πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Phobos Ransomware Family Expands With New FAUST Variant πŸ“”

FortiGuard said the variant was found in an Office document using a VBA script.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  PrommetriX Prometheus Metrics Leaker πŸ› 

PrommetriX is a tool that demonstrates a data leakage vulnerability in the Prometheus metricsbased event monitoring software.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Iran's 'Cyber Centers' Dodge Sanctions to Sell Cyber Operations πŸ•΅οΈβ€β™‚οΈ

Networks of Iranian officials and cyberoffensive specialists have created a variety of cybersecurity contractor in an attempt to dodge sanctions, according to leaked documents.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 What Do Apple’s EU App Store Changes Mean for App Developers? 🦿

The EU says the DMA keeps markets fair and open Apple says the DMA introduces security problems. Apple is leveling fees against independent app stores.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
🦿 Ransomware’s Impact Could Include Heart Attacks, Strokes & PTSD 🦿

New research details the possible effects of ransomware attacks on businesses and staff, society, the economy and national security, highlighting that its impact on mental and physical health is often overlooked.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ SolarWinds Files Motion to Dismiss SEC Lawsuit πŸ•΅οΈβ€β™‚οΈ

Responding to SEC charges, SolarWinds fired back with a detailed defense of how a Russianbacked cyber espionage attack on its system was handled.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ PoC Exploits Heighten Risks Around Critical New Jenkins Vuln πŸ•΅οΈβ€β™‚οΈ

The arbitrary fileread flaw can lead to remote code execution.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Keenan & Associates Reports Data Breach Exposing Social Security Numbers of More Than 1.5M πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Juniper Networks Releases Urgent Junos OS Updates for High-Severity Flaws πŸ–‹οΈ

Juniper Networks has released outofband updates to address highseverity flaws in SRX Series and EX Series that could be exploited by a threat actor to take control of susceptible systems. The vulnerabilities, tracked as CVE202421619 and CVE202421620, are rooted in the JWeb component and impact all versions of Junos OS. Two other shortcomings, CVE202336846 and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ New ZLoader Malware Variant Surfaces with 64-bit Windows Compatibility πŸ–‹οΈ

Threat hunters have identified a new campaign that delivers the ZLoader malware, resurfacing nearly two years after the botnet's infrastructure was dismantled in April 2022. A new variant of the malware is said to have been in development since September 2023, Zscaler ThreatLabz said in an analysis published this month. "The new version of Zloader made significant changes to the loader.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK House of Lords Calls For Legislation on Facial Recognition Tech πŸ“”

The House of Lords has questioned the legal basis for police use of facial recognition and wants parliament to legislate.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FBI: Scammers Are Sending Couriers to Collect Cash From Victims πŸ“”

The FBI is warning the public not to fall for scams where they are urged to liquidate assets and hand them to couriers for safekeeping.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Top Security Posture Vulnerabilities Revealed πŸ–‹οΈ

Each New Year introduces a new set of challenges and opportunities for strengthening our cybersecurity posture. It's the nature of the field the speed at which malicious actors carry out advanced persistent threats brings a constant, evolving battle for cyber resilience. The excitement in cybersecurity lies in this continuous adaptation and learning, always staying one step ahead of potential.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Italian Data Protection Watchdog Accuses ChatGPT of Privacy Violations πŸ–‹οΈ

Italy's data protection authority DPA has notified ChatGPTmaker OpenAI of supposedly violating privacy laws in the region. "The available evidence pointed to the existence of breaches of the provisions contained in the E.U. GDPR General Data Protection Regulation," the Garante per la protezione dei dati personali aka the Garante said in a statement on Monday. It also said it.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
🧠 Mapping attacks on generative AI to business impact 🧠

In recent months, weve seen government and business leaders put an increased focus on securing AI models. If generative AI is the next big platform to transform the services and functions on which society as a whole depends, ensuring that technology is trusted and secure must be businesses top priority. While generative AI adoption is The post Mapping attacks on generative AI to business impact appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Salesforce-based phishing attacks surge 109% since the start of 2024 πŸ“’

Threat analysts have uncovered a sophisticated phishing attack imitating emails from Salesforce that are likely bypassing many business email filters.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Protected: Active Exploitation of Atlassian Confluence RCE Vulnerability (CVE-2023-22527) πŸ¦…

There is no excerpt because this is a protected post. The post Protected Active Exploitation of Atlassian Confluence RCE Vulnerability CVE202322527 appeared first on Cyble. The post Protected Active Exploitation of Atlassian Confluence RCE Vulnerability CVE202322527 appeared first on Cyble.

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked Hackers Target Myanmar's Top Ministries with Backdoor Blitz πŸ–‹οΈ

The Chinabased threat actor known as Mustang Panda is suspected to have targeted Myanmar's Ministry of Defence and Foreign Affairs as part of twin campaigns designed to deploy backdoors and remote access trojans. The findings come from CSIRTCTI, which said the activities took place in November 2023 and January 2024 after artifacts in connection with the attacks were uploaded to the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware Incidents Hit Record High, But Law Enforcement Takedowns Slow Growth πŸ“”

New data from Corvus found that ransomware incidents rose by 68 in 2023 compared to 2022, but law enforcement takedowns led to a fall in Q4.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Q&A: How Israeli Cybersecurity Companies Endure Through the Conflict πŸ•΅οΈβ€β™‚οΈ

As Israeli employees get called up for reserve military duty, the impact on their day jobs and employers is still being calculated.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Falco 0.37.0 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1