πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Does a VPN Slow Down Your Internet Speed? 🦿

Can a VPN slow down your internet? Find out how VPNs can impact your internet speed with our article.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover 11 Security Flaws in GE HealthCare Ultrasound Machines πŸ–‹οΈ

Security researchers have disclosed almost a dozen security flaws impacting the GE HealthCare Vivid Ultrasound product family that could be exploited by malicious actors to tamper with patient data and even install ransomware under certain circumstances. "The impacts enabled by these flaws are manifold from the implant of ransomware on the ultrasound machine to the access and manipulation of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Patch Now: Another Google Zero-Day Under Exploit in the Wild πŸ•΅οΈβ€β™‚οΈ

Google has rolled an emergency patch for CVE20244947, the third Chrome zeroday it's addressed in the past week.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISO Confidence in AI Security Grows as GenAI Adoption Rises πŸ“”

Nearly six out of ten surveyed ClubCISO members are confident AI is used securely in their organizations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FCC Reveals 'Royal Tiger' Robocall Campaign πŸ•΅οΈβ€β™‚οΈ

In a firstever move, the commission's enforcement bureau has high hopes that official classification will allow law enforcement partners to better combat these kinds of threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Fall of the National Vulnerability Database πŸ•΅οΈβ€β™‚οΈ

Since its inception, three key factors have affected the NVD's ability to classify security concerns and what we're experiencing now is the result.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Windows Quick Assist Anchors Black Basta Ransomware Gambit πŸ•΅οΈβ€β™‚οΈ

When abused by threat actors with sophisticated socialengineering chops, remoteaccess tools demand that enterprises remain sharp in both defense strategy and employeeawareness training.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Cisco’s Splunk Acquisition Should Help Security Pros See Threats Sooner in Australia and New Zealand 🦿

Ciscos Splunk acquisition was finalised in March 2024. Splunks Craig Bates says the combined offering could enhance observability and put data to work for security professionals in an age of AI threat defence.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Wireshark Analyzer 4.2.5 πŸ› 

Wireshark is a GTKbased network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercialquality analyzer for Unix and Win32 and to give Wireshark features that are missing from closedsource sniffers. This is the source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Packet Fence 13.2.0 πŸ› 

PacketFence is a network access control NAC system. It is actively maintained and has been deployed in numerous largescale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NACoriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registrationbased and scheduled vulnerability scans.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  SIPPTS 4.0 πŸ› 

Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. It is programmed in Python script and it allows us to check the security of a VoIP server using SIP protocol, over UDP, TCP and TLS protocols.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign πŸ–‹οΈ

The North Korealinked Kimsuky hacking group has been attributed to a new social engineering attack that employs fictitious Facebook accounts to targets via Messenger and ultimately delivers malware. "The threat actor created a Facebook account with a fake identity disguised as a public official working in the North Korean human rights field," South Korean cybersecurity company Genians.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Artificial Intelligence Threatens Global Employment πŸ‘½

The International Monetary Fund IMF Managing Director, Kristalina Georgieva, has sounded the alarm about the potentially disruptive impact of artificial intelligence AI on the global workforce. Speaking at a conference in London, Georgieva predicted a coming tsunami of job losses, driven by the rapid advancement of AI technologies. Georgievas warning.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 53,000 Employees' Social Security Numbers Exposed in Nissan Data Breach πŸ“”

Car manufacturer Nissan revealed that over 53,000 of its North America employees had their social security numbers accessed by a ransomware attacker.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SugarGh0st RAT Variant Used in Targeted AI Industry Attacks πŸ“”

Proofpoint said the attackers modified registry key names for persistence.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Windows Quick Assist Exploited in Ransomware Attacks πŸ“”

Microsoft warned Storm1811 started vishing attacks in April to gain access to target devices.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… New Antidot Android Banking Trojan Masquerading as Fake Google Play Updates πŸ¦…

Key Takeaways  A new Android Banking Trojan, Antidot, masquerading as a Google Play update application, displays fake Google Play update pages in multiple languages, indicating a wide range of targets.   Antidot incorporates a range of malicious features, including overlay attacks and keylogging, allowing it to compromise devices and harvest sensitive information.  Antidot maintains communication with its Command and Control CC server through WebSocket, enabling realtime, bidirectional interaction for executing commands.  The malware executes a wide range of commands received from the CC server, including collecting SMS messages, initiating USSD requests, and even remotely controlling device features such as the camera and screen lock.  Antidot implemented VNC using MediaPr...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks πŸ–‹οΈ

Researchers have discovered a new security vulnerability stemming from a design flaw in the IEEE 802.11 WiFi standard that tricks victims into connecting to a less secure wireless network and eavesdrop on their network traffic. The SSID Confusion attack, tracked as CVE202352424, impacts all operating systems and WiFi clients, including home and mesh networks that are based on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Asian Threat Actors Use New Techniques to Attack Familiar Targets πŸ•΅οΈβ€β™‚οΈ

Generative AI and software supply chain attacks are being exploited to disrupt, manipulate, and steal.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ GE Ultrasound Gear Riddled With Bugs, Open to Ransomware & Data Theft πŸ•΅οΈβ€β™‚οΈ

Thankfully, GE ultrasounds aren't Internetfacing. Exploiting most of the bugs to cause serious damage to patients would require physical device access.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Santander Falls Victim to Data Breach Involving Third-Party Provider πŸ•΅οΈβ€β™‚οΈ

The company reports that customers based in Chile, Spain, and Uruguay were the primary victims of the breach, alongside some former employees of the global bank.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity