πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” FBI: Scammers Are Sending Couriers to Collect Cash From Victims πŸ“”

The FBI is warning the public not to fall for scams where they are urged to liquidate assets and hand them to couriers for safekeeping.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Top Security Posture Vulnerabilities Revealed πŸ–‹οΈ

Each New Year introduces a new set of challenges and opportunities for strengthening our cybersecurity posture. It's the nature of the field the speed at which malicious actors carry out advanced persistent threats brings a constant, evolving battle for cyber resilience. The excitement in cybersecurity lies in this continuous adaptation and learning, always staying one step ahead of potential.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Italian Data Protection Watchdog Accuses ChatGPT of Privacy Violations πŸ–‹οΈ

Italy's data protection authority DPA has notified ChatGPTmaker OpenAI of supposedly violating privacy laws in the region. "The available evidence pointed to the existence of breaches of the provisions contained in the E.U. GDPR General Data Protection Regulation," the Garante per la protezione dei dati personali aka the Garante said in a statement on Monday. It also said it.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
🧠 Mapping attacks on generative AI to business impact 🧠

In recent months, weve seen government and business leaders put an increased focus on securing AI models. If generative AI is the next big platform to transform the services and functions on which society as a whole depends, ensuring that technology is trusted and secure must be businesses top priority. While generative AI adoption is The post Mapping attacks on generative AI to business impact appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Salesforce-based phishing attacks surge 109% since the start of 2024 πŸ“’

Threat analysts have uncovered a sophisticated phishing attack imitating emails from Salesforce that are likely bypassing many business email filters.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Protected: Active Exploitation of Atlassian Confluence RCE Vulnerability (CVE-2023-22527) πŸ¦…

There is no excerpt because this is a protected post. The post Protected Active Exploitation of Atlassian Confluence RCE Vulnerability CVE202322527 appeared first on Cyble. The post Protected Active Exploitation of Atlassian Confluence RCE Vulnerability CVE202322527 appeared first on Cyble.

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked Hackers Target Myanmar's Top Ministries with Backdoor Blitz πŸ–‹οΈ

The Chinabased threat actor known as Mustang Panda is suspected to have targeted Myanmar's Ministry of Defence and Foreign Affairs as part of twin campaigns designed to deploy backdoors and remote access trojans. The findings come from CSIRTCTI, which said the activities took place in November 2023 and January 2024 after artifacts in connection with the attacks were uploaded to the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware Incidents Hit Record High, But Law Enforcement Takedowns Slow Growth πŸ“”

New data from Corvus found that ransomware incidents rose by 68 in 2023 compared to 2022, but law enforcement takedowns led to a fall in Q4.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Q&A: How Israeli Cybersecurity Companies Endure Through the Conflict πŸ•΅οΈβ€β™‚οΈ

As Israeli employees get called up for reserve military duty, the impact on their day jobs and employers is still being calculated.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Falco 0.37.0 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Solving the Cybersecurity Skills Gap With Racial Inclusivity πŸ•΅οΈβ€β™‚οΈ

Addressing the growing demand for cybersecurity professionals is also an opportunity to create a more racially inclusive workforce.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Rust Payloads Exploiting Ivanti Zero-Days Linked to Sophisticated Sliver Toolkit πŸ“”

After analyzing the 12 Rust payloads exploiting Ivanti ConnectSecure vulnerabilities, Synacktiv found they all enabled a sophisticated postexploitation toolkit.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ UAE Government Cyber Chief: We Face 50K Cyberattacks Daily πŸ•΅οΈβ€β™‚οΈ

The Emirates see phishing emails, DDoS attacks, and ransomware, as well as port scans, regularly.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Alpha Ransomware Group Launches Data Leak Site on the Dark Web πŸ“”

Netenrich analized the ransom note pattern saying the group is refining their messages to victims.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 How to Protect Sensitive Data While Using ChatGPT and Other Generative AI Tools 🌊

Generative AI platforms like ChatGPT have emerged as a new frontier of data breaches, especially in the rise of hybrid work. Equipped with the function to generate various content and troubleshoot software bugs, these applications can leak training data and violate privacy.  In their research, Work From Anywhere, Fortinet found that about 62 of organizations The post How to Protect Sensitive Data While Using ChatGPT and Other Generative AI Tools appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ URGENT: Upgrade GitLab - Critical Workspace Creation Flaw Allows File Overwrite πŸ–‹οΈ

GitLab once again released fixes to address a critical security flaw in its Community Edition CE and Enterprise Edition EE that could be exploited to write arbitrary files while creating a workspace. Tracked as CVE20240402, the vulnerability has a CVSS score of 9.9 out of a maximum of 10. "An issue has been discovered in GitLab CEEE affecting all versions from 16.0 prior to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Orange EspaΓ±a Breach: Dark Web Flooded With Operator Credentials πŸ“”

Resecurity discovered over 1572 compromised customers from RIPE, APNIC, AFRINIC and LACNIC.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Brazilian Feds Dismantle Grandoreiro Banking Trojan, Arresting Top Operatives πŸ–‹οΈ

A Brazilian law enforcement operation has led to the arrest of several Brazilian operators in charge of the Grandoreiro malware. The Federal Police of Brazil said it served five temporary arrest warrants and 13 search and seizure warrants in the states of So Paulo, Santa Catarina, Par, Gois, and Mato Grosso. Slovak cybersecurity firm ESET, which provided additional.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Schneider Electric Confirms Data Accessed in Ransomware Attack πŸ“”

Energy firm Schneider Electric said a ransomware incident, reportedly perpetrated by the Cactus group, has led to data being accessed from its Sustainability Business division.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ’» Apple accuses UK gov't of β€˜unprecedented overreach’ on privacy πŸ’»

In the name of security, the UK government may well have put a cybersecurity target on the nations back, with Apple once again warning that proposed changes to the Investigatory Powers Act 2016 are a serious and direct threat to data security and information privacy.We are deeply concerned about the amendments to the Investigatory Powers Bill currently before Parliament, which will put the privacy and security of users at risk," Apple said in a statement. This is an unprecedented overreach by the government and, if implemented, the UK new user protections could be secretly vetoed globally, preventing us from ever delivering them to customers.To read this article in full, please click here.

πŸ“– Read more.

πŸ”— Via "COMPUTERWORLD"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Fla. Man Charged in SIM-Swapping Spree is Key Suspect in Hacker Groups Oktapus, Scattered Spider β™ŸοΈ

On Jan. 9, 2024, U.S. authorities arrested a 19yearold Florida man charged with wire fraud, aggravated identity theft, and conspiring with others to use SIMswapping to steal cryptocurrency. Sources close to the investigation tell KrebsOnSecurity the accused was a key member of a criminal hacking group blamed for a string of cyber intrusions at major U.S. technology companies during the summer of 2022.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity