Hackers Leverage Google Classroom in Phishing Attack Targeting Over 13,500 Organizations

The operation demonstrated significant scale and coordination, delivering a high volume of emails in just one week. The use of a widely used collaboration tool like Google Classroom allowed the attackers to reach a broad, multi-sector audience with minimal initial effort.

Hackers are looking to steal Microsoft logins using some devious new tricks – here’s how to stay safe | TechRadar

instead of sending victims directly to the site, which would probably get flagged by security solutions and quickly blocked, they used a Microsoft feature called Active Directory Federation Services (ADFS). Companies normally use it to connect their internal systems to Microsoft services.

6 Networking Uses for the Linux nc Command

The netcat tool is quite popular among network administrators. However, it can also serve different purposes for you as a casual Linux user in your day-to-day life. While doing some research, I’ve found some great use cases to play with the nc command.

Pentests once a year? Nope. It’s time to build an offensive SOC

In the real world, adversaries don’t operate in bursts. Their recon is continuous, their tools and tactics are always evolving, and new vulnerabilities are often reverse-engineered into working exploits within hours of a patch release.

So, if your offensive validation isn’t just as dynamic, you’re not just lagging, you’re exposed.

After $380M hack, Clorox sues its “service desk” vendor for simply giving out passwords – Ars Technica

According to The Clorox Company, which makes everything from lip balm to cat litter to charcoal to bleach, this is exactly what happened to it in 2023. But Clorox says that the “debilitating” breach was not its fault. It had outsourced the “service desk” part of its IT security operations to the massive services company Cognizant—and Clorox says that Cognizant failed to follow even the most basic agreed-upon procedures for running the service desk.

Microsoft says China-backed cybercriminals hacked into US nuclear weapons agency

“The early exploitation resembled government-sponsored activity, and then spread more widely to include hacking that ‘looks like China’,” Meyers told Bloomberg News. CrowdStrike’s investigation into the campaign remains ongoing.

This Tool Upgrades Everything on Ubuntu with One Command – OMG! Ubuntu

Which is where the Topgrade utility comes in. It lets you run a single command to update software from multiple sources, in one fell swoop.

Sniffnet: comfortably monitor your Internet traffic

Sniffnet is a network monitoring tool to help you easily keep track of your Internet traffic.

Florida woman tricked into forking over $15k by AI cloning her daughter’s voice: ‘I know my daughter’s cry’

The phone number didn’t match Monroe’s, and the voice claimed that the police had taken her personal cellphone after the accident. But the AI-generated sound was so similar to her daughter’s voice — even her sobs — that Brightwell was completely convinced the call was real.

AI bubble is worse than the dot-com crash that erased trillions, economist warns — overvaluations could lead to catastrophic consequences | Tom’s Hardware

The dot-com crash around the turn of the century saw companies rushing to adopt and take advantage of the internet. A relatively new technology and phenomenon at the time, but one that venture capitalists saw as having earning potential. Over the last five years of the 20th century, they invested trillions of dollars, and stock prices for publicly traded internet entities soared, only to come crashing down when the bottom dropped out of the market.