πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ‘½ International Crackdown: β€œLabHost” Phishing-as-a-Service Platform Busted πŸ‘½

A concerted effort by global law enforcement agencies has successfully dismantled LabHost, a notorious online platform specializing in phishing kits. Since its inception in 2021, LabHost accrued over 1 million in profits by providing cybercriminals with the tools to impersonate trusted websites and steal sensitive user data. The coordinated operation.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ US Gov Slaps Visa Restrictions on Spyware Honchos πŸ•΅οΈβ€β™‚οΈ

The State Department can now deny entrance to the US for individuals accused of profiting from spywarerelated human rights abuses, and their immediate family members.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Russia's Fancy Bear Pummels Windows Print Spooler Bug πŸ•΅οΈβ€β™‚οΈ

The infamous Russian threat actor has created a custom tool called GooseEgg to exploit CVE202238028 in cyberespionage attacks against targets in Ukraine, Western Europe, and North America.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Teetering on the Edge: VPNs, Firewalls' Nonexistent Telemetry Lures APTs πŸ•΅οΈβ€β™‚οΈ

Statesponsored groups are targeting critical vulnerabilities in virtual private network VPN gateways, firewall appliances, and other edge devices to make life difficult for incident responders, who rarely have visibility into the devices.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Grab 9 Ethical Hacking Courses for $30 and Improve Your Business Security 🦿

Your customers expect you to keep their data secure, and this collection of video courses covers everything you need to know about cybersecurity.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Passwords, passkeys and familiarity bias 🧠

As passkey passwordless authentication adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient possibly a first in cybersecurity. Most of us could be forgiven for not realizing passwordless authentication The post Passwords, passkeys and familiarity bias appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Webinar: Learn Proactive Supply Chain Threat Hunting Techniques πŸ–‹οΈ

In the highstakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged as a potent threat, exploiting the intricate web of interconnected systems and thirdparty dependencies to breach even the most formidable defenses. But what if you could turn the tables and proactively hunt these threats before they wreak havoc? We invite you to join us for an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Vulnerability Exploitation on the Rise as Attacker Ditch Phishing πŸ“”

Mandiants latest MTrends report found that vulnerability exploitation was the most common initial infection vector in 2023, making up 38 of intrusions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ Lessons for CISOs From OWASP's LLM Top 10 πŸ•΅οΈβ€β™‚οΈ

It's time to start regulating LLMs to ensure they're accurately trained and ready to handle business deals that could affect the bottom line.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Apache Cordova App Harness Targeted in Dependency Confusion Attack πŸ–‹οΈ

Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing to the fact that package managers check the public repositories before private registries, thus allowing a threat actor to publish a malicious package with the same name to a public package repository. This.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” End-to-End Encryption Sparks Concerns Among EU Law Enforcement πŸ“”

The call comes amid the rollout of endtoend encryption on Metas Messenger platform.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Millions of Americans' Data Potentially Exposed in Change Healthcare Hack πŸ“”

Millions of Americans may be impacted by the Change Healthcare data breach as UnitedHealth confirms exposed data includes personal and health information.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Imposes Visa Restrictions on Alleged Spyware Figures πŸ“”

The move is reportedly part of a broader effort to counter the misuse of surveillance technology.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Nmap Port Scanner 7.95 πŸ› 

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols UDP, TCP, ICMP, etc.. Nmap supports Vanilla TCP connect scanning, TCP SYN half open scanning, TCP FIN, Xmas, or NULL stealth scanning, TCP ftp proxy bounce attack scanning, SYNFIN scanning using IP fragments bypasses some packet filters, TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning pingsweep, TCP Ping scanning, Direct non portmapper RPC scanning, Remote OS Identification by TCPIP Fingerprinting, and Reverseident scanning. Nmap also supports a number of performance and reliability...

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Suricata IDPE 7.0.5 πŸ› 

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multithreaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Back from the Brink: UnitedHealth Offers Sobering Post-Attack Update πŸ•΅οΈβ€β™‚οΈ

The company reports most systems are functioning again but that analysis of the data affected will take months to complete.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CompTIA Supports Department of Defense Efforts to Strengthen Cyber Knowledge and Skills πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 5 Hard Truths About the State of Cloud Security 2024 πŸ•΅οΈβ€β™‚οΈ

Dark Reading talks cloud security with John Kindervag, the godfather of zero trust.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Siemens Working on Fix for Device Affected by Palo Alto Firewall Bug πŸ•΅οΈβ€β™‚οΈ

Growing attacks targeting the flaw prompted CISA to include it in the known exploited vulnerabilities catalog earlier this month.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Hackers Create Legit Phishing Links With Ghost GitHub, GitLab Comments πŸ•΅οΈβ€β™‚οΈ

An utterly innocuous feature in popular Git CDNs allows anyone to conceal malware behind brand names, without those brands being any the wiser.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers πŸ–‹οΈ

A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys hosted on Content Delivery Network CDN cache domains since at least February 2024. Cisco Talos has attributed the activity with moderate confidence to a threat actor tracked as CoralRaider, a suspected Vietnameseorigin.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity