πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Students Spot Washing Machine App Flaw That Gives Out Free Cycles πŸ•΅οΈβ€β™‚οΈ

UCSC students say that after reporting the bug months ago they're still able to rack up unlimited free wash loads at their local laundromat.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical Bug Allows DoS, RCE, Data Leaks in All Major Cloud Platforms πŸ•΅οΈβ€β™‚οΈ

An onbydefault endpoint in ubiquitous logging service Fluent Bit contains an oversight that hackers can toy with to rattle most any cloud environment.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CyberArk Picks Up Machine Identity Manager Venafi For $1.54B πŸ•΅οΈβ€β™‚οΈ

The acquisition gives CyberArk new IoT identity and certificate lifecycle management, cryptographic codesigning, and other services to secure the enterprise cloud.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Google Pitches Workspace as Microsoft Email Alternative Citing CSRB Report πŸ•΅οΈβ€β™‚οΈ

The new Secure Alternative Program from Google aims to entice customers away from Exchange Online and break Microsoft's dominance in enterprise.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ•΅οΈβ€β™‚οΈ DoJ Shakes Up North Korea's Widespread IT Freelance Scam Operation πŸ•΅οΈβ€β™‚οΈ

Fraudsters based in the US and Europe indicted for helping North Korea's nationstate groups establish fake freelancer identities and evade sanctions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ "Linguistic Lumberjack" Vulnerability Discovered in Popular Logging Utility Fluent Bit πŸ–‹οΈ

Cybersecurity researchers have discovered a critical security flaw in a popular logging and metrics utility called Fluent Bit that could be exploited to achieve denialofservice DoS, information disclosure, or remote code execution. The vulnerability, tracked as CVE20244323, has been codenamed Linguistic Lumberjack by Tenable Research. It impacts versions from 2.0.7 through.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Google says Microsoft can’t be trusted after email security blunders πŸ“’

Google has fired a broadside at Microsoft amid concerns over the tech giant's repeated security blunders.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ NextGen Healthcare Mirth Connect Under Attack - CISA Issues Urgent Warning πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Monday added a security flaw impacting NextGen Healthcare Mirth Connect to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. The flaw, tracked as CVE202343208 CVSS score NA, concerns a case of unauthenticated remote code execution arising from an incomplete.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Authorities Arrest $100m Incognito Drugs Market Suspect πŸ“”

US officials say the suspected owner of the prolific Incognito dark web drugs marketplace has been arrested.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Critical Fluent Bit Bug Impacts All Major Cloud Platforms πŸ“”

A newly discovered flaw in open source utility Fluent Bit could enable widespread DoS, RCE and information leakage.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Windows 11 to Deprecate NTLM, Add AI-Powered App Controls and Security Defenses πŸ–‹οΈ

 Microsoft on Monday confirmed its plans to deprecate NT LAN Manager NTLM in Windows 11 in the second half of the year, as it announced a slew of new security measures to harden the widelyused desktop operating system. "Deprecating NTLM has been a huge ask from our security community as it will strengthen user authentication, and deprecation is planned in the second half of 2024," the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How to Install a VPN on Your Router 🦿

Trying to figure out how to install a VPN on your router? Read our stepbystep guide to help you get started.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox πŸ–‹οΈ

A critical security flaw has been disclosed in the llamacpppython Python package that could be exploited by threat actors to achieve arbitrary code execution. Tracked as CVE202434359 CVSS score 9.7, the flaw has been codenamed Llama Drama by software supply chain security firm Checkmarx. "If exploited, it could allow attackers to execute arbitrary code on your system,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 60% of Network Security Appliance Flaws Exploited as Zero Days πŸ“”

Rapid7 found there were more mass compromise events arose from zeroday vulnerabilities than from nday vulnerabilities in 2023.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OpenSSF Siren to Share Threat Intelligence for Open Source Software πŸ•΅οΈβ€β™‚οΈ

The Siren email mailing list will focus on operational impact and response and act as a central location to provide information about threats and necessary postdisclosure activities.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Five Core Tenets Of Highly Effective DevSecOps Practices πŸ–‹οΈ

One of the enduring challenges of building modern applications is to make them more secure without disrupting highvelocity DevOps processes or degrading the developer experience. Todays cyber threat landscape is rife with sophisticated attacks aimed at all different parts of the software supply chain and the urgency for softwareproducing organizations to adopt DevSecOps practices that deeply.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Detecting the Invisible: UnderDefense Uncovers macOS Password Stealers 🌊

For many users, macOS has long been considered a secure haven in the world of cybersecurity. However, recent discoveries by our team at UnderDefense paint a concerning picture. We have recently uncovered a sophisticated strain of passwordstealing macOS malware, capable of bypassing even popular antivirus software. This revelation highlights a critical truth no system is The post Detecting the Invisible UnderDefense Uncovers macOS Password Stealers appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Working in the security clearance world: How security clearances impact jobs 🧠

We recently published an article about the importance of security clearances for roles across various sectors, particularly those associated with national security and defense. But obtaining a clearance is only part of the journey. Maintaining and potentially expanding your clearance over time requires continued diligence and adherence to stringent guidelines. This brief explainer discusses the The post Working in the security clearance world How security clearances impact jobs appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure πŸ–‹οΈ

The persistent threat actors behind the SolarMarker informationstealing malware have established a multitiered infrastructure to complicate law enforcement takedown efforts, new findings from Recorded Future show. "The core of SolarMarker's operations is its layered infrastructure, which consists of at least two clusters a primary one for active operations and a secondary one likely.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🧨 What is Artificial Intelligence? 🧨

At the beginning of the year, the Associated Press described artificial intelligence AI as easily the biggest buzzword for world... The post What is Artificial Intelligence? appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Can Cybersecurity Be a Unifying Factor in Digital Trade Negotiations? πŸ•΅οΈβ€β™‚οΈ

As we face continued headwinds on provisions like data flows and ecustoms duties, further progress is both needed and achievable in digital trade policy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity