πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack πŸ–‹οΈ

Palo Alto Networks has shared remediation guidance for a recently disclosed critical security flaw impacting PANOS that has come under active exploitation. The vulnerability, tracked as CVE20243400 CVSS score 10.0, could be weaponized to obtain unauthenticated remote shell command execution on susceptible devices. It has been addressed in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ“’ Everything you need to know about the Product Security and Telecommunications Infrastructure Act πŸ“’

Coming into force on April 29th, the Product Security and Telecommunications Infrastructure Act aims to tighten up manufacturer security and protect users.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Minimum Viable Compliance: What You Should Care About and Why πŸ•΅οΈβ€β™‚οΈ

Understand what security measures you have in place, what you need to keep secure, and what rules you have to show compliance with.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Military Tank Manual, 2017 Zero-Day Anchor Latest Ukraine Cyberattack πŸ•΅οΈβ€β™‚οΈ

The targeted operation utilized CVE20178570 as the initial vector and employed a notable custom loader for Cobalt Strike, yet attribution to any known threat actor remains elusive.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 850 Vulnerable Devices Secured Through CISA Ransomware Program πŸ“”

CISAs RVWP program sent 1754 ransomware vulnerability notifications to government and critical infrastructure entities in 2023, leading to 852 devices being secured.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ–‹οΈ Severe Flaws Disclosed in Brocade SANnav SAN Management Software πŸ–‹οΈ

Several security vulnerabilities disclosed in Brocade SANnav storage area network SAN management application could be exploited to compromise susceptible appliances. The 18 flaws impact all versions up to and including 2.3.0, according to independent security researcher Pierre Barre, who discovered and reported them. The issues range from incorrect firewall rules,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Tech brief security bundle πŸ“’

By Hewlett Packard Enterprise.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cyberattack Gold: SBOMs Offer an Easy Census of Vulnerable Software πŸ•΅οΈβ€β™‚οΈ

Attackers will likely use software billsofmaterial SBOMs for searching for software potentially vulnerable to specific software flaws.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Remove Personal Information From Data Broker Sites 🧨

Data brokers are companies that collect your information from a variety of sources to sell or license it out to... The post How to Remove Personal Information From Data Broker Sites appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 BeyondTrust Report: Microsoft Security Vulnerabilities Decreased by 5% in 2023 🦿

Refreshed software and collaboration with the security researcher community may have contributed to the 5 drop.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Philippines Pummeled by Assortment of Cyberattacks & Misinformation Tied to China πŸ•΅οΈβ€β™‚οΈ

The volume of malicious cyber activity against the Philippines quadrupled in the first quarter of 2024 compared to the same period in 2023.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ–‹οΈ Bogus npm Packages Used to Trick Software Developers into Installing Malware πŸ–‹οΈ

An ongoing social engineering campaign is targeting software developers with bogus npm packages under the guise of a job interview to trick them into downloading a Python backdoor. Cybersecurity firm Securonix is tracking the activity under the name DEVPOPPER, linking it to North Korean threat actors. "During these fraudulent interviews, the developers are often asked.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Strengthening Cybersecurity Defenses and Human Risk Management πŸ‘½

In a major move within the cybersecurity sector, KnowBe4, a leading security awareness training platform, has announced the acquisition of Egress, a prominent cloud email security provider. This strategic partnership blends two powerful forces in the battle against cyber threats. Who are KnowBe4 and Egress? Partnership Potential The integration of.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw πŸ–‹οΈ

Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly sevenyearold flaw in Microsoft Office to deliver Cobalt Strike on compromised systems. The attack chain, which took place at the end of 2023 according to Deep Instinct, employs a PowerPoint slideshow file "signal20231220160512.ppsx" as the starting point, with.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ IBM to Acquire HashiCorp to Expand Cloud Software πŸ‘½

International Business Machines IBM has announced its intention to acquire HashiCorp, a cloud infrastructure automation company, in a deal valued at 6.4 billion. This strategic move aims to expand IBMs cloudbased software offerings and capitalize on the surging demand driven by artificial intelligence AI. The deal comes as IBM experiences.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks πŸ–‹οΈ

Identity and access management IAM services provider Okta has warned of a spike in the "frequency and scale" of credential stuffing attacks aimed at online services. These unprecedented attacks, observed over the last month, are said to be facilitated by "the broad availability of residential proxy services, lists of previously stolen credentials 'combo lists', and scripting tools," the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Is Our Universe a Computer Simulation? πŸ‘½

The concept of living inside a computergenerated world, much like Neo in The Matrix, has long intrigued minds across science and philosophy. Now, a controversial concept called the Second Law of Infodynamics proposes evidence that the very fabric of our reality might be digital. Dr. Melvin Vopson of the University.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Okta Warns Customers of Credential Stuffing Barrage πŸ“”

Okta has issued customers with new advice on how to block mounting credential stuffing attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New UK Smart Device Security Law Comes into Force Today πŸ“”

IoT manufacturers, retailers and importers must comply with new security legislation, the PSTI act, from today.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover πŸ–‹οΈ

Multiple critical security flaws have been disclosed in the Judge0 opensource online code execution system that could be exploited to obtain code execution on the target system. The three flaws, all critical in nature, allow an "adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine," Australian.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM πŸ–‹οΈ

It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the everevolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this nonstop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity