πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” 44% of Cybersecurity Professionals Struggle with Regulatory Compliance πŸ“”

Infosecurity Europe research highlights significant challenges faced by organisations in staying up to speed with increasing compliance requirements.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ VMware Patches Severe Security Flaws in Workstation and Fusion Products πŸ–‹οΈ

Multiple security flaws have been disclosed in VMware Workstation and Fusion products that could be exploited by threat actors to access sensitive information, trigger a denialofservice DoS condition, and execute code under certain circumstances. The four vulnerabilities impact Workstation versions 17.x and Fusion versions 13.x, with fixes available in version 17.5.2 and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ebury Botnet Operators Diversify with Financial and Crypto Theft πŸ“”

The 15yearold Ebury botnet is more active than ever, as ESET found 400,000 Linux servers compromised for cryptocurrency theft and financial gain.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA and Partners Unveil Cybersecurity Guide For Civil Society Groups πŸ“”

The guide is designed to provide highrisk communities with actionable steps to bolster their cybersecurity defenses.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NIST Confusion Continues as Cyber Pros Complain CVE Uploads Stalled πŸ“”

Several software security experts have told Infosecurity that no new vulnerabilities have been added to the US National Vulnerability Database NVD since May 9.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How Scammers Hijack Your Instagram 🧨

Authored by Vignesh Dhatchanamoorthy, Rachana S Instagram, with its vast user base and dynamic platform, has become a hotbed for... The post How Scammers Hijack Your Instagram appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dangerous Google Chrome Zero-Day Allows Sandbox Escape πŸ•΅οΈβ€β™‚οΈ

Exploit code is circulating for CVE20244761, disclosed less than a week after a similar security vulnerability was disclosed as being used in the wild.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Data Breaches in US Schools Exposed 37.6M Records πŸ“”

Comparitech said 2023 was a record year for breaches with 954 reported, up from 139 in 2022 and 783 in 2021.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Overlapping Cyber Strategies of Transparent Tribe and SideCopy Against India πŸ¦…

Key Takeaways  Cyble Research and Intelligence Labs CRIL recently uncovered a malicious website associated with the SideCopy APT group.  Since 2019, the SideCopy threat group has been actively targeting South Asian nations, with a particular focus on India.  Analysis of the malware website revealed a collection of files utilized in executing the malware campaign, indicating a sophisticated and coordinated effort by the threat actors.  In this campaign, CRIL observed SideCopy targeting university students, as evidenced by the lure document. Notably, Transparent Tribe is known for targeting universities, suggesting a potential intersection between these two APT groups.  The initial infection vector appears to be spam emails containing hyperlinks to a malicious website hosting...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 7 Best Cloud Security Posture Management (CSPM) Tools for 2024 🦿

What is the best CSPM tool for your business? Use our guide to review our picks for the best cloud security posture management CSPM tools.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Threat intelligence to protect vulnerable communities 🧠

Key members of civil societyincluding journalists, political activists and human rights advocateshave long been in the cyber crosshairs of wellresourced nationstate threat actors but have scarce resources to protect themselves from cyber threats. On May 14, 2024, the Cybersecurity and Infrastructure Security Agency CISA released a HighRisk Communities Protection HRCP report developed through the Joint The post Threat intelligence to protect vulnerable communities appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Singapore Cybersecurity Update Puts Cloud Providers on Notice πŸ•΅οΈβ€β™‚οΈ

The nation amends its Cybersecurity Act, giving its primary cybersecurity agency more power to regulate critical infrastructure and third parties, and requiring cyber incidents be reported.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Windows DWM Zero-Day Poised for Mass Exploit πŸ•΅οΈβ€β™‚οΈ

CVE202430051, under active exploit, is the most concerning out of this month's Patch Tuesday offerings, and already being abused by several QakBot actors.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Unprotected Session Tokens Can Undermine FIDO2 Security πŸ•΅οΈβ€β™‚οΈ

While the protocol has made passwordless authentication a reality, tokenbinding is key to prevent against token theft and reuse, security vendor says.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ As the FBI Closes In, Scattered Spider Attacks Finance, Insurance Orgs πŸ•΅οΈβ€β™‚οΈ

Scattered Spider is as active as ever, despite authorities claiming that they're close to nailing its members.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ A Cost-Effective Encryption Strategy Starts With Key Management πŸ•΅οΈβ€β™‚οΈ

Key management is more complex than ever. Your choices are Rely on your cloud provider or manage keys locally Encrypt only the most critical data Or encrypt everything.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Patch Tuesday, May 2024 Edition β™ŸοΈ

Microsoft today released updates to fix more than 60 security holes in Windows computers and supported software, including two "zeroday" vulnerabilities in Windows that are already being exploited in active attacks. There are also important security patches available for macOS and Adobe users, and for the Chrome Web browser, which just patched its own zeroday flaw.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ ESET APT Activity Report Q4 2023–Q1 2024 πŸš€

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain πŸš€

One of the most advanced serverside malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Dutch Court Sentences Tornado Cash Co-Founder to 5 Years in Prison for Money Laundering πŸ–‹οΈ

A Dutch court on Tuesday sentenced one of the cofounders of the nowsanctioned Tornado Cash cryptocurrency mixer service to 5 years and 4 months in prison. While the name of the defendant was redacted in the verdict, it's known that Alexey Pertsev, a 31yearold Russian national, has been awaiting trial in the Netherlands on money laundering charges.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days πŸ–‹οΈ

Microsoft has addressed a total of 61 new security flaws in its software as part of its Patch Tuesday updates for May 2024, including two zerodays which have been actively exploited in the wild. Of the 61 flaws, one is rated Critical, 59 are rated Important, and one is rated Moderate in severity. This is in addition to 30 vulnerabilities.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity