πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  Zed Attack Proxy 2.15.0 Cross Platform Package πŸ› 

The Zed Attack Proxy ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  AIDE 0.18.8 πŸ› 

AIDE Advanced Intrusion Detection Environment is a free replacement for Tripwiretm. It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  RansomLord Anti-Ransomware Exploit Tool 3 πŸ› 

RansomLord is a proofofconcept tool that automates the creation of PE files, used to compromise ransomware preencryption. This tool uses dll hijacking to defeat ransomware by placing PE files in the x32 or x64 directories where the program is run from.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign πŸ–‹οΈ

Polish government institutions have been targeted as part of a largescale malware campaign orchestrated by a Russialinked nationstate actor called APT28. "The campaign sent emails with content intended to arouse the recipient's interest and persuade him to click on the link," the computer emergency response team, CERT Polska, said in a Wednesday bulletin. Clicking on the link.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Why Cybersecurity Professionals Have a Duty to Secure AI πŸ“”

Experts at the RSA Conference urged cyber professionals to lead the way in securing AI systems today and pave the way for AI to solve huge societal challenges.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: How CISOs Should Protect Themselves Against Indictments πŸ“”

Experts at the RSA Conference discussed what CISOs can do to protect themselves against legal pressure.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New 'LLMjacking' Attack Exploits Stolen Cloud Credentials πŸ“”

Sysdig said the attackers gained access to these credentials from a vulnerable version of Laravel.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Protect Your Internet-Connected Healthcare Devices 🧨

Fitness trackers worn on the wrist, glucose monitors that test blood sugar without a prick, and connected toothbrushes that let... The post How to Protect Your InternetConnected Healthcare Devices appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ LockBit Claims Wichita as Its Victim 2 Days After Ransomware Attack πŸ•΅οΈβ€β™‚οΈ

The city is still investigating the attack, and neither the group nor city officials have offered details about the ransomware demands.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation πŸ–‹οΈ

Researchers have detailed a Virtual Private Network VPN bypass technique dubbed TunnelVision that allows threat actors to snoop on victim's network traffic by just being on the same local network. The "decloaking" method has been assigned the CVE identifier CVE20243661 CVSS score 7.6. It impacts all operating systems that implement a DHCP client and has.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'The Mask' Espionage Group Resurfaces After 10-Year Hiatus πŸ•΅οΈβ€β™‚οΈ

Researchers recently spotted the Spanishspeaking threat actor with nearly 400 previous victims under its belt in a new campaign in Latin America and Central Africa.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 2 (or 5) Bugs in F5 Asset Manager Allow Full Takeover, Hidden Accounts πŸ•΅οΈβ€β™‚οΈ

F5 customers should patch immediately, though even that won't protect them from every problem with their networked devices.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ•΅οΈβ€β™‚οΈ 87% of DDoS Attacks Targeted Windows OS Devices in 2023 πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CyberProof Announces Strategic Partnership With Google Cloud πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Aggressive Cloud-Security Player Wiz Scores $1B in Funding Round πŸ•΅οΈβ€β™‚οΈ

The latest round of investment prices the fastgrowing cloud native application protection platform CNAPP at 12 billion with a simple mandate Grow quickly through acquisition.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISA Courts Private Sector to Get Behind CIRCIA Reporting Rules πŸ•΅οΈβ€β™‚οΈ

New regulations will require the private sector to turn over incident data to CISA within three days or face enforcement. Here's how the agency is presenting this as a benefit to the entire private sector.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸš€ RSAC 2024: AI hype overload πŸš€

Can AI effortlessly thwart all sorts of cyberattacks? Lets cut through the hyperbole surrounding the tech and look at its actual strengths and limitations.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover 'LLMjacking' Scheme Targeting Cloud-Hosted AI Models πŸ–‹οΈ

Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target cloudhosted large language model LLM services with the goal of selling access to other threat actors. The attack technique has been codenamed LLMjacking by the Sysdig Threat Research Team. "Once initial access was obtained, they exfiltrated cloud credentials and gained.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Google + Mandiant + Virus Total + AI πŸ‘½

At the RSA Conference in San Francisco, Google announced the launch of Google Threat Intelligence, a groundbreaking new offering that leverages the companys vast resources and expertise in cybersecurity to provide actionable threat intelligence at an unprecedented scale. Unparalleled Depth and Breadth of Intelligence This new platform combines the frontline.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Dell says data breach affecting 49 million customers poses no 'significant risk’ πŸ“’

Dell claims customers arent exposed to significant risk in the wake of a major breach, but customers should beware of targeted social engineering attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ UK’s first national security center to open in Wales πŸ“’

CymruSOC will work to protect the country's key public organizations from cyber attack.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity