πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover πŸ–‹οΈ

Two security vulnerabilities have been discovered in F5 Next Central Manager that could be exploited by a threat actor to seize control of the devices and create hidden rogue administrator accounts for persistence. The remotely exploitable flaws "can give attackers full administrative control of the device, and subsequently allow attackers to create accounts on any F5 assets managed by the Next.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fake Online Stores Scam Over 850,000 Shoppers πŸ“”

Researchers discover 75,000 domains hosting fraudulent ecommerce sites, in a campaign dubbed BogusBazaar.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Data Classification Policy 🦿

In many ways, data has become the primary currency of modern organizations. It doesnt matter whether you are a large business enterprise, SMB, government or nonprofit, the collection, management, protection and analysis of data is a determining factor in your overall success. This policy, written by Mark W. Kaelin for TechRepublic Premium, establishes an enterprisewide ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What is hackbot as a service and are malicious LLMs a risk? πŸ“’

As threat actors begin to use malicious chatbots, hackbot as a service groups are helping affiliates launch tailored attacks via subscription.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Nearly 70 software vendors sign up to CISA’s cyber resilience program πŸ“’

Major software manufacturers pledge to a voluntary framework aimed at boosting cyber resilience of customers across the US.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Guide: How to Scale Your vCISO Services Profitably πŸ–‹οΈ

Cybersecurity and compliance guidance are in high demand among SMEs. However, many of them cannot afford to hire a fulltime CISO. A vCISO can answer this need by offering ondemand access to toptier cybersecurity expertise. This is also an opportunity for MSPs and MSSPs to grow their business and bottom line. MSPs and MSSPs that expand their offerings and provide vCISO services.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery πŸ–‹οΈ

Two recently disclosed security flaws in Ivanti Connect Secure ICS devices are being exploited to deploy the infamous Mirai botnet. That's according to findings from Juniper Threat Labs, which said the vulnerabilities CVE202346805 and CVE202421887 have been leveraged to deliver the botnet payload. While CVE202346805 is an authentication bypass flaw,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI-Powered Russian Network Pushes Fake Political News πŸ“”

Researchers discover largescale Russian influence operation using GenAI to influence voters.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Latest NICE Framework Update Offers Improvements for the Cybersecurity Workforce πŸͺ–

I joined NIST as the first fulltime manager of the NICE Framework in October 2020, just one short month before NICE published the first revision NIST Special Publication 800181, the NICE Workforce Framework for Cybersecurity NICE Framework. That revision far from finalizing work was the starting point that led us to a complete refresh of the NICE Framework components, which includes Revised Work Role Categories and Work Roles including one new Work Role. Eleven new Competency Areas that extend the Frameworks cybersecurity knowledge and skills. Updated Task, Knowledge, and Skill.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Token Security Launches Machine-Centric IAM Platform πŸ•΅οΈβ€β™‚οΈ

Instead of building a list of users and identifying what systems each use can access, Token Security starts with a list of machines and determining who can access each system.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Social engineering in the era of generative AI: Predictions for 2024 🧠

Breakthroughs in large language models LLMs are driving an arms race between cybersecurity and social engineering scammers. Heres how its set to play out in 2024. For businesses, generative AI is both a curse and an opportunity. As enterprises race to adopt the technology, they also take on a whole new layer of cyber risk. The post Social engineering in the era of generative AI Predictions for 2024 appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Upgrade Your Cybersecurity With This VPN That’s Only $70 for Three Years 🦿

Windscribe VPN gives you tools to block ads, create a safe hotspot, spoof your location, and more for the 3 years for the best price online.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How Government Agencies Can Leverage Grants to Shore Up Cybersecurity πŸ•΅οΈβ€β™‚οΈ

With the help of grant funding, agencies and organizations can better defend themselves and their constituents.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Mobile Banking Malware Surges 32% πŸ“”

Afghanistan, Turkmenistan and Tajikistan victims experienced the highest share of banking Trojans.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Vast Network of Fake Web Shops Defrauds 850,000 & Counting πŸ•΅οΈβ€β™‚οΈ

Chinabased cybercriminal group "BogusBazaar" created tens of thousands of fraudulent online stores based on expired domains to steal payment credentials.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  I2P 2.5.1 πŸ› 

I2P is an anonymizing network, offering a simple layer that identitysensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Zed Attack Proxy 2.15.0 Cross Platform Package πŸ› 

The Zed Attack Proxy ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  AIDE 0.18.8 πŸ› 

AIDE Advanced Intrusion Detection Environment is a free replacement for Tripwiretm. It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  RansomLord Anti-Ransomware Exploit Tool 3 πŸ› 

RansomLord is a proofofconcept tool that automates the creation of PE files, used to compromise ransomware preencryption. This tool uses dll hijacking to defeat ransomware by placing PE files in the x32 or x64 directories where the program is run from.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign πŸ–‹οΈ

Polish government institutions have been targeted as part of a largescale malware campaign orchestrated by a Russialinked nationstate actor called APT28. "The campaign sent emails with content intended to arouse the recipient's interest and persuade him to click on the link," the computer emergency response team, CERT Polska, said in a Wednesday bulletin. Clicking on the link.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Why Cybersecurity Professionals Have a Duty to Secure AI πŸ“”

Experts at the RSA Conference urged cyber professionals to lead the way in securing AI systems today and pave the way for AI to solve huge societal challenges.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity