πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Judge0 Sandbox Vulnerabilities Expose Systems to Takeover Risk πŸ“”

Tanto Security uncovered three vulnerabilities which could allow attackers to execute sandbox escapes and gain root permissions on host machines.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'Muddling Meerkat' Poses Nation-State DNS Mystery πŸ•΅οΈβ€β™‚οΈ

Likely Chinalinked adversary has blanketed the Internet with DNS mail requests over the past five years via open resolvers, furthering Great Firewall of China ambitions. But the exact nature of its activity is unclear.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Study Reveals Alarming Levels of USPS Phishing Traffic πŸ“”

The top malicious domains attracted over 100,000 hits each, according to Akamai Security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023 πŸ–‹οΈ

Google on Monday revealed that almost 200,000 app submissions to its Play Store for Android were either rejected or remediated to address issues with access to sensitive data such as location or SMS messages over the past year. The tech giant also said it blocked 333,000 bad accounts from the app storefront in 2023 for attempting to distribute malware or for repeated policy violations. "In 2023,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen 🧨

Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with... The post The Darkgate Menace Leveraging Autohotkey Attempt to Evade Smartscreen appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 13.4M Kaiser Insurance Members Affected by Data Leak to Online Advertisers πŸ•΅οΈβ€β™‚οΈ

Tracking code used for keeping tabs on how members navigated through the healthcare giant's online and mobile sites was oversharing a concerning amount of information.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🀯1
πŸ•΅οΈβ€β™‚οΈ Okta: Credential-Stuffing Attacks Spike via Proxy Networks πŸ•΅οΈβ€β™‚οΈ

Okta warns users that the attack requests are made through an anonymizing service like Tor or various commercial proxy networks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity Is Becoming More Diverse … Except by Gender πŸ•΅οΈβ€β™‚οΈ

While other professions are making up ground, cybersecurity still lags behind in female representation, thanks to a lack of respect and inclusion.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ ESET PROTECT Portfolio Now Includes New MDR Tiers and Features πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data β™ŸοΈ

The U.S. Federal Communications Commission FCC today levied fines totaling nearly 200 million against the four major carriers including ATT, Sprint, TMobile and Verizon for illegally sharing access to customers' location information without consent.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
🀬1
πŸ–‹οΈ New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024 πŸ–‹οΈ

The U.K. National Cyber Security Centre NCSC is calling on manufacturers of smart devices to comply with new legislation that prohibits them from using default passwords, effective April 29, 2024. "The law, known as the Product Security and Telecommunications Infrastructure act or PSTI act, will help consumers to choose smart devices that have been designed to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸš€ Why space exploration is important for Earth and its future: Q&A with David Eicher πŸš€

We caught up with Astronomy magazine editorinchief David Eicher to talk about key challenges facing our planet, the benefits of space exploration, and the possibility of life beyond Earth.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Blocks 2.3 Million Apps From Play Store Listing πŸ“”

Google blocked millions of policyviolating apps from being listed on Play in 2023 and banned 333,000 bad accounts.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” FCC Fines Carriers $200m For Selling User Location Data πŸ“”

Some of Americas biggest wireless carriers illegally sold customer location, says FCC.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ LightSpy malware has made a comeback, and this time it's coming after your macOS devices πŸ“’

The LightSpy malware is back, and this time threat actors are targeting macOS devices with improved detectionevasion techniques.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ U.S. Government Releases New AI Security Guidelines for Critical Infrastructure πŸ–‹οΈ

The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial intelligence AIrelated threats. "These guidelines are informed by the wholeofgovernment effort to assess AI risks across all sixteen critical infrastructure sectors, and address threats both to and from, and involving AI systems," the Department of Homeland Security DHS.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Considerations for Operational Technology Cybersecurity πŸ–‹οΈ

Operational Technology OT refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes, and events. Unlike traditional Information Technology IT systems, OT systems directly impact the physical world. This unique characteristic of OT brings additional cybersecurity considerations not typically present in conventional IT security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ“’ Stealthy malware: The threats hiding in plain sight πŸ“’

As malicious software becomes increasingly difficult to detect, businesses must act to counter the stealthy malware threat.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 AI cybersecurity solutions detect ransomware in under 60 seconds 🧠

Worried about ransomware? If so, its not surprising. According to the World Economic Forum, for large cyber losses 1 million, the number of cases in which data is exfiltrated is increasing, doubling from 40 in 2019 to almost 80 in 2022. And more recent activity is tracking even higher. Meanwhile, other dangers are appearing on The post AI cybersecurity solutions detect ransomware in under 60 seconds appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Millions of Malicious Containers Found on Docker Hub πŸ“”

According to JFrog, approximately 25 of all repositories lack useful functionality and serve as vehicles for spam and malware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Disinformation: EU Opens Probe Against Facebook and Instagram Ahead of Election πŸ“”

Metas moderation failings could allow coordinated disinformation campaigns to thrive in the runup to the EU election.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity