πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” US Takes Down Illegal Cryptocurrency Mixing Service Samourai Wallet πŸ“”

The two founders of Samourai Wallet have been charged with money laundering and unlicensed moneytransmitting offenses.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Digital Blitzkrieg: Unveiling Cyber-Logistics Warfare πŸ•΅οΈβ€β™‚οΈ

Cyberattacks on logistics are becoming increasingly common, and the potential impact is enormous.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cisco Zero-Days Anchor 'ArcaneDoor' Cyber Espionage Campaign πŸ•΅οΈβ€β™‚οΈ

Attacks by a previously unknown threat actor leveraged two bugs in firewall devices to install custom backdoors on several government networks globally.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Women in Cybersecurity: ISC2 Survey Shows Pay Gap and Benefits of Inclusive Teams 🦿

About 23 of security teams include women, ISC2 found in its Cybersecurity Workforce Study.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korea's Lazarus Group Deploys New Kaolin RAT via Fake Job Lures πŸ–‹οΈ

The North Korealinked threat actor known as Lazarus Group employed its timetested fabricated job lures to deliver a new remote access trojan called Kaolin RAT. The malware could, "aside from standard RAT functionality, change the last write timestamp of a selected file and load any received DLL binary from commandandcontrol server," Avast security researcher Luigino.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Brokewell: A New Android Banking Trojan Targeting Users In Germany πŸ¦…

Key Takeaways A new Android Banking Trojan, "Brokewell", was identified as distributing via a fake Chrome Update phishing site.  The malware's development is attributed to the developer, "Baron Samedit," who manages the "Brokewell Cyber Labs" project.  Utilizing Gitea, the malware developer hosts the Brokewell Android Loader project repository and shares underground forum links related to their profile.  Brokewell Android Banking Trojan initially targets users in Germany but demonstrates potential expansion with references in multiple languages.  Leveraging the Accessibility service, the malware implements key features such as keylogging, overlay attack, and cookie stealing.  In its early development phase, the malware is expected to evolve with additional features and ex...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Protect Your Smartphone from SIM Swapping 🧨

You consider yourself a responsible person when it comes to taking care of your physical possessions. Youve never left your wallet in... The post How to Protect Your Smartphone from SIM Swapping appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Godfather Banking Trojan Spawns 1.2K Samples Across 57 Countries πŸ•΅οΈβ€β™‚οΈ

Mobile malwareasaservice operators are upping their game by automatically churning out hundreds of unique samples on a whim.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Avoid Romance Scams 🧨

Its the romance scam story that plays out like a segment on a true crime show. It starts with a... The post How to Avoid Romance Scams  appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Biggest 2024 Elections Threat: Kitchen-Sink Attack Chains πŸ•΅οΈβ€β™‚οΈ

Hackers can influence voters with media and breach campaigns, or try tampering with votes. Or they can combine these tactics to even greater effect.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FTC Issues $5.6M in Refunds to Customers After Ring Privacy Settlement πŸ•΅οΈβ€β™‚οΈ

The refunds will be made to individual affected customers through thousands of PayPal payments, available to be redeemed for a limited time.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FTC Issues $5.6M in Refunds to Customers After Ring Privacy Settlement πŸ•΅οΈβ€β™‚οΈ

The refunds will be made to individual affected customers through thousands of PayPal payments, available to be redeemed for a limited time.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 5 Attack Trends Organizations of All Sizes Should Be Monitoring πŸ•΅οΈβ€β™‚οΈ

Recent trends in breaches and attack methods offer a valuable road map to cybersecurity professionals tasked with detecting and preventing the next big thing.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese Keyboard Apps Open 1B People to Eavesdropping πŸ•΅οΈβ€β™‚οΈ

Eight out of nine apps that people use to input Chinese characters into mobile devices have weakness that allow a passive eavesdropper to collect keystroke data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 OpenAI’s GPT-4 Can Autonomously Exploit 87% of One-Day Vulnerabilities, Study Finds 🦿

Researchers from the University of Illinois UrbanaChampaign found that OpenAIs GPT4 is able to exploit 87 of a list of vulnerabilities when provided with their NIST descriptions.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1πŸ₯°1
πŸ•΅οΈβ€β™‚οΈ PCI Launches Payment Card Cybersecurity Effort in the Middle East πŸ•΅οΈβ€β™‚οΈ

The payment card industry pushes for more security in financial transactions to help combat increasing fraud in the region.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites πŸ–‹οΈ

Threat actors are attempting to actively exploit a critical security flaw in the WPAutomatic plugin for WordPress that could allow site takeovers. The shortcoming, tracked as CVE202427956, carries a CVSS score of 9.9 out of a maximum of 10. It impacts all versions of the plugin prior to 3.9.2.0. "This vulnerability, a SQL injection SQLi flaw, poses a severe threat as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Dutch Chipmaker Nexperia Hit by Data Breach πŸ‘½

Dutch semiconductor manufacturer Nexperia has suffered a significant data breach, exposing sensitive information, including intellectual property. The companys servers were compromised, prompting Nexperia to take them offline and launch a fullscale investigation. The extent of the damage remains unclear, and Nexperia hasnt confirmed whether the attackers demanded ransom. However, the.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Flawed Cisco firewalls used to target government networks πŸ“’

Cisco has published the details of a suspected statesponsored threat campaign leveraging two firewall zerodays to infect government networks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Russian Hackers Target Indiana Water Plant πŸ‘½

A recent cyberattack on a wastewater treatment plant in Tipton, Indiana, has been claimed by the Cyber Army of Russia Reborn CARR, a Russianspeaking hacker group. The incident spotlights the ongoing vulnerability of critical infrastructure in smaller communities, even as the plant itself reportedly experienced minimal disruption. CARR has previously.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ring to Pay Out $5.6m in Refunds After Customer Privacy Breach πŸ“”

The US Federal Trade Commission will send 5.6m worth of refunds to the spiedon customers of the Amazonowned home camera company.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity