πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β™ŸοΈ How Did Authorities Identify the Alleged Lockbit Boss? β™ŸοΈ

Last week, the United States joined the U.K. and Australia in sanctioning and charging a Russian man named Dmitry Yuryevich Khoroshev as the leader of the infamous LockBit ransomware group. LockBit's leader "LockBitSupp" claims the feds named the wrong guy, saying the charges don't explain how they connected him to Khoroshev. This post examines the activities of Khoroshev's many alter egos on the cybercrime forums, and tracks the career of a gifted malware author who has written and sold malicious code for the past 14 years.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What’s going on with Zscaler? πŸ“’

Zscaler has received praise from cyber professionals for its response to an alleged data breach, but as the saga continues, customer uncertainty remains.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why Tokens Are Like Gold for Opportunistic Threat Actors πŸ•΅οΈβ€β™‚οΈ

When setting authentication token expiry policies, always lean in to security over employee convenience.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Dell hacker claims they had access to systems for nearly three weeks πŸ“’

The hacker trying to sell a Dell database containing 49 million customer records claims he was able to persist on the companys systems for several weeks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Best Encryption Software and Tools 🦿

This is a comprehensive list of best encryption software and tools, covering their features, pricing and more. Use this guide to determine your best fit.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices πŸ–‹οΈ

The MITRE Corporation has officially made available a new threatmodeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. "The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them," the nonprofit said.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Mallox Ransomware Deployed Via MS-SQL Honeypot Attack πŸ“”

Analyzing Mallox samples, Sekoia identified two distinct affiliates using different approaches.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Critical Vulnerabilities in Cinterion Modems Exposed πŸ“”

The flaws include CVE202347610, a security weaknesses within the modems SUPL message handlers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ IntelBroker Nabs Europol Info; Agency Investigating πŸ•΅οΈβ€β™‚οΈ

Europe's crossborder law enforcement agency says the wellknown hacking outfit, contrary to claims, did not access operational data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Stop Phone Spoofing 🧨

From impersonating police officers in Pennsylvania to employees of the City of San Antonio, scammers have been impersonating officials nationwide... The post How to Stop Phone Spoofing appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Report: Organisations Have Endpoint Security Tools But Are Still Falling Short on the Basics 🦿

AI PCs could soon see organisations invest in whole fleets of new managed devices, but Absolute Security data shows they are failing to maintain endpoint protection and patching the devices they have.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Ukrainian, Latvian TV Hijacked to Broadcast Russian Celebrations πŸ•΅οΈβ€β™‚οΈ

At least 15 television channels were interrupted in Ukraine alone, which, reportedly, is not out of the norm in this "information war.".

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ•΅οΈβ€β™‚οΈ 500 Victims In, Black Basta Reinvents With Novel Vishing Strategy πŸ•΅οΈβ€β™‚οΈ

Ransomware groups have always created problems for their victims that only they could solve. Black Basta is taking that core idea in a creative, new direction.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ–‹οΈ Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices πŸ–‹οΈ

Apple and Google on Monday officially announced the rollout of a new feature that notifies users across both iOS and Android if a Bluetooth tracking device is being used to stealthily keep tabs on them without their knowledge or consent. "This will help mitigate the misuse of devices designed to help keep track of belongings," the companies said in a joint statement, adding it aims to address ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 3 recommendations for adopting generative AI for cyber defense 🧠

In the past eighteen months, generative AI gen AI has gone from being the source of jawdropping demos to a top strategic priority in nearly every industry. A majority of CEOs report feeling under pressure to invest in gen AI. Product teams are now scrambling to build gen AI into their solutions and services. The The post 3 recommendations for adopting generative AI for cyber defense appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Claiming Access to Coinbase πŸ‘½

A threat actor claimed that they have an access to Coinbase with ability to check the balance of any account. The advertisement shared in Telegram group. Coinbase is a leading cryptocurrency exchange platform founded in 2012, headquartered in the United States. It allows users to buy, sell, and store various.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Hackers Use DNS Tunneling to Scan and Track Victims πŸ“”

Palo Alto Networks warns threat actors are using DNS tunneling techniques to probe for network vulnerabilities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FCC Names and Shames First Robocall Threat Actor πŸ“”

In a first, the FCC has designated Royal Tiger as a malicious robocall threat group.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Scattered Spider, the ransomware group behind the MGM cyber attack, is still on a rampage – and authorities are ramping up efforts to catch them πŸ“’

Scattered Spider brought MGM Resorts to its knees in late 2023, and despite a law enforcement crackdown, its still highly active.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Insurance and NCSC Join Forces to Fight Ransomware Payments πŸ“”

UK insurers and the National Cybersecurity Centre release new guidance to discourage ransomware payments by businesses.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 6 Mistakes Organizations Make When Deploying Advanced Authentication πŸ–‹οΈ

Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link their human users. Having some form of 2factor authentication in place is a great start, but many organizations may not yet be in that spot or have the needed level of authentication sophistication to adequately safeguard organizational data. When deploying.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity