πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ GHOSTENGINE Exploits Vulnerable Drivers to Disable EDRs in Cryptojacking Attack πŸ–‹οΈ

Cybersecurity researchers have discovered a new cryptojacking campaign that employs vulnerable drivers to disable known security solutions EDRs and thwart detection in what's called a Bring Your Own Vulnerable Driver BYOVD attack. Elastic Security Labs is tracking the campaign under the name REF4578 and the primary payload as GHOSTENGINE. Previous research from Chinese.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical Netflix Genie Bug Opens Big Data Orchestration to RCE πŸ•΅οΈβ€β™‚οΈ

The severe security vulnerability CVE20244701, CVSS 9.9 gives remote attackers a way to burrow into Netflix's Genie open source platform, which is a treasure trove of information and connections to other internal services.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How to Change Your VPN Location (A Step-by-Step Guide) 🦿

This guide explains how you can change the location of your virtual private network for privacy, security or geolocation issues.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats πŸ–‹οΈ

Rockwell Automation is urging its customers to disconnect all industrial control systems ICSs not meant to be connected to the publicfacing internet to mitigate unauthorized or malicious cyber activity. The company said it's issuing the advisory due to "heightened geopolitical tensions and adversarial cyber activity globally." To that end, customers are required to take immediate.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Ultimate SaaS Security Posture Management Checklist, 2025 Edition πŸ–‹οΈ

Since the first edition of The Ultimate SaaS Security Posture Management SSPM Checklist was released three years ago, the corporate SaaS sprawl has been growing at a doubledigit pace. In large enterprises, the number of SaaS applications in use today is in the hundreds, spread across departmental stacks, complicating the job of security teams to protect organizations against.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Mastercard Doubles Speed of Fraud Detection with Generative AI πŸ“”

Mastercard said it is using generative AIbased predictive technology to double the speed at which it can detect potentially compromised cards.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Unveils $50M Program to Help Hospitals Patch Cybersecurity Gaps πŸ“”

The US government UPGRADE program aims to automate vulnerability management in hospital environments, ensuring minimum disruption to services.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 What to Do If Your Email Is Hacked 🧨

I think I could count on my hand the people I know who have NOT had their email hacked. Maybe... The post What to Do If Your Email Is Hacked appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Strengthening channel partnerships and fortifying defenses in the technology sector πŸ“’

Businesses need to be able to rely on every part of their security stack to keep them protected, heres how you can bolster channel satisfaction with a commitment to cyber resilience.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Strengthening channel partnerships and fortifying defenses in the technology sector πŸ“’

Businesses need to be able to rely on every part of their security stack to keep them protected, heres how you can bolster channel satisfaction with a commitment to cyber resilience.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Novel EDR-Killing 'GhostEngine' Malware Is Built for Stealth πŸ•΅οΈβ€β™‚οΈ

The previously unknown malware aka Hidden Shovel is a ghost in the machine It silently attacks kernel drivers to shut down security defense systems and thus evade detection.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Novel EDR-Killing 'GhostEngine' Malware Is Built for Stealth πŸ•΅οΈβ€β™‚οΈ

The previously unknown malware aka Hidden Shovel is a ghost in the machine It silently attacks kernel drivers to shut down security defense systems and thus evade detection.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Preparing Your Organization for Upcoming Cybersecurity Deadlines πŸ•΅οΈβ€β™‚οΈ

Federal and state regulators have introduced new rules and mandates aimed at holding organizations accountable when it comes to cybersecurity. Here's how to get ready.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Preparing Your Organization for Upcoming Cybersecurity Deadlines πŸ•΅οΈβ€β™‚οΈ

Federal and state regulators have introduced new rules and mandates aimed at holding organizations accountable when it comes to cybersecurity. Here's how to get ready.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese 'ORB' Networks Conceal APTs, Render Static IoCs Irrelevant πŸ•΅οΈβ€β™‚οΈ

Mandiant warns that defenders must rethink how to thwart Chinese cyberespionage groups now using professional "infrastructureasaservice" operational relay box networks of virtual private servers as well as hijacked smart devices and routers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese 'ORB' Networks Conceal APTs, Render Static IoCs Irrelevant πŸ•΅οΈβ€β™‚οΈ

Mandiant warns that defenders must rethink how to thwart Chinese cyberespionage groups now using professional "infrastructureasaservice" operational relay box networks of virtual private servers as well as hijacked smart devices and routers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese Hackers Rely on Covert Proxy Networks to Evade Detection πŸ“”

Volt Typhoon and other Chinese cyber espionage actors are relying on operational relay box ORB networks, Mandiant has observed.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  I2P 2.5.2 πŸ› 

I2P is an anonymizing network, offering a simple layer that identitysensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a previously undocumented threat group called Unfading Sea Haze that's believed to have been active since 2018. The intrusion singled out highlevel organizations in South China Sea countries, particularly military and government targets, Bitdefender said in a report shared with The Hacker News. "The investigation revealed a troubling.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UserPro Plugin Vulnerability Allows Account Takeover πŸ“”

The plugin is used by over 20,000 sites and enables users to create customizable community websites.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Report Reveals 341% Rise in Advanced Phishing Attacks πŸ“”

This data comes from SlashNexts midyear State of Phishing 2024 report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity