πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Listen up 4 – CYBERSECURITY FIRST! Purple teaming – learning to think like your adversaries ⚠

Michelle Farenci knows her stuff, because she's a cybersecurity practitioner inside a cybersecurity company! Learn why thinking like an attacker makes you a better defender.

πŸ“– Read

via "Naked Security".
⚠ Cybersecurity Awareness Month: Listen up – CYBERΒ­SECURITY FIRST! ⚠

Fraser Howard of SophosLabs is truly a world expert in fighting malware. Read now, and learn from the best!

πŸ“– Read

via "Naked Security".
⚠ Banking scam uses Docusign phish to thieve 2FA codes ⚠

This scam is obviously inapplicable to 999 people in every 1000... but there are LOTS of 1-in-1000 people in the world!

πŸ“– Read

via "Naked Security".
⚠ Listen up 2 – CYBERSECURITY FIRST! How to protect yourself from supply chain attacks ⚠

Everyone remembers this year's big-news supply chain attacks on Kaseya and SolarWinds. Sophos expert Chester Wisniewski explains how to control the risk.

πŸ“– Read

via "Naked Security".
⚠ Listen up 3 – CYBERSECURITY FIRST! Cyberinsurance, help or hindrance? ⚠

Dr Jason Nurse, Associate Professor in Cybersecurity at the University of Kent, takes on the controversial topic of cyberinsurance.

πŸ“– Read

via "Naked Security".
β™ŸοΈ FBI Raids Chinese Point-of-Sale Giant PAX Technology β™ŸοΈ

U.S. federal investigators today raided the U.S. offices of PAX Technology, a Chinese provider of point-of-sale devices used by millions of businesses and retailers globally. KrebsOnSecurity has learned the raid is tied to reports that PAX's systems may have been involved in cyberattacks on U.S. and E.U. organizations.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2021-35499 β€Ό

The Web Reporting component of TIBCO Software Inc.'s TIBCO Nimbus contains easily exploitable Stored Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker to social engineer a legitimate user with network access to execute scripts targeting the affected system or the victim's local system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Nimbus: versions 10.4.0 and below.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ DoJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation πŸ•΄

Operation Dark HunTor targeted opioid traffickers on the DarkNet, leading to the seizure of weapons, drugs, and $31 million.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Are Baby Boomers More Vulnerable Online Than Younger Generations? You Might Be Surprised πŸ•΄

Growing up with computers and the Internet doesn't necessarily convey all the advantages often attributed to younger users.

πŸ“– Read

via "Dark Reading".
❌ Why the Next-Generation of Application Security Is Needed ❌

New software and code stand at the core of everything we do, but how well is all of this new code tested? Luckily, autonomous application security is here.

πŸ“– Read

via "Threat Post".
🦿 You definitely don't want to play: Squid Game-themed malware is here 🦿

The stakes may not be as high as in the hit Netflix show, but you could still lose your data or identity if you fail to follow the rules for dodging the latest brand of pop-culture-themed scams.

πŸ“– Read

via "Tech Republic".
❌ Lazarus Attackers Turn to the IT Supply Chain ❌

Kaspersky researchers saw The North Korean state APT use a new variant of the BlindingCan RAT to breach a Latvian IT vendor and then a South Korean think tank.

πŸ“– Read

via "Threat Post".
πŸ•΄ Cybersecurity Talent Gap Narrows as Workforce Grows πŸ•΄

Job satisfaction and salaries have both increased for cybersecurity professionals, as younger workers seek specific training to prepare for a cybersecurity career.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CISA Announces Appointment of Washington Secretary of State Kim Wyman as Senior Election Security Lead πŸ•΄

As an expert on elections, her appointment speaks to the Agency’s dedication to working with election officials throughout the nation in a non-partisan manner to ensure the security and resilience of our election infrastructure.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Gas Stations in Iran Downed by Cyberattack πŸ•΄

Unknown attackers hijacked gasoline pump machines and defaced them with a message that reportedly included a phone number for Supreme Leader Ayatollah Ali Khamenei's office.

πŸ“– Read

via "Dark Reading".
πŸ•΄ IBM Announces Advances and New Collaborations in AI-Powered Automation, 5G Connectivity and Security at Mobile World Congress Los Angeles πŸ•΄

IBM collaborates with Boston Dynamics, Cisco, Palo Alto Networks and Turnium Technology Group to help equip businesses in next phase of digital transformation.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Ready to Play? Squid Game Becomes an Attractive Lure to Spread Cyberthreats πŸ•΄

Following demand from viewers, cybercriminals are not shy in taking advantage of fans’ eagerness to watch the show, with well-known fraud schemes hitting the web.

πŸ“– Read

via "Dark Reading".
❌ Public Clouds & Shared Responsibility: Lessons from Vulnerability Disclosure ❌

Much is made of shared responsibility for cloud security. But Oliver Tavakoli, CTO at Vectra AI, notes there's no guarantee that Azure or AWS are delivering services in a hardened and secure manner.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2019-3556 β€Ό

HHVM supports the use of an "admin" server which accepts administrative requests over HTTP. One of those request handlers, dump-pcre-cache, can be used to output cached regular expressions from the current execution context into a file. The handler takes a parameter which specifies where on the filesystem to write this data. The parameter is not validated, allowing a malicious user to overwrite arbitrary files where the user running HHVM has write access. This issue affects HHVM versions prior to 4.56.2, all versions between 4.57.0 and 4.78.0, as well as 4.79.0, 4.80.0, 4.81.0, 4.82.0, and 4.83.0.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ North Korea's Lazarus Group Turns to Supply Chain Attacks πŸ•΄

State-backed group is among a growing number of threat actors looking at supply chain companies as an entry point into enterprise networks.

πŸ“– Read

via "Dark Reading".
❌ SquirrelWaffle Loader Malspams, Packing Qakbot, Cobalt Strike ❌

Say hello to what could be the next big spam player: SquirrelWaffle, which is spreading with increasing frequency via spam campaigns and infecting systems with a new malware loader.

πŸ“– Read

via "Threat Post".