Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar

Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It’s a chilling reality, becoming more common and concerning by the day.
These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage.
Cybersecurity and IT

The Hacker News – ​Read More

New Phishing Kit Xiū gǒu Targets Users Across Five Countries With 2,000 Fake Sites

Cybersecurity researchers have disclosed a new phishing kit that has been put to use in campaigns targeting Australia, Japan, Spain, the U.K., and the U.S. since at least September 2024.
Netcraft said more than 2,000 phishing websites have been identified the kit, known as Xiū gǒu, with the offering used in attacks aimed at a variety of verticals, such as public sectors, postal, digital services

The Hacker News – ​Read More

A Step-by-Step Guide to How Threat Hunting Works

Stay ahead of cybercrime with proactive threat hunting. Learn how threat hunters identify hidden threats, protect critical systems,…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Facebook Businesses Targeted in Infostealer Phishing Campaign

The threat actors deceive their victims by impersonating the legal teams of companies, well-known Web stores, and manufacturers.

darkreading – ​Read More

Cybersecurity Job Market Stagnates, Dissatisfaction Abounds

The 2024 ISC2 Cybersecurity Workforce Study found that amid a tightening job market and dynamic cyber-threat environment, ongoing staffing and skills shortages are putting organizations at serious risk. Can AI move the needle in defenders’ favor?

darkreading – ​Read More

FBI: Iranian cyber group targeted Summer Olympics with attack on French display provider

The hacking group’s goal was to “display photo montages denouncing the participation of Israeli athletes in the 2024 Olympic and Paralympic Games,” the FBI said.

The Record from Recorded Future News – ​Read More

Microsoft delays its troubled AI-powered Recall feature yet again

Microsoft needs ‘additional time to refine’ Recall. Here’s the new target date for rollout and what else we know.

Latest stories for ZDNET in Security – ​Read More

Midnight Blizzard Escalates Spear-Phishing Attacks On Over 100 Organizations

Russian hackers, known as Midnight Blizzard, launch targeted spear-phishing on U.S. officials, exploiting RDP files to gain access to data.

Security | TechRepublic – ​Read More

Canada Grapples With ‘Second-to-None’ PRC-Backed Threat Actors

Chinese APTs lurked in Canadian government networks for five years — and that’s just one among a whole host of threats from Chinese bad actors.

darkreading – ​Read More

SecjuiceCon 2025

SecjuiceCon 2025

The first Secjuice conference is an online event for those interested in any aspect of information security, and we’d love for you to attend the virtual conference and learn!

Secjuice is a non-profit, independent and volunteer led publication in the information security space. We are a private members writing club focused on cybersecurity, information security, network security, hacking, cyberwar, and open source intelligence gathering.

We believe that our value as professionals lies in our ability to share our research and knowledge with others through the written word. We mentor hackers, help them prepare their research, polish their articles and translate their skills into commercial writing experience and freelance writing opportunities. Our members feel a strong sense of civic duty, it’s what drives us to spread our knowledge and experiences with our community. Defending the interests of those who hack is within our remit.

Dates

Sunday, March 30, 2025

Venue

An online conference. Registration information will become available in early 2025.

Topics

The conference will cover the following topics:

  • Technical
  • Penetration testing
  • Security research
  • The Dark Web
  • Open-source software
  • Open-source intelligence (OSINT)
  • Laws and regulations
  • Best practices and lessons learned
  • Ethics
  • Surprise category

Call for Presenters

Please visit https://sessionize.com/SecjuiceCon2025/ to submit an abstract. The deadline to submit is 12/31/2024.

Our Sponsors

We thank the following sponsors:

Become a Sponsor

Want to sponsor SecjuiceCon? Please email conference at secjuice dot com to get more details.

Secjuice – ​Read More