πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Do you know your data’s worth? πŸ“’

Data underpins our lives, but many businesses do not appreciate the true value of their data and fail to adequately secure it. Heres what needs to change.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Leeds Talent Pool Attracts BlueVoyant's First UK Security Operations Center πŸ“”

The proximity of organizations headquarters, like Asdas and NHS Englands, prompted BlueVoyant to choose Leeds as the location for its first UK SOC.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Security Leaders Braced for Daily AI-Driven Attacks by Year-End πŸ“”

Netacea research found that 93 of security leaders expect to face daily AIdriven attacks by the end of 2024, with 65 predicting that offensive AI will be the norm for cybercriminals.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… LOCKBIT Black’s Legacy: Unraveling the DragonForce Ransomware Connection πŸ¦…

Key Takeaways Cyble Research Intelligence Labs CRIL identified a DragonForce ransomware binary based on LOCKBIT Black ransomware, suggesting the threat actors behind DragonForce used a leaked builder of LOCKBIT Black ransomware to generate their binary.  In September 2022, an X Twitter user shared the download link for the LockBit ransomware builder, which allows threat actors to customize ransomware payloads according to their preferences.  A comparison between binaries generated using the Leaked Builder of LOCKBIT ransomware and DragonForce ransomware revealed significant similarities, indicating the DragonForce ransomware binary was likely created using the leaked builder of LOCKBIT ransomware.  DragonForce ransomware surfaced in November 2023. It utilizes double extortio...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Fortify AI Training Datasets From Malicious Poisoning πŸ•΅οΈβ€β™‚οΈ

Just like you should check the quality of the ingredients before you make a meal, it's critical to ensure the integrity of AI training data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Researchers develop malicious AI β€˜worm’ targeting generative AI systems 🧠

Researchers have created a new, neverseenbefore kind of malware they call the Morris II worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988. The worm demonstrates the potential dangers of AI security threats and The post Researchers develop malicious AI worm targeting generative AI systems appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Patch Now: CrushFTP Zero-Day Cloud Exploit Targets US Orgs πŸ•΅οΈβ€β™‚οΈ

An exploit for the vulnerability allows unauthenticated attackers to escape a virtual file system sandbox to download system files and potentially achieve RCE.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks πŸ–‹οΈ

The U.S. Treasury Department's Office of Foreign Assets Control OFAC on Monday sanctioned two firms and four individuals for their involvement in malicious cyber activities on behalf of the Iranian Islamic Revolutionary Guard Corps Cyber Electronic Command IRGCCEC from at least 2016 to April 2021. This includes the front companies Mehrsam Andisheh Saz Nik MASN and Dadeh.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike πŸ–‹οΈ

Cybersecurity researchers have discovered an ongoing attack campaign that's leveraging phishing emails to deliver malware called SSLoad. The campaign, codenamed FROZENSHADOW by Securonix, also involves the deployment of Cobalt Strike and the ConnectWise ScreenConnect remote desktop software. "SSLoad is designed to stealthily infiltrate systems, gather sensitive.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Sanctions Iranian "Fronts" for Cyber-Attacks on American Entities πŸ“”

The US Treasury announced sanctions on two companies and four individuals for cyber campaigns conducted on behalf of the Iranian government.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Tell If Your Text Message Is Real 🧨

According to reports from the Federal Trade Commissions Consumer Sentinel database, text message scams swindled 330 million from Americans in... The post How to Tell If Your Text Message Is Real  appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 2023: A 'Good' Year for OT Cyberattacks πŸ•΅οΈβ€β™‚οΈ

Attacks increased by "only" 19 last year. But that number is expected to grow significently.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Congress Passes Bill to Ban TikTok πŸ“”

The bill that could see TikTok banned in the US has been approved by the House of Representatives and the Senate.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Iran Dupes US Military Contractors, Gov't Agencies in Years-Long Cyber Campaign πŸ•΅οΈβ€β™‚οΈ

A statesponsored hacking team employed a clever masquerade and elaborate backend infrastructure as part of a fiveyear infostealing campaign that compromised the US State and Treasury Departments, and hundreds of thousands of accounts overall.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ TechSlayer chronicles - Digital defenders: πŸ“’

Securing hybrid cloud infrastructure from alien forces.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The basics and business of trusted security πŸ“’

Deploy technology with confidence.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Trusted security from the edge to the cloud πŸ“’

Counter cyber risks and threats.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Putting Trusted Security to Work πŸ“’

Securely manage servers across their entire lifecycle.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ North Korea APT Triumvirate Spied on South Korean Defense Industry For Years πŸ•΅οΈβ€β™‚οΈ

Lazarus, Kimsuky, and Andariel all got in on the action, stealing "important" data from firms responsible for defending their southern neighbors from them.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape 🦿

A new report by cyber security firm Radware identifies the four main impacts of AI on the threat landscape emerging this year.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Lights On in Leicester: Streetlights in Disarray After Cyberattack πŸ•΅οΈβ€β™‚οΈ

The city is stymied in efforts to pinpoint the issue since its IT systems were shut down in the wake of the cyberattack.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity