πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Shadow APIs: An Overlooked Cyber-Risk for Orgs πŸ•΅οΈβ€β™‚οΈ

Unmanaged and unknown Web services endpoints are just some of the challenges organizations must address to improve API security.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Qantas Customers' Boarding Passes Exposed in Flight App Mishap πŸ•΅οΈβ€β™‚οΈ

Some customers found that they had the ability to cancel a stranger's flight to another country after opening the app, which was showing other individuals' flight details.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Private Internet Search Is Still Finding Its Way πŸ•΅οΈβ€β™‚οΈ

The quest to keep data private while still being able to search may soon be within reach, with different companies charting their own paths.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ UnitedHealth Congressional Testimony Reveals Rampant Security Fails πŸ•΅οΈβ€β™‚οΈ

The breach was carried out with stolen Citrix credentials for an account that lacked multifactor authentication. Attackers went undetected for days, and Change's backup strategy failed.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'DuneQuixote' Shows Stealth Cyberattack Methods Are Evolving. Can Defenders Keep Up? πŸ•΅οΈβ€β™‚οΈ

A recent campaign targeting Middle Eastern government organizations plays standard detection tools like a fiddle. With cyberattackers getting more creative, defenders must start keeping pace.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials πŸ–‹οΈ

A new malware called Cuttlefish is targeting small office and home office SOHO routers with the goal of stealthily monitoring all traffic through the devices and gather authentication data from HTTP GET and POST requests. "This malware is modular, designed primarily to steal authentication material found in web requests that transit the router from the adjacent.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA has added a critical flaw impacting GitLab to its Known Exploited Vulnerabilities KEV catalog, owing to active exploitation in the wild. Tracked as CVE20237028 CVSS score 10.0, the maximum severity vulnerability could facilitate account takeover by sending password reset emails to an unverified email.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ UK councils are paying out a fortune in data breach claims πŸ“’

A host of UK councils have been forced to pay compensation for data breaches over the last year, with some notable incidents costing thousands of pounds.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US and UK Warn of Disruptive Russian OT Attacks πŸ“”

The US and its allies claim Russian hacktivists are disruptive operations in water, energy, food and agriculture sectors.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” REvil Ransomware Affiliate Sentenced to Over 13 Years in Prison πŸ“”

A US court has sentenced a Ukrainian national to 13 years and seven months in prison for his role in over 2500 ransomware attacks using the REvil strain.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Graph API Emerges as a Top Attacker Tool to Plot Data Theft πŸ•΅οΈβ€β™‚οΈ

Weaponizing Microsoft's own services for commandandcontrol is simple and costless, and it helps attackers better avoid detection.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ When is One Vulnerability Scanner Not Enough? πŸ–‹οΈ

Like antivirus software, vulnerability scans rely on a database of known weaknesses. Thats why websites like VirusTotal exist, to give cyber practitioners a chance to see whether a malware sample is detected by multiple virus scanning engines, but this concept hasnt existed in the vulnerability management space. The benefits of using multiple scanning engines Generally speaking.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Dropbox Discloses Breach of Digital Signature Service Affecting All Users πŸ–‹οΈ

Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign formerly HelloSign was breached by unidentified threat actors, who accessed emails, usernames, and general account settings associated with all users of the digital signature product. The company, in a filing with the U.S. Securities and Exchange Commission SEC, said it became aware of the ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New "Goldoon" Botnet Targets D-Link Routers With Decade-Old Flaw πŸ–‹οΈ

A neverbeforeseen botnet called Goldoon has been observed targeting DLink routers with a nearly decadeold critical security flaw with the goal of using the compromised devices for further attacks. The vulnerability in question is CVE20152051 CVSS score 9.8, which affects DLink DIR645 routers and allows remote attackers to execute arbitrary.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The Dropbox data breach is a classic case of β€œbreach by acquisition” πŸ“’

Dropboxs esignature service, Dropbox Sign, has been breached exposing usernames, email addresses, as well as sensitive authentication information.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What makes a satisfied customer? πŸ“’

Roundtheclock customer support could be the difference between success and failure in the event of IT disruption.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Three-Quarters of CISOs Admit App Security Incidents πŸ“”

Dynatrace research claims global CISOs are concerned AI is driving advanced app security threats and poor developer practices.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Security Breach Exposes Dropbox Sign Users πŸ“”

Attackers accessed emails, usernames, phone numbers, hashed passwords and authentication information.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million πŸ–‹οΈ

A Ukrainian national has been sentenced to more than 13 years in prison and ordered to pay 16 million in restitution for carrying out thousands of ransomware attacks and extorting victims. Yaroslav Vasinskyi aka Rabotnik, 24, along with his coconspirators part of the REvil ransomware group orchestrated more than 2,500 ransomware attacks and demanded ransom payments in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why Haven't You Set Up DMARC Yet? πŸ•΅οΈβ€β™‚οΈ

DMARC adoption is more important than ever following Google's and Yahoo's latest mandates for large email senders. This Tech Tip outlines what needs to be done to enable DMARC on your domain.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Name That Edge Toon: Puppet Master πŸ•΅οΈβ€β™‚οΈ

Feeling creative? Submit your caption and our panel of experts will reward the winner with a 25 Amazon gift card.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity