πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ Number of cyber-attacks infiltrating critical New Zealand networks soars πŸ—“οΈ

National cybersecurity agency also observes rise in automated probing for web security flaws

πŸ“– Read

via "The Daily Swig".
⚠ The self-driving smart suitcase… that the person behind you can hijack! ⚠

Apparently, we need a self-driving IoT Bluetooth robot suitcase. Who knew?

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Exploit-as-a-service: Cybercriminals exploring potential of leasing out zero-day vulnerabilities πŸ—“οΈ

New approach echoes the depressingly successful ransomware-as-a-service business model

πŸ“– Read

via "The Daily Swig".
πŸ•΄ 4 Considerations for Improving Cloud Security Hygiene πŸ•΄

Mixing cloud security and maintenance practices with legacy enterprise approaches usually ends up shortchanging cloud hygiene. Here are some ways to remedy that.

πŸ“– Read

via "Dark Reading".
❌ MosesStaff Locks Up Targets, with No Ransom Demand, No Decryption ❌

A politically motivated group is paralyzing Israeli entities with no financial goal -- and no intention of handing over decryption keys.

πŸ“– Read

via "Threat Post".
πŸ•΄ The Old Ways Aren’t Working: Let’s Rethink OT Security πŸ•΄

Ransomware attacks against critical infrastructure go beyond locking up data. They can entirely shut down production in a facility. Here's how AI can help you fight back.

πŸ“– Read

via "Dark Reading".
❌ 200M Adult Cam Model, User Records Exposed in Stripchat Breach ❌

The leak included model information, chat messages and payment details.

πŸ“– Read

via "Threat Post".
🦿 14 tactics to use during a ransomware negotiation 🦿

Security researchers analyzed 700 incidents to understand the economics of these threats as well as what bargaining tactics work.

πŸ“– Read

via "Tech Republic".
❌ Rooting Malware Is Back for Mobile. Here’s What to Look Out For. ❌

Hank Schless, senior manager of security solutions at Lookout, discusses AbstractEmu, mobile malware found on Google Play, Amazon Appstore and the Samsung Galaxy Store.

πŸ“– Read

via "Threat Post".
πŸ•΄ Emotet Makes a Comeback πŸ•΄

The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cybercriminals Increasingly Employ Crypto-Mixers to Launder Stolen Profits πŸ•΄

Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.

πŸ“– Read

via "Dark Reading".
❌ FBI Email Hoaxer ID’ed by the Guy He Allegedly Loves to Torment ❌

Vinny Troia, the cybersecurity researcher mentioned in a fake alert gushed out of the FBI’s email system, says it's just one of a string of jabs from a childish but cybercriminally talented tormentor.

πŸ“– Read

via "Threat Post".
πŸ•΄ New Global Rackspace Technology Survey Underscores Rapid Pace of Cloud Adoption πŸ•΄

More than half of respondents have 100% of their infrastructure in the cloud; IT playing an increasingly critical role in driving corporate strategy.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Team Cymru Acquires Amplicy πŸ•΄

The combination of Team Cymru's threat intelligence and threat hunting capabilities and Amplicy's Internet asset discovery and vulnerability management will give enterprise defenders a comprehensive view of their organization's cyber risk.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Belarusian hackers claim to have accessed full database of those crossing the country’s borders πŸ—“οΈ

β€˜Belarus Cyber-Partisans’ say they gained access to all entries in and out of the country over the past 15 years

πŸ“– Read

via "The Daily Swig".
❌ Phishing Scam Aims to Hijack TikTok β€˜Influencer’ Accounts ❌

Threat actors used malicious emails to target more than 125 people with high-profile TikTok accounts in an attempt to steal info and lock them out.

πŸ“– Read

via "Threat Post".
🦿 Your weak passwords can be cracked in less than a second 🦿

Easy-to-crack phrases "123456," "123456789," "12345," "qwerty" and "password" are the five most common passwords, says NordPass.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Belarus Linked to Big European Disinformation Campaign πŸ•΄

EU officials and others previously had blamed Russia's intelligence operations for the so-called Ghostwriter campaign.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Vulnerabilities in GitHub NPM packages could allow threat actors to publish malicious versions πŸ—“οΈ

Details of flaws were made public this week

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2020-12951 β€Ό

Race condition in PSP FW could allow less privileged x86 code to perform PSP SMM operations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38984 (security_guardium_key_lifecycle_manager, security_key_lifecycle_manager) β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 212793.

πŸ“– Read

via "National Vulnerability Database".