Tag: cloud security

  • What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 6/9/25

    What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 6/9/25

    Welcome to my weekly cybersecurity roundup! Here, I share updates on the projects I’m currently working on, along with the most insightful cybersecurity videos I watched, articles I found valuable, and podcasts I tuned into this week.

    Featured Analysis

    Featured article analysis: 40,000 Security Cameras Exposed to Remote Hacking

    Cybersecurity firm Bitsight has unveiled a significant vulnerability in the digital landscape, identifying over 40,000 security cameras globally that are susceptible to remote hacking. These cameras, operating primarily over HTTP and RTSP protocols, inadvertently expose live video feeds directly to the internet, making them prime targets for malicious activities ranging from espionage to botnet recruitment. HTTP-based cameras, commonly found in homes and small offices, often allow direct access to administrative interfaces or expose screenshots via simple URI manipulations. RTSP cameras, used in professional surveillance, are harder to fingerprint but can still be exploited to return live footage. This widespread exposure highlights a critical security flaw, transforming devices intended for protection into potential tools for privacy invasion and cyberattacks.

    The geographical distribution of these exposed cameras reveals a concerning concentration, with the United States accounting for over 14,000 devices, followed by Japan with approximately 7,000. Other countries like Austria, Czechia, South Korea, Germany, Italy, and Russia also host thousands of vulnerable cameras. Within the US, California and Texas show the highest numbers, with other states like Georgia, New York, and Missouri also significantly impacted. Industry-wise, the telecommunications sector bears the brunt of the exposure, representing a staggering 79% of vulnerable devices, largely due to residential network connections. When excluding this sector, technology, media/entertainment, utilities, business services, and education emerge as the most affected industries, underscoring the broad scope of this security challenge across various critical sectors.

    The implications of such widespread exposure are severe, extending beyond mere privacy breaches. Bitsight warns that these cameras are actively sought by threat actors on dark web forums, posing risks such as ensnarement in botnets or serving as pivot points for deeper network intrusions. The presence of these vulnerable devices in diverse locations like offices, factories, restaurants, and hotels amplifies the potential for corporate espionage and data theft. To counter these threats, Bitsight advises users and organizations to adopt crucial security measures: securing internet connections, replacing default credentials, disabling unnecessary remote access, keeping device firmware updated, and consistently monitoring for unusual login attempts. Adhering to these precautions is paramount to safeguard privacy and prevent these surveillance tools from becoming unintended liabilities.

    Projects

    • TryHackMe – Hashing Basics – In Progress

    Articles

    Podcasts

  • Crowdstrike Global Threat Report 2025

    Crowdstrike Global Threat Report 2025

    CrowdStrike’s 2025 Global Threat Report details the evolving cybersecurity landscape, emphasizing the increasing sophistication and business-like approach of cyber adversaries. The report underscores the rise of “enterprising adversaries” leveraging genAI for social engineering and malicious activities.

    TLDR:

    • The average breakout time has decreased to 48 minutes, with the fastest recorded breakout time being only 51 seconds.
    • Voice phishing (vishing) attacks saw a significant increase of 442% between the first and second half of 2024.
    • Attacks related to initial access accounted for 52% of the vulnerabilities observed by CrowdStrike in 2024.
    • Advertisements for access brokers increased by 50% year-over-year, indicating a thriving business in providing access as a service.
    • China-nexus activity surged by 150% overall, with some targeted industries experiencing a 200% to 300% increase in attacks compared to the previous year.
    • 79% of detections in 2024 were malware-free, a significant increase from 40% in 2019, indicating a shift towards hands-on-keyboard techniques.
    • 26 new adversaries were tracked by CrowdStrike in 2024, bringing the total to 257.
    • Interactive intrusion campaigns increased by 35% year-over-year.
    • Valid account abuse was responsible for 35% of cloud-related incidents.
    • FAMOUS CHOLLIMA had 304 incidents, with nearly 40% representing insider threat operations.
    • LLM-generated phishing messages had a 54% click-through rate, significantly higher than human-written phishing messages at 12%.
    • New cloud intrusions increased 26% compared to 2023, indicating more threat actors are targeting cloud services.
    • China-nexus intrusions increased 150% across all sectors on average compared to 2023