πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ 3 Tips for Becoming the Champion of Your Organization's AI Committee πŸ•΅οΈβ€β™‚οΈ

CISOs are now considered part of the organizational executive leadership and have both the responsibility and the opportunity to drive not just security but business success.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Philippines National Police Cyberattack πŸ‘½

A threat actor claimed that they have data from Philippines National Police, and advertised the data in breachforums.vc. It is claimed that the data is belonging to Philippines National Police Logistics Data Information and Management System. Some sample data also shared by the threat actor. Breachforums.vc is an Englishlanguage forum.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Christie's response to cyber attack underscores the fine art of resilience πŸ“’

Christies suffered a technology security incident that shut down its website ahead of what was projected to be a lucrative week of sales.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ D-Link Routers Vulnerable to Takeover Via Exploit for Zero-Day πŸ•΅οΈβ€β™‚οΈ

A vulnerability in the HNAP login request protocol that affects a family of devices gives unauthenticated users root access for command execution.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cyber-Attack Disrupts Christie’s $840M Art Auctions πŸ“”

Despite this setback, the auction house said bids can still be placed by phone and inperson.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” PDF Exploitation Targets Foxit Reader Users πŸ“”

CPR said exploit builders in .NET and Python have been employed to deploy this malware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Launches AI-Powered Theft and Data Protection Features for Android Devices πŸ–‹οΈ

Google has announced a slew of privacy and security features in Android, including a suite of advanced protection features to help secure users' devices and data in the event of a theft. These features aim to help protect data before, during and after a theft attempt, the tech giant said, adding they are expected to be available via an update to Google Play services for devices running.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Android 15 Rolls Out Advanced Features to Protect Users from Scams and Malicious Apps πŸ–‹οΈ

Google is unveiling a set of new features in Android 15 to prevent malicious apps installed on the device from capturing sensitive data. This constitutes an update to the Play Integrity API that thirdparty app developers can take advantage of to secure their applications against malware. "Developers can check if there are other apps running that could be capturing the screen, creating.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity πŸ–‹οΈ

Law enforcement agencies have officially seized control of the notorious BreachForums platform, an online bazaar known for peddling stolen data, for the second time within a year. The website "breachforums.st" has been replaced by a seizure banner stating the clearnet cybercrime forum is under the control of the Federal Bureau of Investigation FBI.  The operation is the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1🀬1
🧨 Why You Need a Personal VPN 🧨

It used to be the case that only businesses used virtual private networks VPNs to connect securely to the internet... The post Why You Need a Personal VPN appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Scammers Fake DocuSign Templates to Blackmail & Steal From Companies πŸ•΅οΈβ€β™‚οΈ

Cybercriminals are trafficking DocuSign assets that allow for easy extortion and business email compromise.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Flaw in Wi-Fi Standard Can Enable SSID Confusion Attacks πŸ•΅οΈβ€β™‚οΈ

Attackers can exploit the issue to trick users into connecting to insecure networks, but it works only under specific conditions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Palo Alto Networks and IBM to Jointly Provide AI-Powered Security Offerings πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Notice of a Data Breach πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Alkira Raises $100M in Series C Funding to Simplify, Secure and Scale Critical Network Infrastructure πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks πŸ–‹οΈ

The Microsoft Threat Intelligence team said it has observed a threat it tracks under the name Storm1811 abusing the client management tool Quick Assist to target users in social engineering attacks. "Storm1811 is a financially motivated cybercriminal group known to deploy Black Basta ransomware," the company said in a report published on May 15, 2024. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability πŸ–‹οΈ

Google has rolled out fixes to address a set of nine security issues in its Chrome browser, including a new zeroday that has been exploited in the wild. Assigned the CVE identifier CVE20244947, the vulnerability relates to a type confusion bug in the V8 JavaScript and WebAssembly engine. It was reported by Kaspersky researchers Vasily Berdnikov and Boris.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ To the Moon and back(doors): Lunar landing in diplomatic missions πŸš€

ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Nigeria Halts Cybersecurity Tax After Public Outrage πŸ•΅οΈβ€β™‚οΈ

In the midst of an economy struggling with soaring inflation, the Nigerian government paused plans to place a levy on domestic transactions that was aimed at enhancing cybersecurity.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” BreachForums Hacking Marketplace Taken Down Again πŸ“”

The FBI claims to have seized the domain and servers of hacking forum BreachForums.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” UK Lags Europe on Exploited Vulnerability Remediation πŸ“”

UK organizations are less likely than their European peers to have known exploited bugs but take longer to fix them.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity