Opalsec :verified:<p>Hey <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> pros! 👋 Ready to dive into the latest threats and breaches making headlines? </p><p>Our latest blog post is packed with need-to-know info to keep you ahead of the curve. </p><p>🗞️ <a href="https://opalsec.io/daily-news-update-thursday-march-27-2025-australia-melbourne/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-t</span><span class="invisible">hursday-march-27-2025-australia-melbourne/</span></a></p><p>Here's a quick rundown of what's inside:</p><p>🕵️♂️ FamousSparrow's Return: The Chinese government-backed hacking group is back, targeting organizations in North America. Important distinction: ESET insists on tracking them separately from Salt Typhoon. Remember to prioritize TTPs and IOCs/IOAs accordingly!</p><p>🗄️ RedCurl's Ransomware Twist: This corporate espionage group is now deploying "QWCrypt" ransomware, targeting Hyper-V servers. Phishing emails with malicious IMG attachments are the initial attack vector.</p><p>😬 StreamElements Data Breach: A third-party service provider suffered a breach, exposing data of 210,000 customers.!</p><p>🏛️ NSW Court System Data Theft: Sensitive documents, including AVOs, were stolen from the NSW Online Registry website. This could have serious consequences for victims of domestic violence.</p><p>👨🎓 NYU Website Defacement: A hacker compromised NYU's website, leaking personal data of over 1 million students. Even with good intentions, the collateral damage is unacceptable.</p><p>💰 Defense Contractor Fined: MORSE Corp will pay millions for failing to meet federal cybersecurity requirements. Third-party risk management is crucial!</p><p>🤖 Atlantis AIO Automates Credential Stuffing: This new platform automates credential stuffing attacks against 140 online services. Stay vigilant against brute force attacks!</p><p>🚨 Chrome Zero-Day Exploited: Google patched a zero-day vulnerability exploited in espionage campaigns targeting Russian organizations. Keep your browsers updated!</p><p>👦 UK Warns of 'Com Networks': The UK's NCA is warning of a growing threat from online networks of teenage boys who are "dedicated to inflicting harm and committing a range of criminality." A very worrying trend that we need to be aware of.</p><p>Ready for the full scoop? Read the full blog post here 👉 <a href="https://opalsec.io/daily-news-update-thursday-march-27-2025-australia-melbourne/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-t</span><span class="invisible">hursday-march-27-2025-australia-melbourne/</span></a> </p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/DataPrivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataPrivacy</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/FamousSparrow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FamousSparrow</span></a> <a href="https://infosec.exchange/tags/RedCurl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedCurl</span></a> <a href="https://infosec.exchange/tags/StreamElements" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StreamElements</span></a> <a href="https://infosec.exchange/tags/NSWCourts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSWCourts</span></a> <a href="https://infosec.exchange/tags/NYU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NYU</span></a> <a href="https://infosec.exchange/tags/MORSECorp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MORSECorp</span></a> <a href="https://infosec.exchange/tags/AtlantisAIO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AtlantisAIO</span></a> <a href="https://infosec.exchange/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://infosec.exchange/tags/ComNetworks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComNetworks</span></a> <a href="https://infosec.exchange/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityNews</span></a> <a href="https://infosec.exchange/tags/CybersecurityThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybersecurityThreats</span></a> <a href="https://infosec.exchange/tags/InfoSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSecurity</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/DataSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataSecurity</span></a> <a href="https://infosec.exchange/tags/PrivacyMatters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyMatters</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://infosec.exchange/tags/ThreatActor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatActor</span></a> <a href="https://infosec.exchange/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a> <a href="https://infosec.exchange/tags/SaltTyphoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SaltTyphoon</span></a> <a href="https://infosec.exchange/tags/NIST" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NIST</span></a> <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroTrust</span></a> <a href="https://infosec.exchange/tags/SaltTyphoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SaltTyphoon</span></a> <a href="https://infosec.exchange/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CriticalInfrastructure</span></a></p>