πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ North Korean Hackers Deploy New Golang Malware 'Durian' Against Crypto Firms πŸ–‹οΈ

The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golangbased malware dubbed Durian as part of highlytargeted cyber attacks aimed at South Korean cryptocurrency firms. "Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads and exfiltration of files," Kaspersky.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar) πŸ–‹οΈ

Artificial intelligence AI is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, "The Future of Threat Hunting is Powered by Generative AI," where you'll explore how AI tools are shaping the future of cybersecurity defenses. During the session, Censys Security Researcher Aidan Holland will.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK's AI Safety Institute Unveils Platform to Accelerate Safe AI Development πŸ“”

The UK's open source AI safety evaluation platform, Inspect, is set to empower global collaboration for safer AI development.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… In the Shadow of Venus: Trinity Ransomware’s Covert Ties πŸ¦…

Key Takeaways CRIL Cyble Research and Intelligence Labs has discovered a new ransomware variant named Trinity. This variant employs a double extortion technique to target victims.  The Threat Actors TA behind Trinity ransomware utilize both victim support and data leak sites.   CRIL's analysis unveiled that a ransomware called "2023Lock" shares a similar ransom note format and underlying codebase with Trinity, indicating it could be a new variant of 2023Lock.  CRIL also observed similarities between Trinity and Venus ransomware, such as registry value usage and mutex naming conventions.   This suggests a potential connection or common threat actor behind the Trinity and Venus ransomware. Venus ransomware, operational since 2022, has conducted widespread attacks globally in ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How Do Hackers Hack Phones and How Can I Prevent It? 🧨

The threat of having your phone hacked has become a common fear. The truth is that it is possible to hack any phone. With the advancement of technology, where discovery of knowledge and information advances the understanding of technology, hackers are able to hack even the most sophisticated phone software. But how? The post How Do Hackers Hack Phones and How Can I Prevent It? appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ CISO as a CTO: When and Why It Makes Sense πŸ•΅οΈβ€β™‚οΈ

Enterprises are increasingly recognizing that a CISO's skills and experience building riskbased cyber programs translate well to other Csuite positions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Is CISA's Secure by Design Pledge Toothless? πŸ•΅οΈβ€β™‚οΈ

CISA's agreement is voluntary and, frankly, basic. Signatories say that's a good thing.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Reality Defender Wins RSAC Innovation Sandbox Competition πŸ•΅οΈβ€β™‚οΈ

In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for its tool for detecting and labeling deepfakes and other artificial content.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ascension Healthcare Suffers Major Cyberattack πŸ•΅οΈβ€β™‚οΈ

The attack cut off access to electronic healthcare records EHRs and ordering systems, plunging the organization and its health services into chaos.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Millions of IoT Devices at Risk from Flaws in Integrated Cellular Modem πŸ•΅οΈβ€β™‚οΈ

Researchers discovered seven vulnerabilities including an unauthenticated RCE issue in widely deployed Telit Cinterion modems.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ It's a wrap! RSA Conference 2024 highlights – Week in security with Tony Anscombe πŸš€

More than 40,000 security experts descended on San Francisco this week. Let's now look back on some of the event's highlights including the CISAled 'Secure by Design' pledge also signed by ESET.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸš€ How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe πŸš€

We spoke to climate scientist Katharine Hayhoe about intersections between climate action, human psychology and spirituality, and how to channel anxiety about the state of our planet into meaningful action.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ In it to win it! WeLiveSecurity shortlisted for European Security Blogger Awards πŸš€

Were thrilled to announce that WeLiveSecurity has been named a finalist in the Corporates Best Cybersecurity Vendor Blog category of the European Security Blogger Awards 2024.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Public-Private Partnership for Cybersecurity πŸ‘½

Sixtyeight technology companies have joined the Cybersecurity and Infrastructure Security Agencys CISA Joint Cyber Defense Collaborative JCDC. This publicprivate partnership aims to bolster the nations cyber defenses by fostering collaboration between government agencies and private sector organizations. This significant move comes in response to the increasing frequency and sophistication of.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT πŸ–‹οΈ

The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver MSIX installers that culminate in the deployment of NetSupport RAT. "The threat actors used malicious websites to impersonate wellknown brands, including AnyDesk, WinSCP, BlackRock, Asana, Concur, The Wall.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ‘½ The Future of Information Warfare: LLMs and the Fight for Truth πŸ‘½

A recent investigation by Recorded Future, a threat intelligence firm, has raised alarms about the use of Large Language Models LLMs as a powerful tool in information warfare. The company uncovered a network called CopyCop, allegedly linked to Russia, which has been leveraging LLMs to manipulate news from mainstream media.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ‘½ Claiming Access to Zscaler πŸ‘½

The Englishspeaking actor named IntelBroker claimed that she gained access to Zscaler and that this access information was for sale in Breachforums. Allegedly, the actor has SMTP, certificate and many other access. BreachForums, also known as Breached, was a notorious Englishlanguage hacking forum launched in March 2022 as a successor.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ 5 takeaways from RSA Conference 2024 πŸ“’

RSA racks up hefty roster of keynote speakers to tout 'Art of Possible'.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Identity plays a critical role in protecting your business, how will you respond when compromised? πŸ“’

Drawing on experiences from a recent data breach, we look at one companys efforts to reform the industry through a strategic approach to fighting cyberthreats.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo πŸ–‹οΈ

Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golangversion of the Sliver commandandcontrol C2 framework within a PNG image of the project's logo.  The package employing this steganographic trickery is requestsdarwinlite, which has been.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Black Basta Ransomware Victim Count Tops 500 πŸ“”

Affiliates of prolific Black Basta ransomware group have breached over 500 global organizations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity