πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Russia's Turla APT Abuses MSBuild to Deliver TinyTurla Backdoor πŸ•΅οΈβ€β™‚οΈ

A threat campaign luring users with malicious documents related to human rights and public notices is aimed at giving the Russiabacked threat group access to victims' systems for cyberespionage purposes.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI Seoul Summit: 16 AI Companies Sign Frontier AI Safety Commitments πŸ“”

The signatories of these new commitments in safe AI developments include Chinese and Emirati organizations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malware Delivery via Cloud Services Exploits Unicode Trick to Deceive Users πŸ–‹οΈ

A new attack campaign dubbed CLOUDREVERSER has been observed leveraging legitimate cloud storage services like Google Drive and Dropbox to stage malicious payloads. "The VBScript and PowerShell scripts in the CLOUDREVERSER inherently involves commandandcontrollike activities by using Google Drive and Dropbox as staging platforms to manage file uploads and downloads," Securonix.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ EPA Puts Teeth Into Water Sector Cyber Efforts πŸ•΅οΈβ€β™‚οΈ

The agency plans to get more serious about enforcement as Iran and Russia step up the volume of cyberattacks on water systems nationwide.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Name That Toon: Buzz Kill πŸ•΅οΈβ€β™‚οΈ

Feeling creative? Submit your caption and our panel of experts will reward the winner with a 25 Amazon gift card.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Why Your Wi-Fi Router Doubles as an Apple AirTag β™ŸοΈ

Apple and the satellitebased broadband service Starlink each recently took steps to address new research into the potential security and privacy implications of how their services geolocate devices. Researchers from the University of Maryland say they relied on publicly available data from Apple to track the location of billions of devices globally including nonApple devices like Starlink systems and found they could use this data to monitor the destruction of Gaza, as well as the movements and in many cases identities of Russian and Ukrainian troops.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical GitHub Enterprise Server Flaw Allows Authentication Bypass πŸ–‹οΈ

GitHub has rolled out fixes to address a maximum severity flaw in the GitHub Enterprise Server GHES that could allow an attacker to bypass authentication protections. Tracked as CVE20244985 CVSS score 10.0, the issue could permit unauthorized access to an instance without requiring prior authentication. "On instances that use SAML single signon SSO authentication with the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russia’s DoppelGΓ€nger Campaign Manipulates Social Media πŸ“”

Operation Matriochka has been challenging the credibility of journalists and factcheckers since May 2022.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 70% of CISOs Expect Cyber-Attacks in Next Year, Report Finds πŸ“”

Proofpoint said the shift to remote and hybrid work has expanded the attack surface for many businesses.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 UnderDefense MAXI wins Cybersecurity Excellence Award for β€œBest MDR Solution”! 🌊

Were excited to announce a major win for UnderDefense! Weve been awarded the Cybersecurity Excellence Award in the category of Best MDR Solution for our very own UnderDefense MAXI. Competing against an array of the worlds leading MDR solutions, our holistic approach to MDR that helps security leaders cut through the noise, maximize their efforts The post UnderDefense MAXI wins Cybersecurity Excellence Award for Best MDR Solution! appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Iran APTs Tag Team Espionage, Wiper Attacks Against Israel & Albania πŸ•΅οΈβ€β™‚οΈ

Scarred Manticore is the smart, sophisticated one. But when Iran needs something destroyed, it hands the keys over to Void Manticore.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ YouTube Becomes Latest Battlefront for Phishing, Deepfakes πŸ•΅οΈβ€β™‚οΈ

Personalized phishing emails with fake collaboration opportunities and compromised video descriptions linking to malware are just some of the new tricks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ WitnessAI Launches With Guardrails for AI πŸ•΅οΈβ€β™‚οΈ

AI safety platform startup WitnessAI claims to help enterprises use AI safely and effectively with its platform addressing AI privacy, governance, and security.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ QNAP Patches New Flaws in QTS and QuTS hero Impacting NAS Appliances πŸ–‹οΈ

Taiwanese company QNAP has rolled out fixes for a set of mediumseverity flaws impacting QTS and QuTS hero, some of which could be exploited to achieve code execution on its networkattached storage NAS appliances. The issues, which impact QTS 5.1.x and QuTS hero h5.1.x, are listed below CVE202421902  An incorrect permission assignment for critical resource.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Zoom Adopts NIST-Approved Post-Quantum End-to-End Encryption for Meetings πŸ–‹οΈ

Popular enterprise services provider Zoom has announced the rollout of postquantum endtoend encryption E2EE for Zoom Meetings, with support for Zoom Phone and Zoom Rooms coming in the future. "As adversarial threats become more sophisticated, so does the need to safeguard user data," the company said in a statement. "With the launch of postquantum E2EE, we are doubling down on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Veeam Backup Enterprise Manager Flaw Allows Authentication Bypass πŸ–‹οΈ

Users of Veeam Backup Enterprise Manager are being urged to update to the latest version following the discovery of a critical security flaw that could permit an adversary to bypass authentication protections. Tracked as CVE202429849 CVSS score 9.8, the vulnerability could allow an unauthenticated attacker to log in to the Veeam Backup Enterprise Manager web interface as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks πŸ–‹οΈ

An unknown threat actor is exploiting known security flaws in Microsoft Exchange Server to deploy a keylogger malware in attacks targeting entities in Africa and the Middle East. Russian cybersecurity firm Positive Technologies said it identified over 30 victims spanning government agencies, banks, IT companies, and educational institutions. The firstever compromise dates back to 2021. "This.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Authorized Push Payment Fraud Cases Surge 12% Annually πŸ“”

UK Finance figures reveal romance, purchase and investment scams drove up authorised push payment fraud in 2023.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ Untangling the hiring dilemma: How security solutions free up HR processes πŸš€

The prerequisites for becoming a security elite create a skills ceiling that is tough to break through especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum?.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Government in Β£8.5m Bid to Tackle AI Cyber-Threats πŸ“”

The government is spending millions on research into AI safety.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ GHOSTENGINE Exploits Vulnerable Drivers to Disable EDRs in Cryptojacking Attack πŸ–‹οΈ

Cybersecurity researchers have discovered a new cryptojacking campaign that employs vulnerable drivers to disable known security solutions EDRs and thwart detection in what's called a Bring Your Own Vulnerable Driver BYOVD attack. Elastic Security Labs is tracking the campaign under the name REF4578 and the primary payload as GHOSTENGINE. Previous research from Chinese.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity