πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ‘½ Public-Private Partnership for Cybersecurity πŸ‘½

Sixtyeight technology companies have joined the Cybersecurity and Infrastructure Security Agencys CISA Joint Cyber Defense Collaborative JCDC. This publicprivate partnership aims to bolster the nations cyber defenses by fostering collaboration between government agencies and private sector organizations. This significant move comes in response to the increasing frequency and sophistication of.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT πŸ–‹οΈ

The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver MSIX installers that culminate in the deployment of NetSupport RAT. "The threat actors used malicious websites to impersonate wellknown brands, including AnyDesk, WinSCP, BlackRock, Asana, Concur, The Wall.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ‘½ The Future of Information Warfare: LLMs and the Fight for Truth πŸ‘½

A recent investigation by Recorded Future, a threat intelligence firm, has raised alarms about the use of Large Language Models LLMs as a powerful tool in information warfare. The company uncovered a network called CopyCop, allegedly linked to Russia, which has been leveraging LLMs to manipulate news from mainstream media.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ‘½ Claiming Access to Zscaler πŸ‘½

The Englishspeaking actor named IntelBroker claimed that she gained access to Zscaler and that this access information was for sale in Breachforums. Allegedly, the actor has SMTP, certificate and many other access. BreachForums, also known as Breached, was a notorious Englishlanguage hacking forum launched in March 2022 as a successor.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ 5 takeaways from RSA Conference 2024 πŸ“’

RSA racks up hefty roster of keynote speakers to tout 'Art of Possible'.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Identity plays a critical role in protecting your business, how will you respond when compromised? πŸ“’

Drawing on experiences from a recent data breach, we look at one companys efforts to reform the industry through a strategic approach to fighting cyberthreats.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo πŸ–‹οΈ

Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golangversion of the Sliver commandandcontrol C2 framework within a PNG image of the project's logo.  The package employing this steganographic trickery is requestsdarwinlite, which has been.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Black Basta Ransomware Victim Count Tops 500 πŸ“”

Affiliates of prolific Black Basta ransomware group have breached over 500 global organizations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Threat Actor Claims Major Europol Data Breach πŸ“”

A threat actor known as IntelBroker claims to be selling confidential Europol data after a May breach.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike πŸ–‹οΈ

In the last decade, there has been a growing disconnect between frontline analysts and senior management in IT and Cybersecurity. Welldocumented challenges facing modern analysts revolve around a high volume of alerts, false positives, poor visibility of technical environments, and analysts spending too much time on manual tasks. The Impact of Alert Fatigue and False Positives  Analysts.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries πŸ–‹οΈ

Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat actors to access sensitive information and achieve code execution. "These vulnerabilities include critical flaws that permit remote code execution and unauthorized privilege escalation, posing substantial risks to integral communication networks and IoT.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia πŸ–‹οΈ

The Black Basta ransomwareasaservice RaaS operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia since its emergence in April 2022. In a joint advisory published by the Cybersecurity and Infrastructure Security Agency CISA, the Federal Bureau of Investigation FBI, the Department of Health and Human Services HHS.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What is a TOAD attack? πŸ“’

Find out what this means for your business, and what you can do to protect it.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield πŸ–‹οΈ

With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From account takeovers to malicious extensions to phishing attacks, the browser is a means for stealing sensitive data and accessing organizational systems. Security leaders who are planning their security architecture.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ascension Ransomware Attack Diverts Ambulances, Delays Appointments πŸ“”

A ransomware attack on US private healthcare provider Ascension has disrupted patient care, with several hospitals currently on diversion.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ How Did Authorities Identify the Alleged Lockbit Boss? β™ŸοΈ

Last week, the United States joined the U.K. and Australia in sanctioning and charging a Russian man named Dmitry Yuryevich Khoroshev as the leader of the infamous LockBit ransomware group. LockBit's leader "LockBitSupp" claims the feds named the wrong guy, saying the charges don't explain how they connected him to Khoroshev. This post examines the activities of Khoroshev's many alter egos on the cybercrime forums, and tracks the career of a gifted malware author who has written and sold malicious code for the past 14 years.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What’s going on with Zscaler? πŸ“’

Zscaler has received praise from cyber professionals for its response to an alleged data breach, but as the saga continues, customer uncertainty remains.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why Tokens Are Like Gold for Opportunistic Threat Actors πŸ•΅οΈβ€β™‚οΈ

When setting authentication token expiry policies, always lean in to security over employee convenience.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Dell hacker claims they had access to systems for nearly three weeks πŸ“’

The hacker trying to sell a Dell database containing 49 million customer records claims he was able to persist on the companys systems for several weeks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Best Encryption Software and Tools 🦿

This is a comprehensive list of best encryption software and tools, covering their features, pricing and more. Use this guide to determine your best fit.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices πŸ–‹οΈ

The MITRE Corporation has officially made available a new threatmodeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. "The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them," the nonprofit said.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity