πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ 5 Attack Trends Organizations of All Sizes Should Be Monitoring πŸ•΅οΈβ€β™‚οΈ

Recent trends in breaches and attack methods offer a valuable road map to cybersecurity professionals tasked with detecting and preventing the next big thing.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese Keyboard Apps Open 1B People to Eavesdropping πŸ•΅οΈβ€β™‚οΈ

Eight out of nine apps that people use to input Chinese characters into mobile devices have weakness that allow a passive eavesdropper to collect keystroke data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 OpenAI’s GPT-4 Can Autonomously Exploit 87% of One-Day Vulnerabilities, Study Finds 🦿

Researchers from the University of Illinois UrbanaChampaign found that OpenAIs GPT4 is able to exploit 87 of a list of vulnerabilities when provided with their NIST descriptions.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1πŸ₯°1
πŸ•΅οΈβ€β™‚οΈ PCI Launches Payment Card Cybersecurity Effort in the Middle East πŸ•΅οΈβ€β™‚οΈ

The payment card industry pushes for more security in financial transactions to help combat increasing fraud in the region.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites πŸ–‹οΈ

Threat actors are attempting to actively exploit a critical security flaw in the WPAutomatic plugin for WordPress that could allow site takeovers. The shortcoming, tracked as CVE202427956, carries a CVSS score of 9.9 out of a maximum of 10. It impacts all versions of the plugin prior to 3.9.2.0. "This vulnerability, a SQL injection SQLi flaw, poses a severe threat as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Dutch Chipmaker Nexperia Hit by Data Breach πŸ‘½

Dutch semiconductor manufacturer Nexperia has suffered a significant data breach, exposing sensitive information, including intellectual property. The companys servers were compromised, prompting Nexperia to take them offline and launch a fullscale investigation. The extent of the damage remains unclear, and Nexperia hasnt confirmed whether the attackers demanded ransom. However, the.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Flawed Cisco firewalls used to target government networks πŸ“’

Cisco has published the details of a suspected statesponsored threat campaign leveraging two firewall zerodays to infect government networks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Russian Hackers Target Indiana Water Plant πŸ‘½

A recent cyberattack on a wastewater treatment plant in Tipton, Indiana, has been claimed by the Cyber Army of Russia Reborn CARR, a Russianspeaking hacker group. The incident spotlights the ongoing vulnerability of critical infrastructure in smaller communities, even as the plant itself reportedly experienced minimal disruption. CARR has previously.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ring to Pay Out $5.6m in Refunds After Customer Privacy Breach πŸ“”

The US Federal Trade Commission will send 5.6m worth of refunds to the spiedon customers of the Amazonowned home camera company.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 10 Critical Endpoint Security Tips You Should Know πŸ–‹οΈ

In today's digital world, where connectivity is rules all, endpoints serve as the gateway to a businesss digital kingdom. And because of this, endpoints are one of hackers' favorite targets.  According to the IDC, 70 of successful breaches start at the endpoint. Unprotected endpoints provide vulnerable entry points to launch devastating cyberattacks. With IT.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New 'Brokewell' Android Malware Spread Through Fake Browser Updates πŸ–‹οΈ

Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. "Brokewell is a typical modern banking malware equipped with both datastealing and remotecontrol capabilities built into the malware," Dutch security firm ThreatFabric said in an analysis published Thursday. The malware is said to be in active development,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack πŸ–‹οΈ

Palo Alto Networks has shared remediation guidance for a recently disclosed critical security flaw impacting PANOS that has come under active exploitation. The vulnerability, tracked as CVE20243400 CVSS score 10.0, could be weaponized to obtain unauthenticated remote shell command execution on susceptible devices. It has been addressed in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ“’ Everything you need to know about the Product Security and Telecommunications Infrastructure Act πŸ“’

Coming into force on April 29th, the Product Security and Telecommunications Infrastructure Act aims to tighten up manufacturer security and protect users.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Minimum Viable Compliance: What You Should Care About and Why πŸ•΅οΈβ€β™‚οΈ

Understand what security measures you have in place, what you need to keep secure, and what rules you have to show compliance with.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Military Tank Manual, 2017 Zero-Day Anchor Latest Ukraine Cyberattack πŸ•΅οΈβ€β™‚οΈ

The targeted operation utilized CVE20178570 as the initial vector and employed a notable custom loader for Cobalt Strike, yet attribution to any known threat actor remains elusive.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 850 Vulnerable Devices Secured Through CISA Ransomware Program πŸ“”

CISAs RVWP program sent 1754 ransomware vulnerability notifications to government and critical infrastructure entities in 2023, leading to 852 devices being secured.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ–‹οΈ Severe Flaws Disclosed in Brocade SANnav SAN Management Software πŸ–‹οΈ

Several security vulnerabilities disclosed in Brocade SANnav storage area network SAN management application could be exploited to compromise susceptible appliances. The 18 flaws impact all versions up to and including 2.3.0, according to independent security researcher Pierre Barre, who discovered and reported them. The issues range from incorrect firewall rules,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Tech brief security bundle πŸ“’

By Hewlett Packard Enterprise.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cyberattack Gold: SBOMs Offer an Easy Census of Vulnerable Software πŸ•΅οΈβ€β™‚οΈ

Attackers will likely use software billsofmaterial SBOMs for searching for software potentially vulnerable to specific software flaws.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Remove Personal Information From Data Broker Sites 🧨

Data brokers are companies that collect your information from a variety of sources to sell or license it out to... The post How to Remove Personal Information From Data Broker Sites appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 BeyondTrust Report: Microsoft Security Vulnerabilities Decreased by 5% in 2023 🦿

Refreshed software and collaboration with the security researcher community may have contributed to the 5 drop.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity