πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Google Adds Gemini Pro API to AI Studio and Vertex AI 🦿

Google also announced Duet AI for Developers and Duet AI in Security Operations, but neither uses Gemini yet.

πŸ“– Read

via "Tech Republic".
❀1πŸ‘1
πŸ›  Faraday 5.0.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read

via "Packet Storm Security".
β™ŸοΈ Ten Years Later, New Clues in the Target Breach β™ŸοΈ

On Dec. 18, 2013, KrebsOnSecurity broke the news that U.S. retail giant Target was battling a wide-ranging computer intrusion that compromised more than 40 million customer payment cards over the previous month. The malware used in the Target breach included the text string "Rescator," which also was the handle chosen by the cybercriminal who was selling all of the cards stolen from Target customers. Ten years later, KrebsOnSecurity has uncovered new clues about the real-life identity of Rescator.

πŸ“– Read

via "Krebs on Security".
❀1
πŸ›  American Fuzzy Lop plus plus 4.09c πŸ› 

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

πŸ“– Read

via "Packet Storm Security".
πŸ›  I2P 2.4.0 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Read

via "Packet Storm Security".
❀1
🦿 12 Essential Steps Mac Users Need To Take At Year End 🦿

As the year comes to a close, Mac users should take these steps to ensure their device's security, performance and organization.

πŸ“– Read

via "Tech Republic".
πŸ‘1
🦿 What Australia’s Digital ID Means to How Citizens Interact With Businesses Online 🦿

Australia is about to get a national online ID system β€” the Digital ID β€” which promises to improve the security and privacy of data online. However, concerns among Australians persist.

πŸ“– Read

via "Tech Republic".
🀯1
β™ŸοΈ BlackCat Ransomware Raises Ante After FBI Disruption β™ŸοΈ

The U.S. Federal Bureau of Investigation (FBI) disclosed today that it infiltrated the world's second most prolific ransomware gang, a Russia-based criminal group known as ALPHV and BlackCat. The FBI said it seized the gang's darknet website, and released a decryption tool that hundreds of victim companies can use to recover systems. Meanwhile, BlackCat responded by briefly "unseizing" its darknet site with a message promising 90 percent commissions for affiliates who continue to work with the crime group, and open season on everything from hospitals to nuclear power plants.

πŸ“– Read

via "Krebs on Security".
πŸ‘1
🦿 Top 7 Cybersecurity Threats for 2024 🦿

2024 will be a pivotal year for cybersecurity. The global threat landscape is undergoing deep transformations, driven by emerging technologies, new tactics and shifting geopolitical dynamics.

πŸ“– Read

via "Tech Republic".
❀1πŸ‘1
🦿 Cyber Security Trends to Watch in Australia in 2024 🦿

Ransomware attacks on infrastructure and mid-market businesses are tipped to rise, while the use of AI cyber tools will grow as IT customers seek more signal and less noise from vendors.

πŸ“– Read

via "Tech Republic".
πŸ‘2
🦿 BlackCat Ransomware Site Seized in International Takedown Effort 🦿

The ransomware group, which has distributed ransomware to more than 1,000 victims, reportedly recovered control of its website on Tuesday. Learn how to defend against ransomware.

πŸ“– Read

via "Tech Republic".
πŸ‘1
πŸ›  OpenSSH 9.6p1 πŸ› 

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

πŸ“– Read

via "Packet Storm Security".
🦿 Third-Party Supply Chain Risk a Challenge for Cyber Security Professionals in Australia 🦿

ASIC research shows 44% of Australian organisations are not managing third-party supply chain risk. Tesserent says it remains a key risk, and disruption could emerge from geopolitical tensions.

πŸ“– Read

via "Tech Republic".
🦿 Google Cloud’s Cybersecurity Predictions of 2024 and Look Back at 2023 🦿

Generative AI can be used by attackers, but security professionals shouldn't lose sleep over it, according to a Google Cloud threat intelligence analyst. Find out why.

πŸ“– Read

via "Tech Republic".
🦿 ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence 🦿

Risk mitigation tips are provided for each of these cybersecurity threats.

πŸ“– Read

via "Tech Republic".
πŸ–‹οΈ Microsoft Disables MSIX App Installer Protocol Widely Used in Malware Attacks πŸ–‹οΈ

Microsoft on Thursday said it’s once again disabling the ms-appinstaller protocol handler by default following its abuse by multiple threat actors to distribute malware.β€œThe observed threat actor activity abuses the current implementation of the ms-appinstaller protocol handler as an access vector for malware that may lead to ransomware distribution,” the Microsoft Threat Intelligence

πŸ“– Read

via "The Hacker News".
πŸ–‹οΈ CERT-UA Uncovers New Malware Wave Distributing OCEANMAP, MASEPIE, STEELHOOK πŸ–‹οΈ

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign orchestrated by the Russia-linked APT28 group to deploy previously undocumented malware such as OCEANMAP, MASEPIE, and STEELHOOK to harvest sensitive information.The activity, which was detected by the agency between December 15 and 25, 2023, targets government entities

πŸ“– Read

via "The Hacker News".
πŸ•΄ UAE Banks on AI to Boost Cybersecurity πŸ•΄

The federation has formed partnerships to aid its cybersecurity ambitions as well, but aging legacy systems and a talent gap leave the UAE vulnerable to cyber-risks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ I Securely Resolve: CISOs, IT Security Leaders Share 2024 Resolutions πŸ•΄

As cybersecurity leaders confront ever more complex challenges, the new year offers security leaders a chance to strategically reevaluate and plan for 2024.

πŸ“– Read

via "Dark Reading".
πŸ–‹οΈ Albanian Parliament and One Albania Telecom Hit by Cyber Attacks πŸ–‹οΈ

The Assembly of the Republic of Albania and telecom company One Albania have been targeted by cyber attacks, the country’s National Authority for Electronic Certification and Cyber Security (AKCESK) revealed this week.β€œThese infrastructures, under the legislation in force, are not currently classified as critical or important information infrastructure,” AKCESK said.One Albania, which has

πŸ“– Read

via "The Hacker News".
πŸ–±οΈ A year in review: 10 of the biggest security incidents of 2023 πŸ–±οΈ

As we draw the curtain on another eventful year in cybersecurity, let’s review some of the high-profile cyber-incidents that occurred in 2023

πŸ“– Read

via "WeLiveSecurity - ESET".