๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
26K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ•ต๏ธโ€โ™‚๏ธ CISOs and Their Companies Struggle to Comply With SEC Disclosure Rules ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Most companies still can't determine whether a breach is material within the four days mandated by the SEC, skewing incident response.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ 400K Linux Servers Recruited by Resurrected Ebury Botnet ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Cryptocurrency theft and financial fraud are the new M.O. of the 15yearold malware operation that has hit organizations around the globe.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ›  Zeek 6.0.4 ๐Ÿ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyberinfrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and openscience communities. This is the source code release.

๐Ÿ“– Read more.

๐Ÿ”— Via "Packet Storm - Tools"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking ๐Ÿ–‹๏ธ

The cryptojacking group known as Kinsing has demonstrated its ability to continuously evolve and adapt, proving to be a persistent threat by swiftly integrating newly disclosed vulnerabilities to exploit arsenal and expand its botnet. The findings come from cloud security firm Aqua, which described the threat actor as actively orchestrating illicit cryptocurrency mining.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿงจ How to Protect Yourself on Social Networks ๐Ÿงจ

There are now over 5 billion active social media users worldwide, representing 62.3 of the global population. While social networks... The post How to Protect Yourself on Social Networks appeared first on McAfee Blog.

๐Ÿ“– Read more.

๐Ÿ”— Via "McAfee"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ SEC Adds New Incident Response Rules for Financial Sector ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Financial firms covered under new regulations will be required to establish a clear response and communications plan for customer data breaches.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ 10 Ways a Digital Shield Protects Apps and APIs ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Layers of protection can bring defenseindepth practices to distributed clouds and other modern network architectures.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ Intel Discloses Max Severity Bug in Its AI Model Compression Software ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The improper input validation issue in Intel Neural Compressor enables remote attackers to execute arbitrary code on affected systems.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ‘1
๐Ÿ•ต๏ธโ€โ™‚๏ธ CISO Corner: What Cyber Labor Shortage?; Trouble Meeting SEC Disclosure Deadlines ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included DR's podcast on the CISO the SEC breaking down CISA's Secure by Design Pledge Singapore puts cloud providers on notice.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ CISOs Grapple With IBM's Unexpected Cybersecurity Software Exit ๐Ÿ•ต๏ธโ€โ™‚๏ธ

IBM's abrupt divestiture of QRadar SaaS underscores the consolidation of SIEM, XDR, and AI technologies into unified platforms.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿš€ The who, where, and how of APT attacks โ€“ Week in security with Tony Anscombe ๐Ÿš€

This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape.

๐Ÿ“– Read more.

๐Ÿ”— Via "ESET - WeLiveSecurity"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide ๐Ÿ–‹๏ธ

The threat actors behind the Windowsbased Grandoreiro banking trojan have returned in a global campaign since March 2024 following a law enforcement takedown in January. The largescale phishing attacks, likely facilitated by other cybercriminals via a malwareasaservice MaaS model, target over 1,500 banks across the world, spanning more than 60 countries in Central and South.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Chinese Nationals Arrested for Laundering $73 Million in Pig Butchering Crypto Scam ๐Ÿ–‹๏ธ

The U.S. Department of Justice DoJ has charged two arrested Chinese nationals for allegedly orchestrating a pig butchering scam that laundered at least 73 million from victims through shell companies. The individuals, Daren Li, 41, and Yicheng Zhang, 38, were arrested in Atlanta and Los Angeles on April 12 and May 16, respectively. The foreign nationals have been "charged for leading a scheme.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Latrodectus Malware Loader Emerges as IcedID's Successor in Phishing Campaigns ๐Ÿ–‹๏ธ

Cybersecurity researchers have observed a spike in email phishing campaigns starting early March 2024 that delivers Latrodectus, a nascent malware loader believed to be the successor to the IcedID malware. "These campaigns typically involve a recognizable infection chain involving oversized JavaScript files that utilize WMI's ability to invoke msiexec.exe and install a remotelyhosted MSI.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Chinese Duo Indicted For Laundering $73m in Pig Butchering Case ๐Ÿ“”

Two Chinese nationals have been charged with laundering over 73m in a pig butchering scheme.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ‘1
๐Ÿ“ข FBI seizes BreachForums infrastructure โ€” but successor sites are already popping up ๐Ÿ“ข

In the latest win for law enforcement, BreachForums has been taken down in an FBI operation but alternatives are already popping up.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆฟ Antivirus Policy ๐Ÿฆฟ

Antivirus software is critical to ensure information security of organizational networks and resources. By establishing an antivirus policy, organizations can quickly identify and address malware and virus threats, as well as detect and appropriately respond to incidents. The purpose of this Antivirus Policy, written by Madeline Clarke for TechRepublic Premium, is to provide guidelines for ...

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Grandoreiro Banking Trojan is Back With Major Updates ๐Ÿ“”

The malwareasaservice Grandoreiro Trojan is now targeting 1500 global banks, says IBM.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆ… Tiny BackDoor Goes Undetected โ€“ Suspected Turla leveraging MSBuild to Evade detection ๐Ÿฆ…

Key Takeaways  Cyble Research and Intelligence Labs CRIL observed an interesting campaign that utilized malicious LNK files, which could potentially be distributed via spam email.  The Threat Actor TA behind this campaign uses human rights seminar invitations and public advisories as a lure to infect users with a malicious payload.   This campaign highlights the attackers' sophistication by embedding lure PDFs and MSBuild project files within the .LNK files for seamless execution.  The TA executes the project files using the Microsoft Build Engine MSBuild to deliver a stealthy, fileless final payload.  The final payload acts as a backdoor, enabling TAs to execute various commands and take control of the infected system.  Our analysis indicates that the final payload exhib...

๐Ÿ“– Read more.

๐Ÿ”— Via "CYBLE"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Cyber Criminals Exploit GitHub and FileZilla to Deliver Cocktail Malware ๐Ÿ–‹๏ธ

A "multifaceted campaign" has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer malware and banking trojans such as Atomic aka AMOS, Vidar, Lumma aka LummaC2, and Octo by impersonating credible software like 1Password, Bartender 5, and Pixelmator Pro. "The presence of multiple malware variants suggests a broad crossplatform targeting.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks ๐Ÿ–‹๏ธ

All developers want to create secure and dependable software. They should feel proud to release their code with the full confidence they did not introduce any weaknesses or antipatterns into their applications. Unfortunately, developers are not writing their own code for the most part these days. 96 of all software contains some opensource components, and opensource components make.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity