πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ ToddyCat APT Is Stealing Data on 'Industrial Scale' πŸ•΅οΈβ€β™‚οΈ

The threat actor is deploying multiple connections into victim environments to maintain persistence and steal data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Licensed to Bill? Nations Mandate Certification & Licensure of Cybersecurity Pros πŸ•΅οΈβ€β™‚οΈ

Malaysia, Singapore, and Ghana are among the first countries to pass laws that require cybersecurity firms and in some cases, individual consultants to obtain licenses to do business, but concerns remain.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware πŸ–‹οΈ

The Russialinked nationstate threat actor tracked as APT28 weaponized a security flaw in the Microsoft Windows Print Spooler component to deliver a previously unknown custom malware called GooseEgg. The postcompromise tool, which is said to have been used since at least June 2020 and possibly as early as April 2019, leveraged a nowpatched flaw that allowed for.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse πŸ–‹οΈ

The U.S. Department of State on Monday said it's taking steps to impose visa restrictions on 13 individuals who are allegedly involved in the development and sale of commercial spyware or who are immediately family members of those involved in such businesses. "These individuals have facilitated or derived financial benefit from the misuse of this technology, which.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russian APT28 Group in New β€œGooseEgg” Hacking Campaign πŸ“”

Microsoft has warned of a longrunning credential stealing campaign from Russias APT28.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russian Sandworm Group Hit 20 Ukrainian Energy and Water Sites πŸ“”

Notorious APT44 group Sandworm launched a major campaign against Ukrainian critical infrastructure in March.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ MITRE cyber attack saw threat actors exploit Ivanti Connect Secure zero-days πŸ“’

The organization said it plans to conduct a thorough review of the incident in a bid to prevent future mishaps.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Server Inventory Checklist (Free Download) 🦿

Threats from malware, cryptographic infections and compromised networks have never been greater. Headlines regularly attest to such widespread problems, from infectionfelled organizations to dangerous vulnerabilities in popular tools. Companies cant protect their technological infrastructure, though, without a solid grasp of the actual equipment in play. A checklist, like the one created by Erik Eckel for ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery πŸ–‹οΈ

Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why they were targeted by such breaches, there's a larger, more pressing question What is the true financial impact of a cyberattack? According to research by Cybersecurity Ventures, the global cost of cybercrime is projected to reach.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases πŸ–‹οΈ

European Police Chiefs said that the complementary partnership between law enforcement agencies and the technology industry is at risk due to endtoend encryption E2EE. They called on the industry and governments to take urgent action to ensure public safety across social media platforms. "Privacy measures currently being rolled out, such as endtoend encryption, will stop tech companies.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies πŸ–‹οΈ

German authorities said they have issued arrest warrants against three citizens on suspicion of spying for China. The full names of the defendants were not disclosed by the Office of the Federal Prosecutor aka Generalbundesanwalt, but it includes Herwig F., Ina F., and Thomas R. "The suspects are strongly suspected of working for a Chinese secret service since an unspecified.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ UnitedHealth Group admits to paying ransom after Change Healthcare cyber attack πŸ“’

The UnitedHealth Group, the parent company of Change Healthcare, has confirmed it paid the ransom to protect millions of potentially exposed customers.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases πŸ–‹οΈ

European Police Chiefs said that the complementary partnership between law enforcement agencies and the technology industry is at risk due to endtoend encryption E2EE. They called on the industry and governments to take urgent action to ensure public safety across social media platforms. "Privacy measures currently being rolled out, such as endtoend encryption, will stop tech companies.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Can a VPN Be Hacked? 🦿

Learn about the potential vulnerabilities of VPNs and the measures you can take to enhance your VPN security.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ International Crackdown: β€œLabHost” Phishing-as-a-Service Platform Busted πŸ‘½

A concerted effort by global law enforcement agencies has successfully dismantled LabHost, a notorious online platform specializing in phishing kits. Since its inception in 2021, LabHost accrued over 1 million in profits by providing cybercriminals with the tools to impersonate trusted websites and steal sensitive user data. The coordinated operation.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ US Gov Slaps Visa Restrictions on Spyware Honchos πŸ•΅οΈβ€β™‚οΈ

The State Department can now deny entrance to the US for individuals accused of profiting from spywarerelated human rights abuses, and their immediate family members.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Russia's Fancy Bear Pummels Windows Print Spooler Bug πŸ•΅οΈβ€β™‚οΈ

The infamous Russian threat actor has created a custom tool called GooseEgg to exploit CVE202238028 in cyberespionage attacks against targets in Ukraine, Western Europe, and North America.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Teetering on the Edge: VPNs, Firewalls' Nonexistent Telemetry Lures APTs πŸ•΅οΈβ€β™‚οΈ

Statesponsored groups are targeting critical vulnerabilities in virtual private network VPN gateways, firewall appliances, and other edge devices to make life difficult for incident responders, who rarely have visibility into the devices.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Grab 9 Ethical Hacking Courses for $30 and Improve Your Business Security 🦿

Your customers expect you to keep their data secure, and this collection of video courses covers everything you need to know about cybersecurity.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Passwords, passkeys and familiarity bias 🧠

As passkey passwordless authentication adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient possibly a first in cybersecurity. Most of us could be forgiven for not realizing passwordless authentication The post Passwords, passkeys and familiarity bias appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Webinar: Learn Proactive Supply Chain Threat Hunting Techniques πŸ–‹οΈ

In the highstakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged as a potent threat, exploiting the intricate web of interconnected systems and thirdparty dependencies to breach even the most formidable defenses. But what if you could turn the tables and proactively hunt these threats before they wreak havoc? We invite you to join us for an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity