πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Indian Election Faces Cyber-Attacks, Data Leaks on Dark Web πŸ“”

Resecurity reported a 300 spike in cyberattacks postOpIsrael, intensifying since OpIndia last year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The Gorilla Guide To… How HPE ProLiant Gen11 servers powered by Intel deliver trusted security πŸ“’

How systems, software, and connections are protected.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 How I got started: AI security researcher 🧠

For the enterprise, theres no escape from deploying AI in some form. Careers focused on AI are proliferating, but one you may not be familiar with is AI security researcher. These AI specialists are cybersecurity professionals who focus on the unique vulnerabilities and threats that arise from the use of AI and machine learning ML The post How I got started AI security researcher appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybercriminals Exploit Cloud Storage For SMS Phishing Scams πŸ“”

According to Enea, these campaigns use cloud storage platforms to host malicious websites, sending links via SMS to bypass firewalls.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Gift Card Scam Targets Retailers, Not Buyers, to Print Endless $$$ πŸ•΅οΈβ€β™‚οΈ

Microsoft researchers discover an oldtimey scam with a facelift for the cloud era hacking retailers' portals to make it rain gift cards.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 IBM X-Force Report: Grandoreiro Malware Targets More Than 1,500 Banks in 60 Countries 🦿

Find out how Grandoreiro banking trojan campaigns work and the countries targeted, as well as how to mitigate this malware threat.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern πŸ–‹οΈ

Ransomware attacks targeting VMware ESXi infrastructure following an established pattern regardless of the fileencrypting malware deployed. "Virtualization platforms are a core component of organizational IT infrastructure, yet they often suffer from inherent misconfigurations and vulnerabilities, making them a lucrative and highly effective target for threat actors to abuse,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Warns of Actively Exploited Apache Flink Security Vulnerability πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday added a security flaw impacting Apache Flink, the opensource, unified streamprocessing and batchprocessing framework, to the Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. Tracked as CVE202017519, the issue relates to a case of improper access control that.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Anthropic’s Generative AI Research Reveals More About How LLMs Affect Security and Bias 🦿

Anthropic opened a window into the black box where features steer a large language models output.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Stalkerware App With Security Bug Discovered on Hotel Systems πŸ•΅οΈβ€β™‚οΈ

The spyware is able to capture screenshots of a user's device every few seconds from any location globally.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Seizing Control of the Cloud Security Cockpit πŸ•΅οΈβ€β™‚οΈ

Much like an airplane's dashboard, configurations are the way we control cloud applications and SaaS tools. It's also the entry point for too many security threats. Here are some ideas for making the configuration process more secure.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Courtroom Recording Platform JAVS Hijacked in Supply Chain Attack πŸ•΅οΈβ€β™‚οΈ

With more than 10,000 installations across prisons, courts, and governments, impacted Justice AV Solutions users are urged to reimage affected endpoints and reset credentials.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ MIT Brothers Charged With Exploiting Ethereum to Steal $25 Million πŸ•΅οΈβ€β™‚οΈ

The two MIT graduates discovered a flaw in a common trading tool for the Ethereum blockchain. Does it presage problems ahead for cryptocurrency?.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Stark Industries Solutions: An Iron Hammer in the Cloud β™ŸοΈ

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denialofservice DDoS attacks on government and commercial targets in Ukraine and Europe. An investigation into Stark Industries reveals it is being used as a global proxy network that conceals the true source of cyberattacks and disinformation campaigns against enemies of Russia.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Enterprises are bogged down with disparate cyber tools β€” here’s why a β€˜platform security’ approach could tackle growing complexity πŸ“’

Adopting a platform security approach promises to make managing increasingly complex tools a whole lot easier, according to industry experts.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸš€ Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries πŸš€

Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Get a Lifetime Subscription of FastestVPN for just $32 🦿

In the market for a new VPN? The toprated FastestVPN has been reduced to just 31.97 for a lifetime subscription at TechRepublic Academy.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fake Pegasus Spyware Strains Populate Clear and Dark Web πŸ“”

Actors in the clear and dark web are distributing fake source codes of the Pegasus spyware for financial gain.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Old but gold: Why shoulder surfing is an underappreciated cyber threat πŸ“’

A highprofile case of shoulder surfing should serve as a reminder that physical social engineering attacks remain one of the most potent threats today.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar πŸ–‹οΈ

Don't be fooled into thinking that cyber threats are only a problem for large organizations. The truth is that cybercriminals are increasingly targeting smaller businesses, and they're getting smarter every day. Join our FREE webinar "Navigating the SMB Threat Landscape Key Insights from Huntress' Threat Report," in which Jamie Levy Director of Adversary Tactics at Huntress, a renowned.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed? πŸ–‹οΈ

Introduction The infamous Colonial pipeline ransomware attack 2021 and SolarWinds supply chain attack 2020 were more than data leaks they were seismic shifts in cybersecurity. These attacks exposed a critical challenge for Chief Information Security Officers CISOs holding their ground while maintaining control over cloud security in the accelerating world of DevOps.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity