πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ 500 Victims In, Black Basta Reinvents With Novel Vishing Strategy πŸ•΅οΈβ€β™‚οΈ

Ransomware groups have always created problems for their victims that only they could solve. Black Basta is taking that core idea in a creative, new direction.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ–‹οΈ Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices πŸ–‹οΈ

Apple and Google on Monday officially announced the rollout of a new feature that notifies users across both iOS and Android if a Bluetooth tracking device is being used to stealthily keep tabs on them without their knowledge or consent. "This will help mitigate the misuse of devices designed to help keep track of belongings," the companies said in a joint statement, adding it aims to address ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 3 recommendations for adopting generative AI for cyber defense 🧠

In the past eighteen months, generative AI gen AI has gone from being the source of jawdropping demos to a top strategic priority in nearly every industry. A majority of CEOs report feeling under pressure to invest in gen AI. Product teams are now scrambling to build gen AI into their solutions and services. The The post 3 recommendations for adopting generative AI for cyber defense appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Claiming Access to Coinbase πŸ‘½

A threat actor claimed that they have an access to Coinbase with ability to check the balance of any account. The advertisement shared in Telegram group. Coinbase is a leading cryptocurrency exchange platform founded in 2012, headquartered in the United States. It allows users to buy, sell, and store various.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Hackers Use DNS Tunneling to Scan and Track Victims πŸ“”

Palo Alto Networks warns threat actors are using DNS tunneling techniques to probe for network vulnerabilities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FCC Names and Shames First Robocall Threat Actor πŸ“”

In a first, the FCC has designated Royal Tiger as a malicious robocall threat group.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Scattered Spider, the ransomware group behind the MGM cyber attack, is still on a rampage – and authorities are ramping up efforts to catch them πŸ“’

Scattered Spider brought MGM Resorts to its knees in late 2023, and despite a law enforcement crackdown, its still highly active.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Insurance and NCSC Join Forces to Fight Ransomware Payments πŸ“”

UK insurers and the National Cybersecurity Centre release new guidance to discourage ransomware payments by businesses.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 6 Mistakes Organizations Make When Deploying Advanced Authentication πŸ–‹οΈ

Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link their human users. Having some form of 2factor authentication in place is a great start, but many organizations may not yet be in that spot or have the needed level of authentication sophistication to adequately safeguard organizational data. When deploying.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ongoing Campaign Bombarded Enterprises with Spam Emails and Phone Calls πŸ–‹οΈ

Cybersecurity researchers have uncovered an ongoing social engineering campaign that bombards enterprises with spam emails with the goal of obtaining initial access to their environments for followon exploitation. "The incident involves a threat actor overwhelming a user's email with junk and calling the user, offering assistance," Rapid7 researchers Tyler McGraw, Thomas Elkins, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The HSE cyber attack was a "landmark event" in Ireland - has it learned from the experience? πŸ“’

The HSE cyber attack in 2021 was one of the worst security incidents in Irish history, but three years on, has the health service learned from its mistakes?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Heartbleed: When Is It Good to Name a Vulnerability? πŸ•΅οΈβ€β™‚οΈ

Ten years have passed since Heartbleed was first identified, but the security industry is still grappling with the question of branded vulnerabilities and naming vulnerabilities appropriately.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about 🧠

At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 RSAC, the conversation turned to the most popular trends and themes at this years events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about RSAC 2024 is all about The post Overheard at RSA Conference 2024 Top trends cybersecurity experts are talking about appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Flaws in Cacti Framework Could Let Attackers Execute Malicious Code πŸ–‹οΈ

The maintainers of the Cacti opensource network monitoring and fault management framework have addressed a dozen security flaws, including two critical issues that could lead to the execution of arbitrary code. The most severe of the vulnerabilities are listed below CVE202425641 CVSS score 9.1 An arbitrary file write vulnerability in the "Package Import" feature that.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ There Is No Cyber Labor Shortage πŸ•΅οΈβ€β™‚οΈ

There are plenty of valuable candidates on the market. Hiring managers are simply looking in the wrong places.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russian Actors Weaponize Legitimate Services in Multi-Malware Attack πŸ“”

Recorded Future details a novel campaign that abuses legitimate internet services to deploy multiple malware variants for credential theft.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ DNS Tunneling Abuse Expands to Tracking & Scanning Victims πŸ•΅οΈβ€β™‚οΈ

Several campaigns are leveraging the evasive tactic to provide useful insights into victims' online activities and find new ways to compromise organizations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Microsoft Upgrades Outlook Spam Filter with AI, Phishing Protection πŸ‘½

Microsoft has announced significant improvements to its spam filtering capabilities within Outlook, aiming to reduce the amount of unwanted emails reaching users inboxes. These enhancements leverage artificial intelligence AI and machine learning to better identify and block spam messages, providing a cleaner and more productive email experience. Key Improvements Improved.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation πŸ–‹οΈ

Google on Monday shipped emergency fixes to address a new zeroday flaw in the Chrome web browser that has come under active exploitation in the wild. The highseverity vulnerability, tracked as CVE20244761, is an outofbounds write bug impacting the V8 JavaScript and WebAssembly engine. It was reported anonymously on May 9, 2024. Outofbounds write bugs could be typically.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” China Presents Defining Challenge to Global Cybersecurity, Says GCHQ πŸ“”

GCHQ chief warns China's cyber actions threaten global internet security, while Russia and Iran pose immediate risks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 44% of Cybersecurity Professionals Struggle with Regulatory Compliance πŸ“”

Infosecurity Europe research highlights significant challenges faced by organisations in staying up to speed with increasing compliance requirements.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1