πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Critical Fluent Bit Bug Impacts All Major Cloud Platforms πŸ“”

A newly discovered flaw in open source utility Fluent Bit could enable widespread DoS, RCE and information leakage.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Windows 11 to Deprecate NTLM, Add AI-Powered App Controls and Security Defenses πŸ–‹οΈ

 Microsoft on Monday confirmed its plans to deprecate NT LAN Manager NTLM in Windows 11 in the second half of the year, as it announced a slew of new security measures to harden the widelyused desktop operating system. "Deprecating NTLM has been a huge ask from our security community as it will strengthen user authentication, and deprecation is planned in the second half of 2024," the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How to Install a VPN on Your Router 🦿

Trying to figure out how to install a VPN on your router? Read our stepbystep guide to help you get started.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox πŸ–‹οΈ

A critical security flaw has been disclosed in the llamacpppython Python package that could be exploited by threat actors to achieve arbitrary code execution. Tracked as CVE202434359 CVSS score 9.7, the flaw has been codenamed Llama Drama by software supply chain security firm Checkmarx. "If exploited, it could allow attackers to execute arbitrary code on your system,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 60% of Network Security Appliance Flaws Exploited as Zero Days πŸ“”

Rapid7 found there were more mass compromise events arose from zeroday vulnerabilities than from nday vulnerabilities in 2023.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OpenSSF Siren to Share Threat Intelligence for Open Source Software πŸ•΅οΈβ€β™‚οΈ

The Siren email mailing list will focus on operational impact and response and act as a central location to provide information about threats and necessary postdisclosure activities.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Five Core Tenets Of Highly Effective DevSecOps Practices πŸ–‹οΈ

One of the enduring challenges of building modern applications is to make them more secure without disrupting highvelocity DevOps processes or degrading the developer experience. Todays cyber threat landscape is rife with sophisticated attacks aimed at all different parts of the software supply chain and the urgency for softwareproducing organizations to adopt DevSecOps practices that deeply.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Detecting the Invisible: UnderDefense Uncovers macOS Password Stealers 🌊

For many users, macOS has long been considered a secure haven in the world of cybersecurity. However, recent discoveries by our team at UnderDefense paint a concerning picture. We have recently uncovered a sophisticated strain of passwordstealing macOS malware, capable of bypassing even popular antivirus software. This revelation highlights a critical truth no system is The post Detecting the Invisible UnderDefense Uncovers macOS Password Stealers appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Working in the security clearance world: How security clearances impact jobs 🧠

We recently published an article about the importance of security clearances for roles across various sectors, particularly those associated with national security and defense. But obtaining a clearance is only part of the journey. Maintaining and potentially expanding your clearance over time requires continued diligence and adherence to stringent guidelines. This brief explainer discusses the The post Working in the security clearance world How security clearances impact jobs appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure πŸ–‹οΈ

The persistent threat actors behind the SolarMarker informationstealing malware have established a multitiered infrastructure to complicate law enforcement takedown efforts, new findings from Recorded Future show. "The core of SolarMarker's operations is its layered infrastructure, which consists of at least two clusters a primary one for active operations and a secondary one likely.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🧨 What is Artificial Intelligence? 🧨

At the beginning of the year, the Associated Press described artificial intelligence AI as easily the biggest buzzword for world... The post What is Artificial Intelligence? appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Can Cybersecurity Be a Unifying Factor in Digital Trade Negotiations? πŸ•΅οΈβ€β™‚οΈ

As we face continued headwinds on provisions like data flows and ecustoms duties, further progress is both needed and achievable in digital trade policy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware and AI-Powered Hacks Drive Cyber Investment πŸ“”

The rise in ransomware and AI generated attacks has contributed to accelerate investment into cyber defenses, Infosecurity Europe found in a new study.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Russia's Turla APT Abuses MSBuild to Deliver TinyTurla Backdoor πŸ•΅οΈβ€β™‚οΈ

A threat campaign luring users with malicious documents related to human rights and public notices is aimed at giving the Russiabacked threat group access to victims' systems for cyberespionage purposes.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI Seoul Summit: 16 AI Companies Sign Frontier AI Safety Commitments πŸ“”

The signatories of these new commitments in safe AI developments include Chinese and Emirati organizations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malware Delivery via Cloud Services Exploits Unicode Trick to Deceive Users πŸ–‹οΈ

A new attack campaign dubbed CLOUDREVERSER has been observed leveraging legitimate cloud storage services like Google Drive and Dropbox to stage malicious payloads. "The VBScript and PowerShell scripts in the CLOUDREVERSER inherently involves commandandcontrollike activities by using Google Drive and Dropbox as staging platforms to manage file uploads and downloads," Securonix.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ EPA Puts Teeth Into Water Sector Cyber Efforts πŸ•΅οΈβ€β™‚οΈ

The agency plans to get more serious about enforcement as Iran and Russia step up the volume of cyberattacks on water systems nationwide.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Name That Toon: Buzz Kill πŸ•΅οΈβ€β™‚οΈ

Feeling creative? Submit your caption and our panel of experts will reward the winner with a 25 Amazon gift card.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Why Your Wi-Fi Router Doubles as an Apple AirTag β™ŸοΈ

Apple and the satellitebased broadband service Starlink each recently took steps to address new research into the potential security and privacy implications of how their services geolocate devices. Researchers from the University of Maryland say they relied on publicly available data from Apple to track the location of billions of devices globally including nonApple devices like Starlink systems and found they could use this data to monitor the destruction of Gaza, as well as the movements and in many cases identities of Russian and Ukrainian troops.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical GitHub Enterprise Server Flaw Allows Authentication Bypass πŸ–‹οΈ

GitHub has rolled out fixes to address a maximum severity flaw in the GitHub Enterprise Server GHES that could allow an attacker to bypass authentication protections. Tracked as CVE20244985 CVSS score 10.0, the issue could permit unauthorized access to an instance without requiring prior authentication. "On instances that use SAML single signon SSO authentication with the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russia’s DoppelGΓ€nger Campaign Manipulates Social Media πŸ“”

Operation Matriochka has been challenging the credibility of journalists and factcheckers since May 2022.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity