πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ LODEINFO Fileless Malware Evolves with Anti-Analysis and Remote Code Tricks πŸ–‹οΈ

Cybersecurity researchers have uncovered an updated version of a backdoor called LODEINFO that's distributed via spearphishing attacks. The findings come from Japanese company ITOCHU Cyber Intelligence, which said the malware "has been updated with new features, as well as changes to the antianalysis analysis avoidance techniques." LODEINFO versions 0.6.6 and 0.6.7.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cyber Threat Landscape: 7 Key Findings and Upcoming Trends for 2024 πŸ–‹οΈ

The 20232024 Axur Threat Landscape Report provides a comprehensive analysis of the latest cyber threats. The information combines data from the platform's surveillance of the Surface, Deep, and Dark Web with insights derived from the indepth research and investigations conducted by the Threat Intelligence team. Discover the full scope of digital threats in the Axur Report 20232024. Overview.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Data Privacy Week: US Data Breaches Surge, 2023 Sees 78% Increase in Compromises πŸ“”

Over 350 million individuals were impacted by data breaches in the US in 2023 and 11 of all publicly traded companies have been compromised.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How to Prevent Phishing Attacks with Multi-Factor Authentication 🦿

Learn how to protect yourself and your sensitive information from phishing attacks by implementing multifactor authentication.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Why cyber attacks are getting quicker and costlier πŸ“’

New research reveals the costs associated with recovering from a cyber attack are on the rise as new technologies enable hackers to launch more sophisticated attacks more frequently.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1πŸ‘1
πŸ“” North Korea Hacks Crypto: More Targets, Lower Gains πŸ“”

A global drop in DeFi hacking gains prompted North Korean threat actors to diversify and extend their victim portfolio, Chainalysis found.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Updated SBOM guidance: A new era for software transparency? 🧠

The cost of cyberattacks on software supply chains is a growing problem, with the average data breach costing 4.45 million in 2023. Since President Bidens 2021 executive order, software bills of materials SBOMs have become a cornerstone in protecting supply chains. In December 2023, the National Security Agency NSA published new guidance to help organizations The post Updated SBOM guidance A new era for software transparency? appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SystemBC Malware's C2 Server Analysis Exposes Payload Delivery Tricks πŸ–‹οΈ

Cybersecurity researchers have shed light on the commandandcontrol C2 server of a known malware family called SystemBC. "SystemBC can be purchased on underground marketplaces and is supplied in an archive containing the implant, a commandandcontrol C2 server, and a web administration portal written in PHP," Kroll said in an analysis published last week. The risk and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 More Australian IT Leaders Could Be Looking to Replace Passwords With Passkeys in 2024 🦿

The Australian governments rollout of passkeys for its digital service portal myGov will build momentum for wider adoption though, challenges like user education and tech fragmentation remain.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  GNU Privacy Guard 2.4.4 πŸ› 

GnuPG the GNU Privacy Guard or GPG is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Government Security Vulnerabilities Surge By 151%, Report Finds πŸ“”

Bugcrowds latest report also recorded a 30 surge in web submissions in 2023.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Microsoft Says State-Sponsored Attackers Accessed Senior Leaders’ Emails 🦿

The Midnight Blizzard gang appears to have been looking for information about itself. See how organizations can protect their accounts from password spray attacks.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” China-Aligned APT Group Blackwood Unleashes NSPX30 Implant πŸ“”

ESET said Blackwood has been actively engaged in cyberespionage since at least 2018.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ "A limited amount of data has been published": Southern Water confirms ransomware attack as BlackBasta group claims responsibility πŸ“’

Southern Water said its working closely with relevant authorities to remediate the incident, which BlackBasta claimed responsibility for.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Using Google Search to Find Software Can Be Risky β™ŸοΈ

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading boobytrapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make searching for software on Google a dicey affair.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– New Year, New Initiatives for the NIST Privacy Framework! πŸͺ–

Its been four years since the release of The NIST Privacy Framework A Tool for Improving Privacy Through Enterprise Risk Management, Version 1.0. Since then, many organizations have found it highly valuable for building or improving their privacy programs. Weve also been able to add a variety of resources to support its implementation. Were proud of how much has been accomplished in just a few short years, but were not resting on our laurels. As another, more famous, Dylan once said, the times they are achangin. For example, the past year has seen the release of the NIST AI Risk.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Airline Gets SASE to Modernize Operations πŸ•΅οΈβ€β™‚οΈ

Cathay, a travel lifestyle brand that includes the Cathay Pacific airline, had a growing cybersecurity problem made worse by its aging technology infrastructure. It solved part of the problem by replacing legacy technology with a modern one that has security built in.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian TrickBot Mastermind Gets 5-Year Prison Sentence for Cybercrime Spree πŸ–‹οΈ

40yearold Russian national Vladimir Dunaev has been sentenced to five years and four months in prison for his role in creating and distributing the TrickBot malware, the U.S. Department of Justice DoJ said. The development comes nearly two months after Dunaev pleaded guilty to committing computer fraud and identity theft and conspiracy to commit wire fraud and bank fraud. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Cisco Flaw Lets Hackers Remotely Take Over Unified Comms Systems πŸ–‹οΈ

Cisco has released patches to address a critical security flaw impacting Unified Communications and Contact Center Solutions products that could permit an unauthenticated, remote attacker to execute arbitrary code on an affected device. Tracked as CVE202420253 CVSS score 9.9, the issue stems from improper processing of userprovided data that a threat actor could abuse to send a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Warns of Widening APT29 Espionage Attacks Targeting Global Orgs πŸ–‹οΈ

Microsoft on Thursday said the Russian statesponsored threat actors responsible for a cyber attack on its systems in late November 2023 have been targeting other organizations and that it's currently beginning to notify them. The development comes a day after Hewlett Packard Enterprise HPE revealed that it had been the victim of an attack perpetrated by a hacking crew.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious Ads on Google Target Chinese Users with Fake Messaging Apps πŸ–‹οΈ

Chinesespeaking users have been targeted by malicious Google ads for restricted messaging apps like Telegram as part of an ongoing malvertising campaign. "The threat actor is abusing Google advertiser accounts to create malicious ads and pointing them to pages where unsuspecting users will download Remote Administration Trojan RATs instead," Malwarebytes' Jrme Segura said in a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity