πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Windows Quick Assist Anchors Black Basta Ransomware Gambit πŸ•΅οΈβ€β™‚οΈ

When abused by threat actors with sophisticated socialengineering chops, remoteaccess tools demand that enterprises remain sharp in both defense strategy and employeeawareness training.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Cisco’s Splunk Acquisition Should Help Security Pros See Threats Sooner in Australia and New Zealand 🦿

Ciscos Splunk acquisition was finalised in March 2024. Splunks Craig Bates says the combined offering could enhance observability and put data to work for security professionals in an age of AI threat defence.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Wireshark Analyzer 4.2.5 πŸ› 

Wireshark is a GTKbased network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercialquality analyzer for Unix and Win32 and to give Wireshark features that are missing from closedsource sniffers. This is the source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Packet Fence 13.2.0 πŸ› 

PacketFence is a network access control NAC system. It is actively maintained and has been deployed in numerous largescale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NACoriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registrationbased and scheduled vulnerability scans.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  SIPPTS 4.0 πŸ› 

Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. It is programmed in Python script and it allows us to check the security of a VoIP server using SIP protocol, over UDP, TCP and TLS protocols.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign πŸ–‹οΈ

The North Korealinked Kimsuky hacking group has been attributed to a new social engineering attack that employs fictitious Facebook accounts to targets via Messenger and ultimately delivers malware. "The threat actor created a Facebook account with a fake identity disguised as a public official working in the North Korean human rights field," South Korean cybersecurity company Genians.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Artificial Intelligence Threatens Global Employment πŸ‘½

The International Monetary Fund IMF Managing Director, Kristalina Georgieva, has sounded the alarm about the potentially disruptive impact of artificial intelligence AI on the global workforce. Speaking at a conference in London, Georgieva predicted a coming tsunami of job losses, driven by the rapid advancement of AI technologies. Georgievas warning.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 53,000 Employees' Social Security Numbers Exposed in Nissan Data Breach πŸ“”

Car manufacturer Nissan revealed that over 53,000 of its North America employees had their social security numbers accessed by a ransomware attacker.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SugarGh0st RAT Variant Used in Targeted AI Industry Attacks πŸ“”

Proofpoint said the attackers modified registry key names for persistence.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Windows Quick Assist Exploited in Ransomware Attacks πŸ“”

Microsoft warned Storm1811 started vishing attacks in April to gain access to target devices.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… New Antidot Android Banking Trojan Masquerading as Fake Google Play Updates πŸ¦…

Key Takeaways  A new Android Banking Trojan, Antidot, masquerading as a Google Play update application, displays fake Google Play update pages in multiple languages, indicating a wide range of targets.   Antidot incorporates a range of malicious features, including overlay attacks and keylogging, allowing it to compromise devices and harvest sensitive information.  Antidot maintains communication with its Command and Control CC server through WebSocket, enabling realtime, bidirectional interaction for executing commands.  The malware executes a wide range of commands received from the CC server, including collecting SMS messages, initiating USSD requests, and even remotely controlling device features such as the camera and screen lock.  Antidot implemented VNC using MediaPr...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks πŸ–‹οΈ

Researchers have discovered a new security vulnerability stemming from a design flaw in the IEEE 802.11 WiFi standard that tricks victims into connecting to a less secure wireless network and eavesdrop on their network traffic. The SSID Confusion attack, tracked as CVE202352424, impacts all operating systems and WiFi clients, including home and mesh networks that are based on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Asian Threat Actors Use New Techniques to Attack Familiar Targets πŸ•΅οΈβ€β™‚οΈ

Generative AI and software supply chain attacks are being exploited to disrupt, manipulate, and steal.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ GE Ultrasound Gear Riddled With Bugs, Open to Ransomware & Data Theft πŸ•΅οΈβ€β™‚οΈ

Thankfully, GE ultrasounds aren't Internetfacing. Exploiting most of the bugs to cause serious damage to patients would require physical device access.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Santander Falls Victim to Data Breach Involving Third-Party Provider πŸ•΅οΈβ€β™‚οΈ

The company reports that customers based in Chile, Spain, and Uruguay were the primary victims of the breach, alongside some former employees of the global bank.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Addressing the Cybersecurity Vendor Ecosystem Disconnect πŸ•΅οΈβ€β™‚οΈ

How security teams can bridge the gap between shortterm profits and longterm business needs.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Daily Leaks – Canada & China πŸ‘½

In a Telegram group, two important data advertised by threat actors. The first one is 13 million pieces of Canadian homeowners PII. It is claimed that the data includes first name, last name, street Address, address 2, city, province, postal code, phone, income, age, sex, home ownership, language, family status,.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are targeting Windows Quick Assist remote desktop features to deploy ransomware πŸ“’

Remote access tools such as Windows Quick Assist continue to be a key target for threat actors, with Microsoft issuing another warning about the risk of ransomware attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Warns of Actively Exploited D-Link Router Vulnerabilities - Patch Now πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday added two security flaws impacting DLink routers to its Known Exploited Vulnerabilities KEV catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows CVE2014100005  A crosssite request forgery CSRF vulnerability impacting DLink DIR600 routers that allows an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Why siloed thinking could be undermining your zero trust strategy πŸ“’

Despite the majority of businesses now moving towards a zero trust strategy, a siloed view of security means many are unable to fully embrace everything the technology has to offer.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Restore Damaged Files & Save Your Business for Only $50 🦿

Regardless of how badly your files, or their formats, are damaged, EaseUS Fixo can restore your office files, videos and photos, even in batches. Get a lifetime subscription for 49.99 at TechRepublic Academy.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity