πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🚨 Exploitation of vulnerabilities affecting Ivanti Connect Secure and Ivanti Policy Secure 🚨

Organisations are encouraged to take immediate action to mitigate vulnerabilities affecting Ivanti Connect Secure ICS and Ivanti Policy Secure IPS gateways CVE202346805, CVE202421887, CVE202421888 and CVE202421893, and follow the latest vendor advice.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity
🚨 Exploitation of vulnerabilities affecting Ivanti Connect Secure and Ivanti Policy Secure 🚨

Organisations are encouraged to take immediate action to mitigate vulnerabilities affecting Ivanti Connect Secure ICS and Ivanti Policy Secure IPS gateways CVE202346805, CVE202421887, CVE202421888 and CVE202421893, and follow the latest vendor advice.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Data security posture management vs cloud security posture management 🧠

A data breach has just occurred, is a phrase no security professional wants to hear. From the CISO on down to the SOC analysts, a data breach is the definition of a very bad day. It can cause serious brand damage and financial loss for enterprises, lead to abrupt career changes among security professionals, and The post Data security posture management vs cloud security posture management appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… GhostSec Continues to Extend their Support for Cyber Threat Actors and Hacktivists πŸ¦…

CRIL raises concerns about the rise in GhostSec's activities supporting threat actorshacktivists and their newly launched project, which aims to raise funds to help them anonymize their identities. The post GhostSec Continues to Extend their Support for Cyber Threat Actors and Hacktivists appeared first on Cyble. The post GhostSec Continues to Extend their Support for Cyber Threat Actors and Hacktivists appeared first on Cyble.

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Limited Time Deal: a Lifetime of Powerful VPN Protection is Just $35 Through 2/4 🦿

Get the ultimate online protection of privacy and security for up to five devices, including speedy servers, unlimited bandwidth, kill switch and more.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Alert: Ivanti Discloses 2 New Zero-Day Flaws, One Under Active Exploitation πŸ–‹οΈ

Ivanti is alerting of two new highseverity flaws in its Connect Secure and Policy Secure products, one of which is said to have come under targeted exploitation in the wild. The list of vulnerabilities is as follows CVE202421888 CVSS score 8.8 A privilege escalation vulnerability in the web component of Ivanti Connect Secure 9.x, 22.x and Ivanti Policy Secure 9.x, 22.x allows.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Recognizing Security as a Strategic Component of Business πŸ•΅οΈβ€β™‚οΈ

In today's environments, security can be a revenue enabler, not just a cost center. Organizations should take advantage of the opportunities.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Sysdig Report Exposes 91% Failure in Runtime Scans πŸ“”

The research also revealed 69 of enterprises have yet to integrate AI into cloud environments.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dubai Cyber Force Names First Accredited Companies πŸ•΅οΈβ€β™‚οΈ

The initiative has named the first eight companies approved to cybersecure the Dubai government.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Senators Propose Cybersecurity Agriculture Bill πŸ“”

The Farm and Food Cybersecurity Act has crossparty support and aims enhance the US agriculture sectors cyber defenses.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” EU Launches First Cybersecurity Certification for Digital Products πŸ“”

The voluntary scheme aims to encourage ICT providers to boost the cybersecurity of products and services across the EU.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Pawn Storm’s Stealthy Net-NTLMv2 Assault Revealed πŸ“”

Trend Micro reported recent attacks focused on government sectors, including foreign affairs, energy, defense and transportation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  OpenSSL Toolkit 3.2.1 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with fullstrength cryptography worldwide. The latest stable version is the 3.2 series supported until 23rd November 2025.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  OpenSSL Toolkit 3.1.5 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with fullstrength cryptography worldwide. The 3.1 series is supported until 14th March 2025.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  OpenSSL Toolkit 3.0.13 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with fullstrength cryptography worldwide. The 3.0 series is a Long Term Support LTS version and is supported until 7th September 2026.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Looted RIPE Credentials for Sale on the Dark Web πŸ•΅οΈβ€β™‚οΈ

A monitoring exercise identified user details in 716 compromised RIPE NCC accounts, plus other valuable credentials belonging to those victims.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 What Is Cyber Threat Hunting? (Definition & How it Works) 🦿

Cyber threat hunting is the proactive process of searching for and detecting potential threats or malicious activities within a network or system.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ More Ivanti VPN Zero-Days Fuel Attack Frenzy as Patches Finally Roll πŸ•΅οΈβ€β™‚οΈ

Both Chinabacked APTs and ordinary cyberattackers have seized on a pair of Ivanti VPN bugs for global exploitation.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ RunC Flaws Enable Container Escapes, Granting Attackers Host Access πŸ–‹οΈ

Multiple security vulnerabilities have been disclosed in the runC command line tool that could be exploited by threat actors to escape the bounds of the container and stage followon attacks. The vulnerabilities, tracked as CVE202421626, CVE202423651, CVE202423652, and CVE202423653, have been collectively dubbed Leaky Vessels by cybersecurity vendor Snyk. "These container.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Johnson Controls Ransomware Cleanup Costs Top $27M and Counting πŸ•΅οΈβ€β™‚οΈ

JCI's latest SEC filing notes that its smartfactory installations weren't compromised, allaying physical security fears.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'Leaky Vessels' Cloud Bugs Allow Container Escapes Globally πŸ•΅οΈβ€β™‚οΈ

The four security vulnerabilities are found in Docker and beyond, and one affecting runC affects essentially every cloudnative developer worldwide.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity