πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Siemens Working on Fix for Device Affected by Palo Alto Firewall Bug πŸ•΅οΈβ€β™‚οΈ

Growing attacks targeting the flaw prompted CISA to include it in the known exploited vulnerabilities catalog earlier this month.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Hackers Create Legit Phishing Links With Ghost GitHub, GitLab Comments πŸ•΅οΈβ€β™‚οΈ

An utterly innocuous feature in popular Git CDNs allows anyone to conceal malware behind brand names, without those brands being any the wiser.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers πŸ–‹οΈ

A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys hosted on Content Delivery Network CDN cache domains since at least February 2024. Cisco Talos has attributed the activity with moderate confidence to a threat actor tracked as CoralRaider, a suspected Vietnameseorigin.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Microsoft issues warning over β€˜GooseEgg’ tool used in Russian hacking campaigns πŸ“’

Microsoft researchers have observed the tool being used to help install backdoors and move across networks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Euro police chiefs rekindle end-to-end encryption battle amid continued rollouts πŸ“’

Endtoend encryption plans are putting users in danger and making it harder to fight crime, police claim, but tech industry stakeholders disagree.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers have found yet another way to trick devs into downloading malware from GitHub πŸ“’

Threat actors have developed a new way to covertly embed malicious files into legitimate repositories on both GitHub and GitLab using the comment section.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners πŸ–‹οΈ

A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency miners like XMRig through a longstanding threat codenamed GuptiMiner targeting large corporate networks. Cybersecurity firm Avast said the activity is the work of a threat actor with possible connections to a North Korean hacking group dubbed .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fifth of CISOs Admit Staff Leaked Data Via GenAI πŸ“”

One in five UK organizations have had corporate data exposed via generative AI, says RiverSafe.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” North Korean Hackers Target Dozens of Defense Companies πŸ“”

North Korean hackers ran a yearlong cyberespionage campaign against South Korean defense companies.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users πŸ–‹οΈ

Security vulnerabilities uncovered in cloudbased pinyin keyboard apps could be exploited to reveal users' keystrokes to nefarious actors. The findings come from the Citizen Lab, which discovered weaknesses in eight of nine apps from vendors like Baidu, Honor, iFlytek, OPPO, Samsung, Tencent, Vivo, and Xiaomi. The only vendor whose keyboard app did not have any security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISO Perspectives on Complying with Cybersecurity Regulations πŸ–‹οΈ

Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the security controls, policies, and activities they include. For CISOs and their teams, that means compliance is a timeconsuming, highstakes process that demands strong organizational and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Do you know your data’s worth? πŸ“’

Data underpins our lives, but many businesses do not appreciate the true value of their data and fail to adequately secure it. Heres what needs to change.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Leeds Talent Pool Attracts BlueVoyant's First UK Security Operations Center πŸ“”

The proximity of organizations headquarters, like Asdas and NHS Englands, prompted BlueVoyant to choose Leeds as the location for its first UK SOC.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Security Leaders Braced for Daily AI-Driven Attacks by Year-End πŸ“”

Netacea research found that 93 of security leaders expect to face daily AIdriven attacks by the end of 2024, with 65 predicting that offensive AI will be the norm for cybercriminals.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… LOCKBIT Black’s Legacy: Unraveling the DragonForce Ransomware Connection πŸ¦…

Key Takeaways Cyble Research Intelligence Labs CRIL identified a DragonForce ransomware binary based on LOCKBIT Black ransomware, suggesting the threat actors behind DragonForce used a leaked builder of LOCKBIT Black ransomware to generate their binary.  In September 2022, an X Twitter user shared the download link for the LockBit ransomware builder, which allows threat actors to customize ransomware payloads according to their preferences.  A comparison between binaries generated using the Leaked Builder of LOCKBIT ransomware and DragonForce ransomware revealed significant similarities, indicating the DragonForce ransomware binary was likely created using the leaked builder of LOCKBIT ransomware.  DragonForce ransomware surfaced in November 2023. It utilizes double extortio...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Fortify AI Training Datasets From Malicious Poisoning πŸ•΅οΈβ€β™‚οΈ

Just like you should check the quality of the ingredients before you make a meal, it's critical to ensure the integrity of AI training data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Researchers develop malicious AI β€˜worm’ targeting generative AI systems 🧠

Researchers have created a new, neverseenbefore kind of malware they call the Morris II worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988. The worm demonstrates the potential dangers of AI security threats and The post Researchers develop malicious AI worm targeting generative AI systems appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Patch Now: CrushFTP Zero-Day Cloud Exploit Targets US Orgs πŸ•΅οΈβ€β™‚οΈ

An exploit for the vulnerability allows unauthenticated attackers to escape a virtual file system sandbox to download system files and potentially achieve RCE.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks πŸ–‹οΈ

The U.S. Treasury Department's Office of Foreign Assets Control OFAC on Monday sanctioned two firms and four individuals for their involvement in malicious cyber activities on behalf of the Iranian Islamic Revolutionary Guard Corps Cyber Electronic Command IRGCCEC from at least 2016 to April 2021. This includes the front companies Mehrsam Andisheh Saz Nik MASN and Dadeh.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike πŸ–‹οΈ

Cybersecurity researchers have discovered an ongoing attack campaign that's leveraging phishing emails to deliver malware called SSLoad. The campaign, codenamed FROZENSHADOW by Securonix, also involves the deployment of Cobalt Strike and the ConnectWise ScreenConnect remote desktop software. "SSLoad is designed to stealthily infiltrate systems, gather sensitive.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Sanctions Iranian "Fronts" for Cyber-Attacks on American Entities πŸ“”

The US Treasury announced sanctions on two companies and four individuals for cyber campaigns conducted on behalf of the Iranian government.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity