๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
26K subscribers
89.3K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ“” UnitedHealth CEO Confirms Breach Tied to Stolen Credentials, No MFA ๐Ÿ“”

Andrew Witty made the claims in a written testimony submitted before a House subcommittee hearing.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐ŸŒŠ Best Pentest Companies 2024 ๐ŸŒŠ

Forget the question of If you need a pentest. In todays threat landscape, with cyberattacks striking every 39 seconds, the critical question is, How often? Penetration testing is crucial in fortifying your organizations cybersecurity. By simulating realworld attacks, ethical hackers pen testers identify vulnerabilities in your systems before malicious actors can exploit them.  But with The post Best Pentest Companies 2024 appeared first on UnderDefense.

๐Ÿ“– Read more.

๐Ÿ”— Via "UnderDefense"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿงจ What Is a Data Broker? ๐Ÿงจ

A data broker is an organization that makes money by collecting your personal information, analyzing it, and licensing it out to... The post What Is a Data Broker? appeared first on McAfee Blog.

๐Ÿ“– Read more.

๐Ÿ”— Via "McAfee"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿช– Take A Tour! NIST Cybersecurity Framework 2.0: Small Business Quick Start Guide ๐Ÿช–

The U.S. Small Business Administration is celebrating National Small Business Week from April 28 May 4, 2024. This week recognizes and celebrates the small business communitys significant contributions to the nation. Organizations across the country participate by hosting inperson and virtual events, recognizing small business leaders and changemakers, and highlighting resources that help the small business community more easily and efficiently start and scale their businesses. To add to the festivities, this NIST Cybersecurity Insights blog showcases the NIST Cybersecurity Framework 2.0.

๐Ÿ“– Read more.

๐Ÿ”— Via "NIST"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” LockBit, Black Basta, Play Dominate Ransomware in Q1 2024 ๐Ÿ“”

The data from ReliaQuest also suggests LockBit faced a significant setback due to law enforcement action.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ 'Cuttlefish' Zero-Click Malware Steals Private Cloud Data ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The newly discovered malware, which has so far mainly targeted Turkish telcos and has links to HiatusRat, infects routers and performs DNS and HTTP hijacking attacks on connections to private IP addresses.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
โค1
๐Ÿ•ต๏ธโ€โ™‚๏ธ Intel 471 Acquires Cyborg Security ๐Ÿ•ต๏ธโ€โ™‚๏ธ



๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ Cobalt's 2024 State of Pentesting Report Reveals Cybersecurity Industry Needs ๐Ÿ•ต๏ธโ€โ™‚๏ธ



๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ Shadow APIs: An Overlooked Cyber-Risk for Orgs ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Unmanaged and unknown Web services endpoints are just some of the challenges organizations must address to improve API security.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ Qantas Customers' Boarding Passes Exposed in Flight App Mishap ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Some customers found that they had the ability to cancel a stranger's flight to another country after opening the app, which was showing other individuals' flight details.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ Private Internet Search Is Still Finding Its Way ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The quest to keep data private while still being able to search may soon be within reach, with different companies charting their own paths.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ UnitedHealth Congressional Testimony Reveals Rampant Security Fails ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The breach was carried out with stolen Citrix credentials for an account that lacked multifactor authentication. Attackers went undetected for days, and Change's backup strategy failed.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ 'DuneQuixote' Shows Stealth Cyberattack Methods Are Evolving. Can Defenders Keep Up? ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A recent campaign targeting Middle Eastern government organizations plays standard detection tools like a fiddle. With cyberattackers getting more creative, defenders must start keeping pace.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials ๐Ÿ–‹๏ธ

A new malware called Cuttlefish is targeting small office and home office SOHO routers with the goal of stealthily monitoring all traffic through the devices and gather authentication data from HTTP GET and POST requests. "This malware is modular, designed primarily to steal authentication material found in web requests that transit the router from the adjacent.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ‘1
๐Ÿ–‹๏ธ CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability ๐Ÿ–‹๏ธ

The U.S. Cybersecurity and Infrastructure Security Agency CISA has added a critical flaw impacting GitLab to its Known Exploited Vulnerabilities KEV catalog, owing to active exploitation in the wild. Tracked as CVE20237028 CVSS score 10.0, the maximum severity vulnerability could facilitate account takeover by sending password reset emails to an unverified email.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“ข UK councils are paying out a fortune in data breach claims ๐Ÿ“ข

A host of UK councils have been forced to pay compensation for data breaches over the last year, with some notable incidents costing thousands of pounds.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” US and UK Warn of Disruptive Russian OT Attacks ๐Ÿ“”

The US and its allies claim Russian hacktivists are disruptive operations in water, energy, food and agriculture sectors.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” REvil Ransomware Affiliate Sentenced to Over 13 Years in Prison ๐Ÿ“”

A US court has sentenced a Ukrainian national to 13 years and seven months in prison for his role in over 2500 ransomware attacks using the REvil strain.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ Microsoft Graph API Emerges as a Top Attacker Tool to Plot Data Theft ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Weaponizing Microsoft's own services for commandandcontrol is simple and costless, and it helps attackers better avoid detection.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ When is One Vulnerability Scanner Not Enough? ๐Ÿ–‹๏ธ

Like antivirus software, vulnerability scans rely on a database of known weaknesses. Thats why websites like VirusTotal exist, to give cyber practitioners a chance to see whether a malware sample is detected by multiple virus scanning engines, but this concept hasnt existed in the vulnerability management space. The benefits of using multiple scanning engines Generally speaking.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Dropbox Discloses Breach of Digital Signature Service Affecting All Users ๐Ÿ–‹๏ธ

Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign formerly HelloSign was breached by unidentified threat actors, who accessed emails, usernames, and general account settings associated with all users of the digital signature product. The company, in a filing with the U.S. Securities and Exchange Commission SEC, said it became aware of the ".

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity