πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Japanese Experts Warn of BLOODALCHEMY Malware Targeting Government Agencies πŸ–‹οΈ

Cybersecurity researchers have discovered that the malware known as BLOODALCHEMY used in attacks targeting government organizations in Southern and Southeastern Asia is in fact an updated version of Deed RAT, which is believed to be a successor to ShadowPad. "The origin of BLOODALCHEMY and Deed RAT is ShadowPad and given the history of ShadowPad being utilized in numerous APT.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft: Gift Card Fraud Rising, Costing Businesses up to $100,000 a Day πŸ“”

Microsoft has warned of surging gift card fraud and sophisticated approaches from the group Storm0539.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Incognito Admin Arrest and SuperMarket Wallet Drain: Darknet Marketplaces Plunge into Uncertainty πŸ¦…

Unraveling the seedy underbelly of the darknet marketplaces  Executive Summary  The arrest of RiuSiang Lin, the former administrator of the closed Incognito marketplace, by the US authorities on 18th May is causing a domino effect in the underground illegal communities, leading to an alleged exit plan on the SuperMarket. On Dreads, the coadministrator of the Supermarket announced to the community on May 21, 2024, that the wallets had been emptied and that the only person who would have had access to them was "FatherBear", the other administrator of the marketplace.   The indictment of Lin, known in the underground as "Pharao," leads to an OSINT investigation based on his name, which provides more insight into his real identity and possible explanations for the March exit. Moreov...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CyberArk Goes All In on Machine Identity with Venafi Deal πŸ•΅οΈβ€β™‚οΈ

CyberArk's 1.54 billion agreement to buy Venafi is a sign of how human and machine identities will converge with certificate lifecycle management.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Future-Proof Your Cybersecurity AI Strategy πŸ•΅οΈβ€β™‚οΈ

An effective, longterm XDR strategy will address the ongoing need for rapid analysis and continual vetting of the latest threat intelligence.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 5 Patch Management Best Practices for Success in 2024 🦿

Patching remains a difficult task for many organizations but its critical for security. Discover 5 patch management best practices.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How a VPN Can Make Your Time Online More Private and Secure 🧨

What is a VPN virtual private network? And how can it make your time online more secureand a little more... The post How a VPN Can Make Your Time Online More Private and Secure appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 CISOs in Australia Urged to Take a Closer Look at Data Breach Risks 🦿

A leading cyber lawyer in Australia has warned CISOs and other IT leaders their organisations and careers could be at stake if they do not understand data risk and data governance practices.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fake Antivirus Websites Deliver Malware to Android and Windows Devices πŸ–‹οΈ

Threat actors have been observed making use of fake websites masquerading as legitimate antivirus solutions from Avast, Bitdefender, and Malwarebytes to propagate malware capable of stealing sensitive information from Android and Windows devices. "Hosting malicious software through sites which look legitimate is predatory to general consumers, especially those who look to protect their devices.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Health Information Published Online After MediSecure Ransomware Attack πŸ“”

MediSecure confirmed that limited health data of customers was posted onto a dark web forum, with a 6.5TB dataset reportedly put up for sale.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ When 'No' & 'Good Enough' Challenge Cybersecurity πŸ•΅οΈβ€β™‚οΈ

As the digital landscape evolves, these words must become an impetus for innovation and dialogue, not insurmountable barriers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The SEC's SolarWinds Case: What CISOs Should Do Now πŸ•΅οΈβ€β™‚οΈ

The SEC's lawsuit may take years to resolve through litigation, but here are five things CISOs should do now to protect both themselves as individuals as well as their organizations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
🦿 Get a Lifetime of 1TB Cloud Storage for Only $80 With FolderFort 🦿

Fast, affordable cloud storage isnt always easy to find for businesses, but now you can have a massive amount with maximum security.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 AI Seoul Summit: 4 Key Takeaways on AI Safety Standards and Regulations 🦿

Major breakthroughs were made in global nations AI safety commitments, AI safety institutes, research grants and AI risk thresholds at this months AI Seoul Summit.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Google Discovers Fourth Zero-Day in Less Than a Month πŸ•΅οΈβ€β™‚οΈ

The tech company has rolled out fixes for a type confusion vulnerability that has already been exploited by malicious actors.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Rust Revolution: New Embargo Ransomware Steps In πŸ¦…

Key Takeaways  Cyble Research Intelligence Labs CRIL identified a sample of Embargo ransomware, developed in Rust.  The Threat Actors behind this ransomware are using double extortion tactics.  We observed an instance where the ransomware group Initially demanded a 1 million ransom payment, threatening data leak and notifications to various parties upon nonpayment.  The leak site User Interfaces of Embargo and ALPHV ransomware resemble each other. Additionally, the leak site of ALPHV ransomware was taken down by law enforcement in March 2024.   The log generation structure of both the ransomware looks similar.  Embargo, to date, has disclosed details of four victims globally.  This ransomware Utilizes ChaCha20 and Curve25519 for file encryption and appends ".564ba1" ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Faraday 5.3.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated PenetrationTest Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to reuse the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack πŸ–‹οΈ

The MITRE Corporation has revealed that the cyber attack targeting the notforprofit company towards late December 2023 by exploiting zeroday flaws in Ivanti Connect Secure ICS involved the actor creating rogue virtual machines VMs within its VMware environment. "The adversary created their own rogue VMs within the VMware environment, leveraging compromised vCenter Server access," MITRE.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft's 'Recall' Feature Draws Criticism From Privacy Advocates πŸ•΅οΈβ€β™‚οΈ

Despite Microsoft's reassurances, multiple security researchers describe the technology as problematic for users and their organizations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ AI Voice Generator App Used to Drop Gipy Malware πŸ•΅οΈβ€β™‚οΈ

Users get duped into downloading malicious files disguised to look like an application that uses artificial intelligence to alter voices.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 Deepfake Drama: How Gwyneth Paltrow Became the Latest Target in AI Deception 🧨

As technology advances, so do the methods used by cybercriminals to spread misinformation and scams. One of the most concerning... The post Deepfake Drama How Gwyneth Paltrow Became the Latest Target in AI Deception appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity