ποΈ New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Google on Monday shipped emergency fixes to address a new zeroday flaw in the Chrome web browser that has come under active exploitation in the wild. The highseverity vulnerability, tracked as CVE20244761, is an outofbounds write bug impacting the V8 JavaScript and WebAssembly engine. It was reported anonymously on May 9, 2024. Outofbounds write bugs could be typically.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π China Presents Defining Challenge to Global Cybersecurity, Says GCHQ π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
GCHQ chief warns China's cyber actions threaten global internet security, while Russia and Iran pose immediate risks.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
China Presents Defining Challenge to Global Cybersecurity, Says GCHQ
GCHQ chief warns China's cyber actions threaten global internet security, while Russia and Iran pose immediate risks
π 44% of Cybersecurity Professionals Struggle with Regulatory Compliance π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Europe research highlights significant challenges faced by organisations in staying up to speed with increasing compliance requirements.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
44% of Cybersecurity Professionals Struggle with Regulatory Compliance
Infosecurity Europe research highlights significant challenges faced by organisations in staying up to speed with increasing compliance requirements
β€1
ποΈ VMware Patches Severe Security Flaws in Workstation and Fusion Products ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Multiple security flaws have been disclosed in VMware Workstation and Fusion products that could be exploited by threat actors to access sensitive information, trigger a denialofservice DoS condition, and execute code under certain circumstances. The four vulnerabilities impact Workstation versions 17.x and Fusion versions 13.x, with fixes available in version 17.5.2 and.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Ebury Botnet Operators Diversify with Financial and Crypto Theft π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The 15yearold Ebury botnet is more active than ever, as ESET found 400,000 Linux servers compromised for cryptocurrency theft and financial gain.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ebury Botnet Operators Diversify with Financial and Crypto Theft
The 15-year-old Ebury botnet is more active than ever, as ESET found 400,000 Linux servers compromised for cryptocurrency theft and financial gain
π CISA and Partners Unveil Cybersecurity Guide For Civil Society Groups π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The guide is designed to provide highrisk communities with actionable steps to bolster their cybersecurity defenses.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
CISA and Partners Unveil Cybersecurity Guide For Civil Society Groups
The guide is designed to provide high-risk communities with actionable steps to bolster their cybersecurity defenses
π NIST Confusion Continues as Cyber Pros Complain CVE Uploads Stalled π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Several software security experts have told Infosecurity that no new vulnerabilities have been added to the US National Vulnerability Database NVD since May 9.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
NIST Confusion Continues as Cyber Pros Complain CVE Uploads Stalled
Several software security experts have told Infosecurity that no new vulnerabilities have been added to the US NVD since May 9
𧨠How Scammers Hijack Your Instagram π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
Authored by Vignesh Dhatchanamoorthy, Rachana S Instagram, with its vast user base and dynamic platform, has become a hotbed for... The post How Scammers Hijack Your Instagram appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
How Scammers Hijack Your Instagram | McAfee Blog
Authored by Vignesh Dhatchanamoorthy, Rachana S Instagram, with its vast user base and dynamic platform, has become a hotbed for scams and fraudulent
π΅οΈββοΈ Dangerous Google Chrome Zero-Day Allows Sandbox Escape π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Exploit code is circulating for CVE20244761, disclosed less than a week after a similar security vulnerability was disclosed as being used in the wild.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Dangerous Google Chrome Zero-Day Allows Sandbox Escape
Exploit code is circulating for CVE-2024-4761, disclosed less than a week after a similar security vulnerability was disclosed as being used in the wild.
π Data Breaches in US Schools Exposed 37.6M Records π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Comparitech said 2023 was a record year for breaches with 954 reported, up from 139 in 2022 and 783 in 2021.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Data Breaches in US Schools Exposed 37.6M Records
Comparitech said 2023 was a record year for breaches with 954 reported, up from 139 in 2022 and 783 in 2021
π¦
The Overlapping Cyber Strategies of Transparent Tribe and SideCopy Against India π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways Cyble Research and Intelligence Labs CRIL recently uncovered a malicious website associated with the SideCopy APT group. Since 2019, the SideCopy threat group has been actively targeting South Asian nations, with a particular focus on India. Analysis of the malware website revealed a collection of files utilized in executing the malware campaign, indicating a sophisticated and coordinated effort by the threat actors. In this campaign, CRIL observed SideCopy targeting university students, as evidenced by the lure document. Notably, Transparent Tribe is known for targeting universities, suggesting a potential intersection between these two APT groups. The initial infection vector appears to be spam emails containing hyperlinks to a malicious website hosting...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Cyber Strategies Of Transparent Tribe & SideCopy Vs India
Explore Cyble's insights on the Babylon RAT campaign targeting Malaysian politicians and government officials through malicious ISO files.
π¦Ώ 7 Best Cloud Security Posture Management (CSPM) Tools for 2024 π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
What is the best CSPM tool for your business? Use our guide to review our picks for the best cloud security posture management CSPM tools.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Best CSPM Tools 2024: Top Cloud Security Solutions Compared
We've revisited the best CSPM tools for 2024, comparing updated features, pricing, and integrations to help secure your cloud environments effectively.
π§ Threat intelligence to protect vulnerable communities π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Key members of civil societyincluding journalists, political activists and human rights advocateshave long been in the cyber crosshairs of wellresourced nationstate threat actors but have scarce resources to protect themselves from cyber threats. On May 14, 2024, the Cybersecurity and Infrastructure Security Agency CISA released a HighRisk Communities Protection HRCP report developed through the Joint The post Threat intelligence to protect vulnerable communities appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
Threat intelligence to protect vulnerable communities
In this day and age, everyone needs to protect themselves against various cyber threats. For key members of civil society, CISA has released a High-Risk Communities Protection (HRCP) report to provide intel and guidance.
π΅οΈββοΈ Singapore Cybersecurity Update Puts Cloud Providers on Notice π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The nation amends its Cybersecurity Act, giving its primary cybersecurity agency more power to regulate critical infrastructure and third parties, and requiring cyber incidents be reported.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Singapore Cybersecurity Update Puts Cloud Providers on Notice
The nation amends its Cybersecurity Act, giving its primary cybersecurity agency more power to regulate critical infrastructure and third parties, and requiring cyber incidents be reported.
π΅οΈββοΈ Microsoft Windows DWM Zero-Day Poised for Mass Exploit π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
CVE202430051, under active exploit, is the most concerning out of this month's Patch Tuesday offerings, and already being abused by several QakBot actors.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Microsoft Windows DWM Zero-Day Poised for Mass Exploit
CVE-2024-30051 is the most concerning out of this month's Patch Tuesday offerings, and is already under active exploit by several QakBot actors.
π΅οΈββοΈ Unprotected Session Tokens Can Undermine FIDO2 Security π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
While the protocol has made passwordless authentication a reality, tokenbinding is key to prevent against token theft and reuse, security vendor says.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Unprotected Session Tokens Can Undermine FIDO2 Security
While the protocol has made passwordless authentication a reality, token-binding is key to prevent against token theft and reuse, security vendor says.
π΅οΈββοΈ As the FBI Closes In, Scattered Spider Attacks Finance, Insurance Orgs π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Scattered Spider is as active as ever, despite authorities claiming that they're close to nailing its members.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
As the FBI Closes In, Scattered Spider Attacks Finance, Insurance Orgs
Scattered Spider is as active as ever, despite authorities claiming that they're close to nailing its members.
π΅οΈββοΈ A Cost-Effective Encryption Strategy Starts With Key Management π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Key management is more complex than ever. Your choices are Rely on your cloud provider or manage keys locally Encrypt only the most critical data Or encrypt everything.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
A Cost-Effective Encryption Strategy Starts With Key Management
Key management is more complex than ever. Your choices are to rely on your cloud provider or manage keys locally, encrypt only the most critical data, or encrypt everything.
βοΈ Patch Tuesday, May 2024 Edition βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Microsoft today released updates to fix more than 60 security holes in Windows computers and supported software, including two "zeroday" vulnerabilities in Windows that are already being exploited in active attacks. There are also important security patches available for macOS and Adobe users, and for the Chrome Web browser, which just patched its own zeroday flaw.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Patch Tuesday, May 2024 Edition
Microsoft today released updates to fix more than 60 security holes in Windows computers and supported software, including two "zero-day" vulnerabilities in Windows that are already being exploited in active attacks. There are also important security patchesβ¦
π ESET APT Activity Report Q4 2023βQ1 2024 π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
ESET APT Activity Report Q4 2023βQ1 2024
This report summarizes notable activities of selected advanced persistent threat (APT) groups that were documented by ESET researchers from October 2023 until the end of March 2024.
π Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
One of the most advanced serverside malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Ebury is alive but unseen: 400k Linux servers compromised for cryptotheft and financial gain
One of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft.