πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 TechRepublic Premium Editorial Calendar: Policies, Checklists, Hiring Kits and Glossaries for Download 🦿

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Why the Right Metrics Matter When it Comes to Vulnerability Management πŸ–‹οΈ

Hows your vulnerability management program doing? Is it effective? A success? Lets be honest, without the right metrics or analytics, how can you tell how well youre doing, progressing, or if youre getting ROI? If youre not measuring, how do you know its working? And even if you are measuring, faulty reporting or focusing on the wrong metrics can create blind spots and make it harder to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining πŸ–‹οΈ

Cybersecurity researchers have detailed an updated version of the malware HeadCrab that's known to target Redis database servers across the world since early September 2021. The development, which comes exactly a year after the malware was first publicly disclosed by Aqua, is a sign that the financiallymotivated threat actor behind the campaign is actively adapting and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Firms need to implement hybrid liveness detection to catch out ever improving deepfake technology πŸ“’

Hackers are leveraging increasingly powerful AI tools to trick identity verification systems, how can firms respond?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Feds Shut Down China-Linked "KV-Botnet" Targeting SOHO Routers πŸ–‹οΈ

The U.S. government on Wednesday said it took steps to neutralize a botnet comprising hundreds of U.S.based small office and home office SOHO routers hijacked by a Chinalinked statesponsored threat actor called Volt Typhoon and blunt the impact posed by the hacking campaign. The existence of the botnet, dubbed KVbotnet, was first disclosed by the Black Lotus Labs team at.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” US Thwarts Volt Typhoon Cyber Espionage Campaign Through Router Disruption πŸ“”

US government agencies took down the botnet of Chinese APT Volt Typhoon, used to target critical infrastructure for nationstate espionage.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Cyble Chronicles – February 1: Latest Findings & Recommendations for the Cybersecurity Community πŸ¦…

Uncovering Atomic Stealer AMOS Strikes and the Rise of Dead Cookies Restoration Cyble Research and Intelligence Labs CRIL has recently uncovered a series of phishing websites masquerading as popular Mac applications, which are distributing the Atomic Stealer AMOS, a potent InfoStealer malware. Despite being identified, these deceptive sites remain active, posing a significant threat to The post Cyble Chronicles February 1 Latest Findings Recommendations for the Cybersecurity Community appeared first on Cyble. The post Cyble Chronicles February 1 Latest Findings Recommendations for the Cybersecurity Community appeared first on Cyble.

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Exposed Docker APIs Under Attack in 'Commando Cat' Cryptojacking Campaign πŸ–‹οΈ

Exposed Docker API endpoints over the internet are under assault from a sophisticated cryptojacking campaign called Commando Cat. "The campaign deploys a benign container generated using the Commando project," Cado security researchers Nate Bill and Matt Muir said in a new report published today. "The attacker escapes this container and runs multiple payloads on the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google’s Bazel Exposed to Command Injection Threat πŸ“”

Cycode stressed securing software supply chains amid complex dependencies and thirdparty actions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 3 ISIS Members Slapped With Sanctions From US Treasury πŸ•΅οΈβ€β™‚οΈ

New sanctions aim to disrupt their cyber and financial operations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CMMC Is the Starting Line, Not the Finish πŸ•΅οΈβ€β™‚οΈ

Cybersecurity Maturity Model Certification CMMC and a harden, detect, and respond mindset are key to protecting defense and critical infrastructure companies.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Pump-and-Dump Schemes Make Crypto Fraudsters $240m πŸ“”

Chainalysis reveals that pumpanddump schemes made Ethereum market manipulators over 240m in 2023 alone.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Saudi Arabia Debuts 'Generative AI for All' Program πŸ•΅οΈβ€β™‚οΈ

The initiative is aimed at promoting policy, ethics, and expansion of AI in the country.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 AI in the Hands of Cybercriminals: How to Spot Fake Art and Deepfakes 🧨

Artificial intelligence AI is making its way from hightech labs and Hollywood plots into the hands of the general population.... The post AI in the Hands of Cybercriminals How to Spot Fake Art and Deepfakes appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Interpol-Led Initiative Targets 1300 Suspicious IPs πŸ“”

Global collaborative effort focused on combating the global rise of phishing, malware and ransomware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network πŸ–‹οΈ

The threat actor behind a peertopeer P2P botnet known as FritzFrog has made a return with a new variant that leverages the Log4Shell vulnerability to propagate internally within an already compromised network. "The vulnerability is exploited in a bruteforce manner that attempts to target as many vulnerable Java applications as possible," web infrastructure and security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Agencies Failure to Oversee Ransomware Protections Threaten White House Goals πŸ“”

A GAO report found that federal agencies are not assessing whether critical infrastructure sectors are implementing NIST ransomware protection guidance.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Jailbreaking ChatGPT: Researchers swerved GPT-4's safety guardrails and made the chatbot detail how to make explosives in Scots Gaelic πŸ“’

A weakness in OpenAIs GPT4 lets speakers of less common languages like Zulu or Scots Gaelic easily bypass the models safety guardrails.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Imperative for Robust Security Design in the Health Industry πŸ•΅οΈβ€β™‚οΈ

It is imperative that healthcare and healthtech companies move beyond reactive measures and adopt a proactive stance in safeguarding sensitive patient information.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Arrests in $400M SIM-Swap Tied to Heist at FTX? β™ŸοΈ

Three Americans were charged this week with stealing more than 400 million in a November 2022 SIMswapping attack. The U.S. government did not name the victim organization, but there is every indication that the money was stolen from the nowdefunct cryptocurrency exchange FTX, which had just filed for bankruptcy on that same day.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FritzFrog Botnet Exploits Log4Shell on Overlooked Internal Hosts πŸ•΅οΈβ€β™‚οΈ

Everyone knows to patch vulnerabilities for Internetfacing assets, but what about internal ones? One botnet is counting on your complacency.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity