πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery πŸ–‹οΈ

Two recently disclosed security flaws in Ivanti Connect Secure ICS devices are being exploited to deploy the infamous Mirai botnet. That's according to findings from Juniper Threat Labs, which said the vulnerabilities CVE202346805 and CVE202421887 have been leveraged to deliver the botnet payload. While CVE202346805 is an authentication bypass flaw,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI-Powered Russian Network Pushes Fake Political News πŸ“”

Researchers discover largescale Russian influence operation using GenAI to influence voters.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Latest NICE Framework Update Offers Improvements for the Cybersecurity Workforce πŸͺ–

I joined NIST as the first fulltime manager of the NICE Framework in October 2020, just one short month before NICE published the first revision NIST Special Publication 800181, the NICE Workforce Framework for Cybersecurity NICE Framework. That revision far from finalizing work was the starting point that led us to a complete refresh of the NICE Framework components, which includes Revised Work Role Categories and Work Roles including one new Work Role. Eleven new Competency Areas that extend the Frameworks cybersecurity knowledge and skills. Updated Task, Knowledge, and Skill.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Token Security Launches Machine-Centric IAM Platform πŸ•΅οΈβ€β™‚οΈ

Instead of building a list of users and identifying what systems each use can access, Token Security starts with a list of machines and determining who can access each system.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Social engineering in the era of generative AI: Predictions for 2024 🧠

Breakthroughs in large language models LLMs are driving an arms race between cybersecurity and social engineering scammers. Heres how its set to play out in 2024. For businesses, generative AI is both a curse and an opportunity. As enterprises race to adopt the technology, they also take on a whole new layer of cyber risk. The post Social engineering in the era of generative AI Predictions for 2024 appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Upgrade Your Cybersecurity With This VPN That’s Only $70 for Three Years 🦿

Windscribe VPN gives you tools to block ads, create a safe hotspot, spoof your location, and more for the 3 years for the best price online.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How Government Agencies Can Leverage Grants to Shore Up Cybersecurity πŸ•΅οΈβ€β™‚οΈ

With the help of grant funding, agencies and organizations can better defend themselves and their constituents.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Mobile Banking Malware Surges 32% πŸ“”

Afghanistan, Turkmenistan and Tajikistan victims experienced the highest share of banking Trojans.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Vast Network of Fake Web Shops Defrauds 850,000 & Counting πŸ•΅οΈβ€β™‚οΈ

Chinabased cybercriminal group "BogusBazaar" created tens of thousands of fraudulent online stores based on expired domains to steal payment credentials.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  I2P 2.5.1 πŸ› 

I2P is an anonymizing network, offering a simple layer that identitysensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Zed Attack Proxy 2.15.0 Cross Platform Package πŸ› 

The Zed Attack Proxy ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  AIDE 0.18.8 πŸ› 

AIDE Advanced Intrusion Detection Environment is a free replacement for Tripwiretm. It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  RansomLord Anti-Ransomware Exploit Tool 3 πŸ› 

RansomLord is a proofofconcept tool that automates the creation of PE files, used to compromise ransomware preencryption. This tool uses dll hijacking to defeat ransomware by placing PE files in the x32 or x64 directories where the program is run from.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign πŸ–‹οΈ

Polish government institutions have been targeted as part of a largescale malware campaign orchestrated by a Russialinked nationstate actor called APT28. "The campaign sent emails with content intended to arouse the recipient's interest and persuade him to click on the link," the computer emergency response team, CERT Polska, said in a Wednesday bulletin. Clicking on the link.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Why Cybersecurity Professionals Have a Duty to Secure AI πŸ“”

Experts at the RSA Conference urged cyber professionals to lead the way in securing AI systems today and pave the way for AI to solve huge societal challenges.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: How CISOs Should Protect Themselves Against Indictments πŸ“”

Experts at the RSA Conference discussed what CISOs can do to protect themselves against legal pressure.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New 'LLMjacking' Attack Exploits Stolen Cloud Credentials πŸ“”

Sysdig said the attackers gained access to these credentials from a vulnerable version of Laravel.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Protect Your Internet-Connected Healthcare Devices 🧨

Fitness trackers worn on the wrist, glucose monitors that test blood sugar without a prick, and connected toothbrushes that let... The post How to Protect Your InternetConnected Healthcare Devices appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ LockBit Claims Wichita as Its Victim 2 Days After Ransomware Attack πŸ•΅οΈβ€β™‚οΈ

The city is still investigating the attack, and neither the group nor city officials have offered details about the ransomware demands.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation πŸ–‹οΈ

Researchers have detailed a Virtual Private Network VPN bypass technique dubbed TunnelVision that allows threat actors to snoop on victim's network traffic by just being on the same local network. The "decloaking" method has been assigned the CVE identifier CVE20243661 CVSS score 7.6. It impacts all operating systems that implement a DHCP client and has.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'The Mask' Espionage Group Resurfaces After 10-Year Hiatus πŸ•΅οΈβ€β™‚οΈ

Researchers recently spotted the Spanishspeaking threat actor with nearly 400 previous victims under its belt in a new campaign in Latin America and Central Africa.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity