Infostealer Logs Unmask Pedophiles, Twilio API Hack, Rockwell Device Vulnerabilities

Поділитися
Вставка
  • Опубліковано 3 лип 2024
  • In today's episode, we discuss how infostealer malware logs helped Recorded Future's Insikt Group identify 3,324 unique accounts involved in child sexual abuse activities (www.bleepingcomputer.com/news.... We also unpack the Twilio Authy API breach, where an unauthenticated endpoint exposed millions of MFA user phone numbers, making them vulnerable to SIM swapping attacks (www.bleepingcomputer.com/news.... Lastly, Microsoft researchers warn of critical vulnerabilities in Rockwell Automation PanelView Plus devices that could lead to remote code execution and denial of service attacks if not properly patched (www.cybersecuritydive.com/new....
    Sign up for digestible cyber news delivered to your inbox: news.thedailydecrypt.com
    Thanks to Jered Jones for providing the music for this episode. www.jeredjones.com/
    Logo Design by www.zackgraber.com/
    *Tags:*
    Recorded Future, malware, infostealer, child sexual abuse material, CSAM, law enforcement, Twilio, API endpoint, Authy, MFA, SIM swapping, Microsoft, Rockwell Automation, PanelView Plus, vulnerabilities, cyber security, stolen credentials, hackers, denial-of-service, industrial operations
    *Search Phrases:*
    1. Recorded Future infostealer investigation
    2. malware logs exposing CSAM offenders
    3. Twilio unsecured API vulnerability
    4. Authy MFA phone number breach
    5. SIM swapping attack prevention
    6. Microsoft Rockwell Automation vulnerabilities
    7. protecting PanelView Plus devices
    8. critical vulnerabilities in industrial devices
    9. law enforcement using stolen malware logs
    10. safeguarding against API endpoint breaches

КОМЕНТАРІ • 9

  • @titanicoftitanfall8730
    @titanicoftitanfall8730 17 днів тому +3

    Almost nothing to improve. Fantastic vid, good subject, good explanations, good mic and camera (alongside camera angle). Hope you make it big soon

    • @DailyDecrypt
      @DailyDecrypt  17 днів тому

      @@titanicoftitanfall8730 wow thanks so much! If you do think of more constructive feedback, I’m all ears.

  • @disfeed
    @disfeed 17 днів тому +1

    This is excellent content. You will definitely start growing soon.
    As for any feedback, maybe add a few screenshots/images throughout the video, just to add a bit more depth into the content.

    • @DailyDecrypt
      @DailyDecrypt  17 днів тому

      @@disfeed I appreciate the feedback! I was thinking the same thing, maybe a still of the source or something.

  • @geroffmilan3328
    @geroffmilan3328 17 днів тому

    Any service which only supports SMS for MFA is unfit for purpose.
    No exceptions: there's no excuse.

    • @DailyDecrypt
      @DailyDecrypt  17 днів тому +1

      @@geroffmilan3328 ugh I couldn’t agree more. I only use 1 that still used it and it’s absolutely critical or else I’d give it up.

    • @geroffmilan3328
      @geroffmilan3328 17 днів тому +1

      @@DailyDecrypt it's truly ridiculous that you basically have to hope for that service to be breached for them to get their act together 💩

    • @DailyDecrypt
      @DailyDecrypt  17 днів тому +1

      @@geroffmilan3328 right?? Seems to be the way things are going. At least you can call your phone provider (if you use a major one) and prohibit any sim swapping over the phone. Some also require codes from an Authenticator app. Nothing is safe from social engineering though