πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Upgrade Your Cybersecurity With This VPN That’s Only $70 for Three Years 🦿

Windscribe VPN gives you tools to block ads, create a safe hotspot, spoof your location, and more for the 3 years for the best price online.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How Government Agencies Can Leverage Grants to Shore Up Cybersecurity πŸ•΅οΈβ€β™‚οΈ

With the help of grant funding, agencies and organizations can better defend themselves and their constituents.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Mobile Banking Malware Surges 32% πŸ“”

Afghanistan, Turkmenistan and Tajikistan victims experienced the highest share of banking Trojans.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Vast Network of Fake Web Shops Defrauds 850,000 & Counting πŸ•΅οΈβ€β™‚οΈ

Chinabased cybercriminal group "BogusBazaar" created tens of thousands of fraudulent online stores based on expired domains to steal payment credentials.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  I2P 2.5.1 πŸ› 

I2P is an anonymizing network, offering a simple layer that identitysensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Zed Attack Proxy 2.15.0 Cross Platform Package πŸ› 

The Zed Attack Proxy ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  AIDE 0.18.8 πŸ› 

AIDE Advanced Intrusion Detection Environment is a free replacement for Tripwiretm. It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  RansomLord Anti-Ransomware Exploit Tool 3 πŸ› 

RansomLord is a proofofconcept tool that automates the creation of PE files, used to compromise ransomware preencryption. This tool uses dll hijacking to defeat ransomware by placing PE files in the x32 or x64 directories where the program is run from.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign πŸ–‹οΈ

Polish government institutions have been targeted as part of a largescale malware campaign orchestrated by a Russialinked nationstate actor called APT28. "The campaign sent emails with content intended to arouse the recipient's interest and persuade him to click on the link," the computer emergency response team, CERT Polska, said in a Wednesday bulletin. Clicking on the link.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Why Cybersecurity Professionals Have a Duty to Secure AI πŸ“”

Experts at the RSA Conference urged cyber professionals to lead the way in securing AI systems today and pave the way for AI to solve huge societal challenges.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: How CISOs Should Protect Themselves Against Indictments πŸ“”

Experts at the RSA Conference discussed what CISOs can do to protect themselves against legal pressure.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New 'LLMjacking' Attack Exploits Stolen Cloud Credentials πŸ“”

Sysdig said the attackers gained access to these credentials from a vulnerable version of Laravel.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Protect Your Internet-Connected Healthcare Devices 🧨

Fitness trackers worn on the wrist, glucose monitors that test blood sugar without a prick, and connected toothbrushes that let... The post How to Protect Your InternetConnected Healthcare Devices appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ LockBit Claims Wichita as Its Victim 2 Days After Ransomware Attack πŸ•΅οΈβ€β™‚οΈ

The city is still investigating the attack, and neither the group nor city officials have offered details about the ransomware demands.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation πŸ–‹οΈ

Researchers have detailed a Virtual Private Network VPN bypass technique dubbed TunnelVision that allows threat actors to snoop on victim's network traffic by just being on the same local network. The "decloaking" method has been assigned the CVE identifier CVE20243661 CVSS score 7.6. It impacts all operating systems that implement a DHCP client and has.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'The Mask' Espionage Group Resurfaces After 10-Year Hiatus πŸ•΅οΈβ€β™‚οΈ

Researchers recently spotted the Spanishspeaking threat actor with nearly 400 previous victims under its belt in a new campaign in Latin America and Central Africa.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 2 (or 5) Bugs in F5 Asset Manager Allow Full Takeover, Hidden Accounts πŸ•΅οΈβ€β™‚οΈ

F5 customers should patch immediately, though even that won't protect them from every problem with their networked devices.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ•΅οΈβ€β™‚οΈ 87% of DDoS Attacks Targeted Windows OS Devices in 2023 πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CyberProof Announces Strategic Partnership With Google Cloud πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Aggressive Cloud-Security Player Wiz Scores $1B in Funding Round πŸ•΅οΈβ€β™‚οΈ

The latest round of investment prices the fastgrowing cloud native application protection platform CNAPP at 12 billion with a simple mandate Grow quickly through acquisition.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISA Courts Private Sector to Get Behind CIRCIA Reporting Rules πŸ•΅οΈβ€β™‚οΈ

New regulations will require the private sector to turn over incident data to CISA within three days or face enforcement. Here's how the agency is presenting this as a benefit to the entire private sector.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1