πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ New Case Study: The Malicious Comment πŸ–‹οΈ

How safe is your comments section? Discover how a seemingly innocent 'thank you' comment on a product page concealed a malicious vulnerability, underscoring the necessity of robust security measures. Read the full reallife case study here.  When is a Thank you not a Thank you? When its a sneaky bit of code thats been hidden inside a Thank You.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Blinken: Digital Solidarity Is 'North Star' for US Policy πŸ•΅οΈβ€β™‚οΈ

The four goals of the US International Cyberspace and Digital Policy Strategy are to advance economic prosperity enhance security and combat cybercrime promote human rights, democracy, and the rule of law and address other transnational challenges.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The Australian Government’s Manufacturing Objectives Rely on IT Capabilities 🦿

The intent of the Future Made in Australia Act is to build manufacturing capabilities across all sectors, which will likely lead to more demand for IT skills and services.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Remote access risks on the rise with CVE-2024-1708 and CVE-2024-1709 🧠

On February 19, ConnectWise reported two vulnerabilities in its ScreenConnect product, CVE20241708 and 1709. The first is an authentication bypass vulnerability, and the second is a path traversal vulnerability. Both made it possible for attackers to bypass authentication processes and execute remote code. While ConnectWise initially reported that the vulnerabilities had proofofconcept but hadnt been The post Remote access risks on the rise with CVE20241708 and CVE20241709 appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data πŸ–‹οΈ

The Iranian statebacked hacking outfit called APT42 is making use of enhanced social engineering schemes to infiltrate target networks and cloud environments. Targets of the attack include Western and Middle Eastern NGOs, media organizations, academia, legal services and activists, Google Cloud subsidiary Mandiant said in a report published last week. "APT42 was.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion πŸ–‹οΈ

The MITRE Corporation has offered more details into the recently disclosed cyber attack, stating that the first evidence of the intrusion now dates back to December 31, 2023. The attack, which came to light last month, singled out MITRE's Networked Experimentation, Research, and Virtualization Environment NERVE through the exploitation of two Ivanti Connect Secure zeroday.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Report Shows AI Fraud, Deepfakes Are Top Challenges For Banks πŸ“”

Mitek surveyed 1500 financial services risk and innovation professionals in UK, US and Spain.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ LockBit mastermind unmasked by law enforcement πŸ“’

Dmitry Khoroshev, a leading figure in the LockBit ransomware gang, now has a 10 million bounty hanging over his head.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Three Battle-Tested Tips for Surviving a Cyber-Attack πŸ“”

CISOs share their experience of managing reallife cyber incidents provide their recommendations to survive cyberattacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Telegram Nearby Map: A Controversial Tool for Location Tracking πŸ‘½

This article is covering effects of the people tracking applications over the telegramnearbymap project on GitHub. This opensource project allows users to track the approximate location of other Telegram users within a specified radius, raising significant concerns about privacy and potential misuse. Functionality and Concerns The tool leverages Telegrams People.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” LockBit Leader aka LockBitSupp Identity Revealed πŸ“”

Russian national Dmitry Yuryevich Khoroshev is behind the LockBitSupp persona, law enforcement revealed.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Spies Among Us: Insider Threats in Open Source Environments πŸ•΅οΈβ€β™‚οΈ

Does the open source ecosystem needs stricter security around contributors?.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ City of Wichita Public Services Disrupted After Ransomware Attack πŸ•΅οΈβ€β™‚οΈ

The city was forced to shut down its IT networks and continues to investigate a major cyber incident that happened over the weekend.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware Strikes Wichita, Services Disrupted πŸ“”

Online payment systems, such as those for water bills and court citations, are still offline.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ U.S. Charges Russian Man as Boss of LockBit Ransomware Group β™ŸοΈ

The United States joined the United Kingdom and Australia today in sanctioning 31yearold Russian national Dmitry Yuryevich Khoroshev as the alleged leader of the infamous ransomware group LockBit. The U.S. Department of Justice also indicted Khoroshev as the gang's leader "LockbitSupp," and charged him with using Lockbit to attack more than 2,000 victims and extort at least 100 million in ransomware payments.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator πŸ–‹οΈ

The U.K. National Crime Agency NCA has unmasked the administrator and developer of the LockBit ransomware operation, revealing it to be a 31yearold Russian national named Dmitry Yuryevich Khoroshev. In addition, Khoroshev has been sanctioned by the U.K. Foreign, Commonwealth and Development Office FCD, the U.S. Department of the Treasurys Office of Foreign Assets Control .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Log4J Still Among Top Exploited Vulnerabilities, Cato Finds πŸ“”

A new report by Cato Networks found that exploiting old vulnerabilities in unpatched systems is one of threat actors favorite initial access vectors.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Report Identity Theft to Social Security 🧨

In the hands of a thief, your Social Security Number is the master key to your identity.  With a Social Security Number SSN, a thief can... The post How to Report Identity Theft to Social Security appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Decoding US Government Plans to Shift the Software Security Burden πŸ“”

US government officials discussed plans on how to incentivize security by design principles in the software manufacturing process during RSA.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Wiz Announces $1B Funding Round, Plans More M&A πŸ•΅οΈβ€β™‚οΈ

Much of the funding will be used for product development and talent acquisition to cover more ground as the cybersecurity industry continues to evolve.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Does CISA's KEV Catalog Speed Up Remediation? πŸ•΅οΈβ€β™‚οΈ

Vulnerabilities added to the CISA known exploited vulnerability KEV list do indeed get patched faster, but not fast enough.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity