 17 дней назад +1

      @@DailyDecrypt it's truly ridiculous that you basically have to hope for that service to be breached for them to get their act together 💩

    • @DailyDecrypt
      @DailyDecrypt  17 дней назад +1

      @@geroffmilan3328 right?? Seems to be the way things are going. At least you can call your phone provider (if you use a major one) and prohibit any sim swapping over the phone. Some also require codes from an Authenticator app. Nothing is safe from social engineering though