πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ 3 ISIS Members Slapped With Sanctions From US Treasury πŸ•΅οΈβ€β™‚οΈ

New sanctions aim to disrupt their cyber and financial operations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CMMC Is the Starting Line, Not the Finish πŸ•΅οΈβ€β™‚οΈ

Cybersecurity Maturity Model Certification CMMC and a harden, detect, and respond mindset are key to protecting defense and critical infrastructure companies.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Pump-and-Dump Schemes Make Crypto Fraudsters $240m πŸ“”

Chainalysis reveals that pumpanddump schemes made Ethereum market manipulators over 240m in 2023 alone.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Saudi Arabia Debuts 'Generative AI for All' Program πŸ•΅οΈβ€β™‚οΈ

The initiative is aimed at promoting policy, ethics, and expansion of AI in the country.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 AI in the Hands of Cybercriminals: How to Spot Fake Art and Deepfakes 🧨

Artificial intelligence AI is making its way from hightech labs and Hollywood plots into the hands of the general population.... The post AI in the Hands of Cybercriminals How to Spot Fake Art and Deepfakes appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Interpol-Led Initiative Targets 1300 Suspicious IPs πŸ“”

Global collaborative effort focused on combating the global rise of phishing, malware and ransomware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network πŸ–‹οΈ

The threat actor behind a peertopeer P2P botnet known as FritzFrog has made a return with a new variant that leverages the Log4Shell vulnerability to propagate internally within an already compromised network. "The vulnerability is exploited in a bruteforce manner that attempts to target as many vulnerable Java applications as possible," web infrastructure and security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Agencies Failure to Oversee Ransomware Protections Threaten White House Goals πŸ“”

A GAO report found that federal agencies are not assessing whether critical infrastructure sectors are implementing NIST ransomware protection guidance.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Jailbreaking ChatGPT: Researchers swerved GPT-4's safety guardrails and made the chatbot detail how to make explosives in Scots Gaelic πŸ“’

A weakness in OpenAIs GPT4 lets speakers of less common languages like Zulu or Scots Gaelic easily bypass the models safety guardrails.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Imperative for Robust Security Design in the Health Industry πŸ•΅οΈβ€β™‚οΈ

It is imperative that healthcare and healthtech companies move beyond reactive measures and adopt a proactive stance in safeguarding sensitive patient information.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Arrests in $400M SIM-Swap Tied to Heist at FTX? β™ŸοΈ

Three Americans were charged this week with stealing more than 400 million in a November 2022 SIMswapping attack. The U.S. government did not name the victim organization, but there is every indication that the money was stolen from the nowdefunct cryptocurrency exchange FTX, which had just filed for bankruptcy on that same day.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FritzFrog Botnet Exploits Log4Shell on Overlooked Internal Hosts πŸ•΅οΈβ€β™‚οΈ

Everyone knows to patch vulnerabilities for Internetfacing assets, but what about internal ones? One botnet is counting on your complacency.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ China Infiltrates US Critical Infrastructure in Ramp-up to Conflict πŸ•΅οΈβ€β™‚οΈ

Threat actors linked to the People's Republic of China, such as Volt Typhoon, continue to "preposition" themselves in the critical infrastructure of the United States, according to military and law enforcement officials.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ukraine Military Targeted With Russian APT PowerShell Attack πŸ•΅οΈβ€β™‚οΈ

The attack, associated with Shuckworm, employs TTPs observed in prior campaigns against the Ukrainian military, predominantly using PowerShell.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Delinea Research Reveals that Ransomware Is Back on the Rise As Cybercriminals' Motivation Shifts to Data Exfiltration πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Feds Confirm Remote Killing of Volt Typhoon's SOHO Botnet πŸ•΅οΈβ€β™‚οΈ

The Chinabacked APT was using the botnet, made up of mostly endoflife, patchless routers from Cisco and Netgear, to set up shop inside US critical infrastructure.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'Commando Cat' Is Second Campaign of the Year Targeting Docker πŸ•΅οΈβ€β™‚οΈ

The threat actor behind the campaign is still unknown, but it shares some similarities with other cyptojacking groups.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ ProcessUnity Introduces Industry's All-In-One Third-Party Risk Management Platform πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cloudflare Breach: Nation-State Hackers Access Source Code and Internal Docs πŸ–‹οΈ

Cloudflare has revealed that it was the target of a likely nationstate attack in which the threat actor leveraged stolen credentials to gain unauthorized access to its Atlassian server and ultimately access some documentation and a limited amount of source code. The intrusion, which took place between November 14 and 24, 2023, and detected on November 23, was carried out "with the goal of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ VajraSpy: A Patchwork of espionage apps πŸš€

ESET researchers discovered several Android apps carrying VajraSpy, a RAT used by the Patchwork APT group.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
🚨 Charities offered latest insight into key cyber threats to help keep out attackers 🚨

Latest report published by the NCSC outlines key threats facing the UK charity sector.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity