πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Where Hackers Find Your Weak Spots πŸ•΅οΈβ€β™‚οΈ

The five intelligence sources that power social engineering scams.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Spot AI Audio Deepfakes at Election Time 🧨

Weve said it several times in our blogs its tough knowing whats real and whats fake out there. And... The post How to Spot AI Audio Deepfakes at Election Time appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ AI’s use as a hacking tool has been overhyped πŸ“’

New research reveals that most LLMs are unable to exploit oneday vulnerabilities, even when given the CVE description.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft πŸ–‹οΈ

The threat actor known as ToddyCat has been observed using a wide range of tools to retain access to compromised environments and steal valuable data. Russian cybersecurity firm Kaspersky characterized the adversary as relying on various programs to harvest data on an "industrial scale" from primarily governmental organizations, some of them defense related, located in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fraudsters Exploit Telegram’s Popularity for Toncoin Scam πŸ“”

The scheme was uncovered by Kaspersky and has been operational since November 2023.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 7 Best iPhone VPNs (Recommended for 2024) 🦿

Which VPN works best on iPhones? Use our guide to compare the pricing and features of the 7 best VPNs for iPhone.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Giving NIST Digital Identity Guidelines a Boost: Supplement for Incorporating Syncable Authenticators πŸͺ–

We all need supplements sometimes. Whether its a little extra vitamin C during flu season or some vitamin D during the dark days of Winter. When used correctly, supplements help our body adjust to the changing conditions around us. Similarly, we are applying this same concept for the first time to our NIST SP 80063B, Digital Identity Guidelines. Today, we published a supplement that provides interim guidance for agencies seeking to make use of syncable authenticators for example, passkeys in both enterprisefacing and publicfacing use cases. What is a supplement? A supplement is a.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Zero-Trust Takes Over: 63% of Orgs Implementing Globally πŸ•΅οΈβ€β™‚οΈ

Though organizations are increasingly incorporating zerotrust strategies, for many, these strategies fail to address the entirety of an operation, according to Gartner.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ MITRE ATT&CKED: InfoSec's Most Trusted Name Falls to Ivanti Bugs πŸ•΅οΈβ€β™‚οΈ

The irony is lost on few, as a Chinese threat actor used eight MITRE techniques to breach MITRE itself including exploiting the Ivanti bugs that attackers have been swarming on for months.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Nespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugar πŸ•΅οΈβ€β™‚οΈ

An open direct vulnerability in the Nespresso Web domain lets attackers bypass detection as they attempt to steal victims' Microsoft credentials.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Russian FSB Counterintelligence Chief Gets 9 Years in Cybercrime Bribery Scheme β™ŸοΈ

The head of counterintelligence for a division of the Russian Federal Security Service FSB was sentenced last week to nine years in a penal colony for accepting a USD 1.7 million bribe to ignore the activities of a prolific Russian cybercrime group that hacked thousands of ecommerce websites. The protection scheme was exposed in 2022 when Russian authorities arrested six members of the group, which sold millions of stolen payment cards at flashy online shops like Trump's Dumps.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ ToddyCat APT Is Stealing Data on 'Industrial Scale' πŸ•΅οΈβ€β™‚οΈ

The threat actor is deploying multiple connections into victim environments to maintain persistence and steal data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Licensed to Bill? Nations Mandate Certification & Licensure of Cybersecurity Pros πŸ•΅οΈβ€β™‚οΈ

Malaysia, Singapore, and Ghana are among the first countries to pass laws that require cybersecurity firms and in some cases, individual consultants to obtain licenses to do business, but concerns remain.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware πŸ–‹οΈ

The Russialinked nationstate threat actor tracked as APT28 weaponized a security flaw in the Microsoft Windows Print Spooler component to deliver a previously unknown custom malware called GooseEgg. The postcompromise tool, which is said to have been used since at least June 2020 and possibly as early as April 2019, leveraged a nowpatched flaw that allowed for.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse πŸ–‹οΈ

The U.S. Department of State on Monday said it's taking steps to impose visa restrictions on 13 individuals who are allegedly involved in the development and sale of commercial spyware or who are immediately family members of those involved in such businesses. "These individuals have facilitated or derived financial benefit from the misuse of this technology, which.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russian APT28 Group in New β€œGooseEgg” Hacking Campaign πŸ“”

Microsoft has warned of a longrunning credential stealing campaign from Russias APT28.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russian Sandworm Group Hit 20 Ukrainian Energy and Water Sites πŸ“”

Notorious APT44 group Sandworm launched a major campaign against Ukrainian critical infrastructure in March.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ MITRE cyber attack saw threat actors exploit Ivanti Connect Secure zero-days πŸ“’

The organization said it plans to conduct a thorough review of the incident in a bid to prevent future mishaps.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Server Inventory Checklist (Free Download) 🦿

Threats from malware, cryptographic infections and compromised networks have never been greater. Headlines regularly attest to such widespread problems, from infectionfelled organizations to dangerous vulnerabilities in popular tools. Companies cant protect their technological infrastructure, though, without a solid grasp of the actual equipment in play. A checklist, like the one created by Erik Eckel for ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery πŸ–‹οΈ

Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why they were targeted by such breaches, there's a larger, more pressing question What is the true financial impact of a cyberattack? According to research by Cybersecurity Ventures, the global cost of cybercrime is projected to reach.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases πŸ–‹οΈ

European Police Chiefs said that the complementary partnership between law enforcement agencies and the technology industry is at risk due to endtoend encryption E2EE. They called on the industry and governments to take urgent action to ensure public safety across social media platforms. "Privacy measures currently being rolled out, such as endtoend encryption, will stop tech companies.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity