NCSA Webboard
    • ล่าสุด
    • แท็ก
    • ฮิต
      • ติดต่อสำนักงาน
    • ลงทะเบียน
    • เข้าสู่ระบบ
    1. หน้าแรก
    2. NCSA_THAICERT
    • รายละเอียด
    • ติดตาม 0
    • คนติดตาม 2
    • กระทู้ 1,675
    • กระทู้ 1,676
    • ดีที่สุด 0
    • Controversial 0
    • กลุ่ม 2

    NCSA_THAICERT

    @NCSA_THAICERT

    1
    ชื่อเสียง
    47
    ดูข้อมูลส่วนตัว
    1.7k
    กระทู้
    2
    คนติดตาม
    0
    ติดตาม
    เข้าร่วม ออนไลน์ล่าสุด
    เว็บไซต์ www.ncsa.or.th/?fbclid=IwAR0BqJEC-CJzBs98rlBxUbZkNBgp1g814xdDNNaKnHTrxfqZhPD--ksY68I

    NCSA_THAICERT เลิกติดตาม ติดตาม
    Global Moderator administrators

    Latest posts made by NCSA_THAICERT

    • Cyber Threat Intelligence 28 November 2025

      Financial Sector

      • Criminal Networks Industrialize Payment Fraud Operations
        "Fraud operations are expanding faster than payment defenses can adjust. Criminal groups function like coordinated businesses that develop tools, automate tasks, and scale attacks. New data from a Visa report shows how these shifts are reshaping risk across the financial sector."
        https://www.helpnetsecurity.com/2025/11/27/visa-payment-fraud-trends-report/

      Malware

      • Shai-Hulud 2.0 Campaign Targets Cloud And Developer Ecosystems
        "This blog continues our investigation on the Node Package Manager (NPM) supply chain attack that took place on September 15, where attackers executed a highly targeted phishing campaign to compromise the account of an NPM package maintainer. Our previous blog detailed how the malicious code injected onto JavaScript packages diverted cryptocurrency assets by hijacking web APIs and manipulating network traffic, and how the Shai-hulud worm in the attack payload steals cloud service tokens, deploys secret-scanning tools, and spreads to additional accounts. An incident this November 24 reported hundreds of NPM repositories compromised by what appears to be a new Shai-hulud campaign with the repository description, "Sha1-Hulud: The Second Coming.""
        https://www.trendmicro.com/en_us/research/25/k/shai-hulud-2-0-targets-cloud-and-developer-systems.html
        • Is Zendesk Scattered Lapsus$ Hunters’ Latest Campaign Target?
          "ReliaQuest has uncovered indications of a potential new campaign from the notorious threat collective “Scattered Lapsus$ Hunters,” this time targeting users of the customer support software Zendesk. ReliaQuest’s Threat Research team identified Zendesk-related domains, including more than 40 typosquatted domains and impersonating URLs, created within the past six months. These domains, such as znedesk[.]com or vpn-zendesk[.]com, are clearly designed to mimic legitimate Zendesk environments. Some host phishing pages, like fake single sign-on (SSO) portals that appear before Zendesk authentication. It’s a classic tactic probably aimed at stealing credentials from unsuspecting users. We also identified Zendesk-related impersonating domains that contained multiple different organizations’ names or brands within the URL, making it even more likely that unsuspecting users would trust and click on these links."
          https://reliaquest.com/blog/zendesk-scattered-lapsus-hunters-latest-target/
          https://www.infosecurity-magazine.com/news/scattered-lapsus-hunters-zendesk/
          https://www.theregister.com/2025/11/27/scattered_lapsus_hunters_zendesk/
      • Meet Rey, The Admin Of ‘Scattered Lapsus$ Hunters’
        "A prolific cybercriminal group that calls itself “Scattered LAPSUS$ Hunters” has dominated headlines this year by regularly stealing data from and publicly mass extorting dozens of major corporations. But the tables seem to have turned somewhat for “Rey,” the moniker chosen by the technical operator and public face of the hacker group: Earlier this week, Rey confirmed his real life identity and agreed to an interview after KrebsOnSecurity tracked him down and contacted his father."
        https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunters/
        https://hackread.com/report-names-teen-scattered-lapsus-hunters-group/

      Breaches/Hacks/Leaks

      • OpenAI Discloses API Customer Data Breach Via Mixpanel Vendor Hack
        "OpenAI is notifying some ChatGPT API customers that limited identifying information was exposed following a breach at its third-party analytics provider Mixpanel. Mixpanel offers event analytics that OpenAI uses to track user interactions on the frontend interface for the API product. According to the AI company, the cyber incident affected “limited analytics data related to some users of the API” and did not impact users of ChatGPT or other products."
        https://www.bleepingcomputer.com/news/security/openai-discloses-api-customer-data-breach-via-mixpanel-vendor-hack/
        https://openai.com/index/mixpanel-incident/
        https://www.infosecurity-magazine.com/news/openai-warns-mixpanel-data-breach/
        https://www.securityweek.com/openai-user-data-exposed-in-mixpanel-hack/
        https://hackread.com/openai-api-mixpanel-data-breach-chatgpt/
        https://securityaffairs.com/185121/data-breach/openai-data-may-have-been-exposed-after-a-cyberattack-on-analytics-firm-mixpanel.html
        https://www.theregister.com/2025/11/27/openai_mixpanel_api/
      • Asahi Admits Ransomware Gang May Have Spilled Almost 2M People's Data
        "Asahi has finally done the sums on September's ransomware attack in Japan, conceding the crooks may have helped themselves to personal data tied to almost 2 million people. Back on September 29, Asahi disclosed a "system failure caused by a cyberattack" that knocked out ordering, shipping, and call center systems across its Japanese operations. Days later, the attack was claimed by the Qilin ransomware crew, which reckons it stole some 27 GB of internal files – including employee records, contracts, financial documents, and other sensitive assets."
        https://www.theregister.com/2025/11/27/asahi_ransomware_numbers/
        https://www.infosecurity-magazine.com/news/asahi-15-million-customers/
        https://www.securityweek.com/asahi-data-breach-impacts-2-million-individuals/
        https://securityaffairs.com/185126/data-breach/asahi-says-crooks-stole-data-of-approximately-2m-customers-and-employees.html

      General News

      • Your Critical Infrastructure Is Running Out Of Time
        "Cyber attackers often succeed not because they are inventive, but because the systems they target are old. A new report by Cisco shows how unsupported technology inside national infrastructure creates openings that attackers can exploit repeatedly. The findings show how widespread this problem has become and how much it influences national resilience."
        https://www.helpnetsecurity.com/2025/11/27/cisco-legacy-system-vulnerabilities-report/
      • The Identity Mess Your Customers Feel Before You Do
        "Customer identity has become one of the most brittle parts of the enterprise security stack. Teams know authentication matters, but organizations keep using methods that frustrate users and increase risk. New research from Descope shows how companies manage customer identity and the issues that have been building in the background."
        https://www.helpnetsecurity.com/2025/11/27/descope-customer-identity-issues-report/
      • Fraud Fears But No Breach Spike Expected This Festive Season
        "Security experts have dismissed fears that threat actors could step up cyber-attacks on distracted retailers this Black Friday and in the run up to Christmas, although concerns persist. Huntsman Security analyzed data security incidents reported to the UK's Information Commissioner's Office (ICO) between Q3 2024 and Q2 2025. It found that the 1381 incidents reported by the retail and manufacturing sector had only minor seasonal peaks, with none outside a margin of error. Some 355 incidents were reported to the regulator in the busiest time of the year for retailers (Q4), versus 323 in Q3 2024, 317 in Q2 2025 and 386 in Q2 2025. The latter period included the massive ransomware breaches at M&S and the Co-Op Group."
        https://www.infosecurity-magazine.com/news/fraud-fears-no-breach-spike/
      • Ransomware Reshaping Cyber As National Security Priority
        "Non-stop, high-profile ransomware attacks against Britain and the United States have transformed cybersecurity into a national security priority, Anne Neuberger, the former White House deputy national security adviser for cyber, said at a Wednesday event in London. "For too long, it's been a tech thing, 'go get your CIO to fix it,'" Neuberger told attendees at an event hosted by think tank Royal United Services Institute, where she serves as a distinguished fellow."
        https://www.bankinfosecurity.com/ransomware-reshaping-cyber-as-national-security-priority-a-30160
      • As Space Becomes Warfare Domain, Cyber Is On The Frontlines
        "Space is becoming a domain of warfare, with private sector companies on the front lines - and the first shots will likely be fired in cyberspace, a senior U.S. intelligence official warned this month. "Cybersecurity for space systems is very likely to be on the front lines of conflict involving space," said Johnathon Martin, acting deputy director of the Office of the Chief Architect at the National Reconnaissance Office, which builds, launches and operates U.S. spy satellites."
        https://www.bankinfosecurity.com/as-space-becomes-warfare-domain-cyber-on-frontlines-a-30148
      • FCC Warns Of Hackers Hijacking Radio Equipment For False Alerts
        "Hackers have been hijacking US radio transmission equipment to air bogus emergency tones and offensive material, according to a notice issued Wednesday by the US Federal Communications Commission (FCC). The wave of intrusions triggered unauthorized uses of the Emergency Alert System’s distinctive Attention Signal, which is normally reserved for tornadoes, hurricanes, earthquakes and other urgent threats. In particular, threat actors appeared to target Barix network audio devices and reconfigure them to capture attacker-controlled streams instead of regular programming."
        https://www.infosecurity-magazine.com/news/fcc-hackers-hijacking-radio/
        https://docs.fcc.gov/public/attachments/DA-25-996A1.pdf
        https://www.theregister.com/2025/11/27/fcc_radio_hijack/

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) 225ed552-b6c2-4fe8-a082-8ba991511cdc-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • พบการแพร่กระจายมัลแวร์ขโมยข้อมูล (Infostealer) ผ่านการติดตั้งเกมละเมิดลิขสิทธิ์

      e5803f4c-4a4d-4447-8ef6-3f27dd3e8669-image.png พบการแพร่กระจายมัลแวร์ขโมยข้อมูล (Infostealer) ผ่.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand d130109e-b2c7-442e-b710-1d53a8814aa1-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • หน่วยงานท้องถิ่นหลายแห่งในลอนดอนประกาศระบบไอทีขัดข้อง หลังพบเหตุโจมตีไซเบอร์

      e52a0289-9cd8-4b71-a8d5-f82ffaae649b-image.png หน่วยงานท้องถิ่นหลายแห่งในลอนดอนประกาศร.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 9341e41a-67cd-4dd9-b637-3a4192524392-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • แฮกเกอร์เริ่มใช้โมเดลภาษา LLM พัฒนา “มัลแวร์อัจฉริยะ” หลบระบบตรวจจับแบบเรียลไทม์

      98e5e8cd-fdf1-49b7-9fd1-0266a43a3b91-image.png แฮกเกอร์เริ่มใช้โมเดลภาษา LLM พัฒนา “มัลแวร.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 28d4861a-f87d-41fb-91df-3001cba8f3c2-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Cyber Threat Intelligence 27 November 2025

      Telecom Sector

      • Mobile Industry Warns Patchwork Cyber Regs Are Driving Up Costs
        "Mobile operators' core cybersecurity spending is projected to more than double by 2030 as threats evolve, while poorly designed and fragmented policy frameworks add extra compliance costs, according to industry group the GSMA. The lobbying organization has pushed out a report calling for national policymakers to simplify compliance and incident reporting to make the job of the network operators easier. It also wants to see greater international coordination between governments and regulators to build those frameworks around common standards."
        https://www.theregister.com/2025/11/26/gsma_global_standards_mobile_industry/
        https://www.gsma.com/solutions-and-impact/connectivity-for-good/public-policy/wp-content/uploads/2025/11/Impact-of-Cybersecurity-Regulation-on-Mobile-Operators.pdf

      New Tooling

      • DeepTeam: Open-Source LLM Red Teaming Framework
        "Security teams are pushing large language models into products faster than they can test them, which makes any new red teaming method worth paying attention to. DeepTeam is an open-source framework built to probe these systems before they reach users, and it takes a direct approach to exposing weaknesses. The tool runs on a local machine and uses language models to simulate attacks as well as evaluate the results. It applies techniques drawn from recent research on jailbreaking and prompt injection, which gives teams a way to uncover issues such as bias or exposure of personal data. Once DeepTeam finds a problem, it offers guardrails that can be added to production systems to block similar issues."
        https://www.helpnetsecurity.com/2025/11/26/deepteam-open-source-llm-red-teaming-framework/
        https://github.com/confident-ai/deepteam

      Vulnerabilities

      • Old Tech, New Vulnerabilities: NTLM Abuse, Ongoing Exploitation In 2025
        "Flip phones grew popular, Windows XP debuted on personal computers, Apple introduced the iPod, peer-to-peer file sharing via torrents was taking off, and MSN Messenger dominated online chat. That was the tech scene in 2001, the same year when Sir Dystic of Cult of the Dead Cow published SMBRelay, a proof-of-concept that brought NTLM relay attacks out of theory and into practice, demonstrating a powerful new class of authentication relay exploits."
        https://securelist.com/ntlm-abuse-in-2025/118132/
      • ASUS Warns Of New Critical Auth Bypass Flaw In AiCloud Routers
        "ASUS has released new firmware to patch nine security vulnerabilities, including a critical authentication bypass flaw in routers with AiCloud enabled. AiCloud is a cloud-based remote access feature that comes with many ASUS routers, turning them into private cloud servers for remote media streaming and cloud storage. As the Taiwanese electronics manufacturer explained, the CVE-2025-59366 vulnerability "can be triggered by an unintended side effect of the Samba functionality, potentially leading to allow execution of specific functions without proper authorization.""
        https://www.bleepingcomputer.com/news/security/asus-warns-of-new-critical-auth-bypass-flaw-in-aicloud-routers/
      • Popular Forge Library Gets Fix For Signature Verification Bypass Flaw
        "A vulnerability in the ‘node-forge’ package, a popular JavaScript cryptography library, could be exploited to bypass signature verifications by crafting data that appears valid. The flaw is tracked as CVE-2025-12816 and received a high severity rating. It arises from the library’s ASN.1 validation mechanism, which allows malformed data to pass checks even when it is cryptographically invalid."
        https://www.bleepingcomputer.com/news/security/popular-forge-library-gets-fix-for-signature-verification-bypass-flaw/
        Dell ControlVault, Lasso, GL.iNet Vulnerabilities
        "Cisco Talos’ Vulnerability Discovery & Research team recently disclosed five vulnerabilities in Dell ControlVault 3 firmware and its associated Windows software, four vulnerabilities in Entr'ouvert Lasso, and one vulnerability in GL.iNet Slate AX. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy. For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always posted on Talos Intelligence’s website."
        https://blog.talosintelligence.com/dell-controlvault-lasso-gl-inet-vulnerabilities/
      • B2B Guest Access Creates An Unprotected Attack Vector
        "Microsoft Teams is a core collaboration platform for Ontinue and for the organisations we protect. Our ability to engage directly with customers inside their own Teams environments is one of our most valued differentiators, and one they consistently highlight as a strength of our service. However, like all powerful collaboration tools, Teams depends on proper configuration and governance to ensure its security boundaries function as intended. Effective protection is not inherent to the platform; it emerges from how each tenant chooses to manage external access, identity boundaries, and integrated security controls."
        https://www.ontinue.com/resource/blog-microsoft-chat-with-anyone-understanding-phishing-risk/
        https://hackread.com/microsoft-teams-guest-chat-flaw-malware/

      Malware

      • Bloody Wolf: A Blunt Crowbar Threat To Justice
        "Bloody Wolf is an advanced persistent threat (APT) group active since late 2023. The group initially used commercial STRRAT malware. Later, the group switched to deploying the legitimate NetSupport remote administration tool (RAT) in campaigns targeting Kazakhstan and Russia previously described by BI.ZONE analysts. A joint investigation between Group-IB and UKUK has revealed that Bloody Wolf had been conducting a campaign in Kyrgyzstan since at least June 2025. Those threat actors would impersonate the country’s Ministry of Justice through official looking PDF documents and domain names, which in turn hosted malicious Java Archive (JAR) files designed to deploy the NetSupport RAT."
        https://www.group-ib.com/blog/bloody-wolf/
      • Dissecting a New Malspam Chain Delivering Purelogs Infostealer
        "The AISI Research Center’s Cybersecurity Observatory publishes the report “Dissecting a new malspam chain delivering Purelogs infostealer” – November 25, 2025. Organizational and personal security remains under constant threat from increasingly sophisticated attack vectors, with malspam continuing to represent one of the most widespread and effective initial infection vectors for distributing malware on a large scale. Despite advances in endpoint protection technologies, malicious campaigns effectively exploit human urgency, curiosity, and trust, often masquerading as legitimate communications, security alerts, or financial documents."
        https://securityaffairs.com/185066/cyber-crime/dissecting-a-new-malspam-chain-delivering-purelogs-infostealer.html
        https://dimanec.unipegaso.it/wp-content/uploads/sites/5/2025/11/Dissecting-a-new-malspam-chain-delivering-Purelogs-infostealer.pdf
      • Russian RomCom Utilizing SocGholish To Deliver Mythic Agent To U.S. Companies Supporting Ukraine
        "In September 2025, Arctic Wolf® Labs identified a U.S.-based company that was targeted by RomCom threat actors via SocGholish, operated by TA569. While the typical initial SocGholish infection chain was followed, roughly 10 minutes post-exploitation, RomCom’s targeted Mythic Agent loader was delivered to the system. This is the first time that a RomCom payload has been observed being distributed by SocGholish."
        https://arcticwolf.com/resources/blog/romcom-utilizing-socgholish-to-deliver-mythic-agent-to-usa-companies-supporting-ukraine/
        https://thehackernews.com/2025/11/romcom-uses-socgholish-fake-update.html
        https://securityaffairs.com/185084/security/for-the-first-time-a-romcom-payload-has-been-observed-being-distributed-via-socgholish.html
      • Fake Battlefield 6 Pirated Versions And Game Trainers Used To Deploy Stealers And C2 Agents
        "Bitdefender Labs has identified malware campaigns exploiting the popularity of EA's Battlefield 6 first-person shooter, distributed via supposedly pirated versions, game installers, and fake game trainers across torrent websites and other easily found domains. Electronic Arts' Battlefield 6, developed by DICE and published by Electronic Arts (EA), was released in October, and it's likely one of the most significant game launches of the year."
        https://www.bitdefender.com/en-us/blog/labs/fake-battlefield-6-pirated-games-trainers
        https://hackread.com/fake-battlefield-6-downloads-malware-data/
      • Malicious Chrome Extension Injects Hidden SOL Fees Into Solana Swaps
        "Socket’s Threat Research Team discovered a malicious Chrome extension Crypto Copilot, published on June 18, 2024, which markets itself as a tool to “execute trades instantly from your X feed.” Behind the interface, the extension injects an extra transfer into every Solana swap, siphoning a minimum of 0.0013 SOL or 0.05% of the trade amount to a hardcoded attacker-controlled wallet. The fee behavior is never disclosed on the Chrome Web Store listing, and the logic implementing it is buried inside heavily obfuscated code."
        https://socket.dev/blog/malicious-chrome-extension-injects-hidden-sol-fees-into-solana-swaps
        https://thehackernews.com/2025/11/chrome-extension-caught-injecting.html
      • ShadowV2 Casts a Shadow Over IoT Devices
        "At the end of October, during a global disruption of AWS connections, FortiGuard Labs observed malware named “ShadowV2” spreading via IoT vulnerabilities. These incidents affected multiple countries worldwide and spanned seven different industries. So far, the malware appears to have only been active during the time of the large-scale AWS outage. We believe this activity was likely a test run conducted in preparation for future attacks. The following sections provide a detailed analysis of these incidents and the ShadowV2 malware."
        https://www.fortinet.com/blog/threat-research/shadowv2-casts-a-shadow-over-iot-devices
        https://www.bleepingcomputer.com/news/security/new-shadowv2-botnet-malware-used-aws-outage-as-a-test-opportunity/
        https://www.theregister.com/2025/11/26/miraibased_botnet_shadowv2/
      • Shai Hulud Strikes Again (v2)
        "PostHog has published a detailed post mortem describing how one of its GitHub Actions workflows was abused as an initial access vector for Shai Hulud v2. An attacker briefly opened a pull request that modified a script executed via pull_request_target, exfiltrated a bot personal access token from CI, then used that access to steal additional GitHub secrets including an npm publish token and ship malicious versions of several PostHog SDKs. PostHog has since revoked credentials, tightened workflow reviews, moved to trusted publishing, and reworked its secrets management. Their write up highlights how subtle CI workflow choices can create a path from untrusted contributions to package release credentials."
        https://socket.dev/blog/shai-hulud-strikes-again-v2
        https://thehackernews.com/2025/11/shai-hulud-v2-campaign-spreads-from-npm.html
      • The Korean Leaks – Analyzing The Hybrid Geopolitical Campaign Targeting South Korean Financial Services With Qilin RaaS
        "The "Korean Leaks" campaign showcases a sophisticated supply chain attack against South Korea's financial sector. This operation combined the capabilities of a major Ransomware-as-a-Service (RaaS) group, Qilin, with potential involvement from North Korean state-affiliated actors (Moonstone Sleet) leveraging Managed Service Provider (MSP) compromise as the initial access vector."
        https://www.bitdefender.com/en-us/blog/businessinsights/korean-leaks-campaign-targets-south-korean-financial-services-qilin-ransomware
        https://thehackernews.com/2025/11/qilin-ransomware-turns-south-korean-msp.html

      Breaches/Hacks/Leaks

      • London Councils Hit By Serious Cyber “Incidents”
        "Multiple local authorities in London appear to be dealing with a serious cybersecurity incident, it has emerged. The Royal Borough of Kensington and Chelsea (RBKC) issued a statement on Tuesday revealing that it and Westminster City Council (WCC) were responding to an incident identified on Monday morning. The two have notified the UK Information Commissioner’s Office (ICO) and are working with the National Cyber Security Centre (NCSC) on incident response."
        https://www.infosecurity-magazine.com/news/london-councils-hit-by-serious/
        https://www.theregister.com/2025/11/26/cyberattack_london_councils/
        https://therecord.media/cyber-issue-london-councils-attack
        https://www.bleepingcomputer.com/news/security/multiple-london-councils-it-systems-disrupted-by-cyberattack/
        https://www.bankinfosecurity.com/multiple-london-councils-responding-to-cyberattack-a-30146
        https://securityaffairs.com/185086/security/multiple-london-councils-faced-a-cyberattack.html
      • Gainsight Cyber-Attack Affect More Salesforce Customers
        "The cyber-attack targeting Gainsight has affected more Salesforce customers than initially expected. In a customer FAQ, first posted on November 20 and regularly updated since, the customer support platform provider said Salesforce initially provided a list of three customers impacted by the breach. Gainsight later found that the number “has been expanded to a larger list.”"
        https://www.infosecurity-magazine.com/news/gainsight-cyberattack-more/
        https://www.theregister.com/2025/11/26/gainsight_ceos_handful_customers_data_stolen/
        https://www.helpnetsecurity.com/2025/11/26/gainsight-breach-salesforce-details-attack-window/

      General News

      • Heineken CISO Champions a New Risk Mindset To Unlock Innovation
        "In this Help Net Security interview, Marina Marceta, CISO at Heineken, discusses what it takes for CISOs to be seen as business-aligned leaders rather than technical overseers. She shares how connecting security to business impact can shift perceptions and strengthen partnerships across the company. Marceta focuses on the value of a security culture that supports innovation while keeping risk in check."
        https://www.helpnetsecurity.com/2025/11/26/marina-marceta-heineken-business-aligned-security/
      • Small Language Models Step Into The Fight Against Phishing Sites
        "Phishing sites keep rising, and security teams are searching for ways to sort suspicious pages at speed. A recent study explores whether small language models (SLMs) can scan raw HTML to catch these threats. The work reviews a range of model sizes and tests how they handle detection tasks while keeping compute demands in check."
        https://www.helpnetsecurity.com/2025/11/26/research-slms-website-phishing-detection/
        https://arxiv.org/pdf/2511.15434
      • Cybersecurity Is Now a Core Business Discipline
        "Cyber risk has become the background noise of modern business. We’re seeing nearly two thousand attacks per organization per week in the first quarter of 2025—a 47% rise year-on-year. That surge reflects two realities moving at once: attacks are genuinely increasing because it’s easier and cheaper than ever to mount them, and defenders are getting better at spotting what previously slipped under the radar. In other words, the problem is growing and we’re measuring it more honestly."
        https://www.securityweek.com/cybersecurity-is-now-a-core-business-discipline/
      • The Golden Scale: 'Tis The Season For Unwanted Gifts
        "In October 2025, we published two Insights blogs on threat activity affiliated with the cybercriminal alliance known as Scattered LAPSUS$ Hunters (SLSH). After a few weeks of apparent inactivity, the threat actors have returned with a vengeance based on open-source reporting and conversations obtained from a new Telegram channel (scattered LAPSUS$ hunters part 7). This latest Insights threat blog will detail several notable observations made by Unit 42 since mid-November, and prepares organizations as we head into the holiday season."
        https://unit42.paloaltonetworks.com/new-shinysp1d3r-ransomware/
      • Behind The Bargains: Why Phishing Peaks On Black Friday
        "Black Friday has evolved into one of the most active shopping periods of the year. No longer is it just one day of shopping after Thanksgiving; the sales have now turned into a full week of high-volume promotions, beginning before Thanksgiving and stretching through Black Friday and Cyber Monday, with many retailers extending deals even longer. Unsurprisingly, this surge in digital activity is very attractive for threat actors."
        https://cofense.com/blog/behind-the-bargains-why-phishing-peaks-on-black-friday
      • Sumsub’s Annual Report: Fraud Shifts To Complex Multi-Step Schemes In 2025, Agentic AI Scams Poised To Surge In 2026
        "Sumsub today released its Identity Fraud Report 2025–2026, analyzing millions of verification checks and 4,000,000+ fraud attempts between 2024–2025*. The study blends global and regional dynamics from internal data with findings from Sumsub’s Fraud Exposure Survey 2025, featuring responses from 300+ risk professionals and 1,200+ end users. In 2024, the rise of fraud-as-a-service platforms and ready-made toolkits “democratized” identity crime, making it widely accessible to non-tech-savvy fraudsters. In 2025, that trend matured into the Sophistication Shift: fewer but more professionalized operations designed for higher-impact damage."
        https://sumsub.com/newsroom/sumsubs-annual-report-fraud-shifts-to-complex-multi-step-schemes-in-2025-agentic-ai-scams-poised-to-surge-in-2026/
        https://sumsub.com/fraud-report-2025/
        https://www.darkreading.com/cyberattacks-data-breaches/digital-fraud-industrial-scale-2025
      • Prompt Injections Loom Large Over ChatGPT's Atlas Browser
        "As a new AI-powered Web browser brings agentics closer to the masses, questions remain regarding whether prompt injections, the signature LLM attack type, could get even worse. ChatGPT Atlas is OpenAI's large language model (LLM)-powered Web browser launched Oct. 21 and based on Chromium. Currently available for macOS (with other platforms to come), Atlas comes with native ChatGPT functionality including text generation, Web page summarization, and agent capabilities."
        https://www.darkreading.com/application-security/prompt-injections-loom-large-over-chatgpt-atlas-launch
      • Enterprises Aren't Confident They Can Secure Non-Human Identities (NHIs)
        "Non-human identities (NHIs) are poised to experience exponential growth and adoption throughout the coming year, fundamentally transforming how organizations approach cybersecurity. These digital entities, which include service accounts, system identities, machine identities, and other forms of automated identities, serve as the backbone of modern digital infrastructure by enabling communication and interaction between applications, services, and automated systems."
        https://www.darkreading.com/identity-access-management-security/enterprise-not-confident-secure-non-human-identities

      อ้างอิง
      Electronic Transactions Development Agency (ETDA) afe04ed6-fd6c-4c80-b7f6-10c3b66f2f4a-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • รายงานการรับมือสถานการณ์ความไม่พร้อมใช้งาน จากผู้ให้บริการ CDN (Content Delivery Network) และ บริการคลาวด์

      [TLP_CLEAR] รายงานการรับมือสถานการณ์ความไม่พร้อ_Page1.png [TLP_CLEAR] รายงานการรับมือสถานการณ์ความไม่พร้อ_Page2.png [TLP_CLEAR] รายงานการรับมือสถานการณ์ความไม่พร้อ_Page3.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • มัลแวร์ StealC V2 ใช้ไฟล์โมเดล Blender แฝงตัวในไฟล์ 3D ขโมยข้อมูลกว่า 100 รายการ

      8be5ec7a-046f-46d2-82d2-a8d881de2cf2-image.png มัลแวร์ StealC V2 ใช้ไฟล์โมเดล Blender แฝงตัวในไฟล์ 3D .png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 6d45faf1-9de0-4cbb-92b8-6e60bd230e9a-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • Harvard University เปิดเผยเหตุข้อมูลรั่วไหล ส่งผลกระทบต่อนักศึกษา ศิษย์เก่า ผู้บริจาค และบุคลากร

      44cb9758-dac9-4f5c-9b19-b68ab07e15d0-image.png Harvard University เปิดเผยเหตุข้อมูลรั่วไหล ส่งผลกระท.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 6c318147-b6ae-4492-9388-b4551b79bf85-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • เตือนภัย พบการโจมตี ClickFix ใช้หน้าจอ Windows Update ปลอม เพื่อหลอกผู้ใช้งานติดตั้งมัลแวร์ผ่านภาพซ่อนโค้ด

      e60ec0f5-b469-4f39-872e-9d0a46e9a253-image.png เตือนภัย พบการโจมตี ClickFix  ใช้หน้าจอ Windows Update ปลอ.png

      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 9a8d8825-f8fa-407e-a8d6-95533e8916d9-image.png

      โพสต์ใน Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT
    • CISA เผยแพร่คำแนะนำด้านระบบควบคุมอุตสาหกรรม (ICS) จำนวน 7 รายการ

      Cybersecurity and Infrastructure Security Agency (CISA) ได้เผยแพร่คำแนะนำเกี่ยวกับระบบควบคุมอุตสาหกรรม (ICS) จำนวน 7 รายการ เมื่อวันที่ 25 พฤศจิกายน 2025 พื่อให้ข้อมูลที่ทันเวลาเกี่ยวกับประเด็นด้านความมั่นคงปลอดภัย ช่องโหว่ และการโจมตีที่เกี่ยวข้องกับระบบ ICS โดยมีรายละเอียดดังนี้

      • ICSA-25-329-01 Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, Cobalt Share
      • ICSA-25-329-02 Rockwell Automation Arena Simulation
      • ICSA-25-329-03 Zenitel TCIV-3+
      • ICSA-25-329-04 Opto 22 groov View
      • ICSA-25-329-05 Festo Compact Vision System, Control Block, Controller, and Operator Unit products
      • ICSA-25-329-06 SiRcom SMART Alert (SiSA)
      • ICSA-22-333-05 Mitsubishi Electric FA Engineering Software (Update C)

      CISA แนะนำให้ผู้ใช้งานและผู้ดูแลระบบ ตรวจสอบคำแนะนำ ICS ที่เผยแพร่ล่าสุด เพื่อศึกษารายละเอียดทางเทคนิคและแนวทางการลดความเสี่ยง (mitigations)

      อ้างอิง
      https://www.cisa.gov/news-events/alerts/2025/11/25/cisa-releases-seven-industrial-control-systems-advisories
      สามารถติดตามข่าวสารได้ที่ webboard หรือ Facebook NCSA Thailand 00c8a148-21f3-4f3b-bc49-7ef021f4f9ef-image.png

      โพสต์ใน OT Cyber Security News
      NCSA_THAICERTN
      NCSA_THAICERT