๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
26K subscribers
89.3K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ•ต๏ธโ€โ™‚๏ธ Google Discovers Fourth Zero-Day in Less Than a Month ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The tech company has rolled out fixes for a type confusion vulnerability that has already been exploited by malicious actors.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆ… The Rust Revolution: New Embargo Ransomware Steps In ๐Ÿฆ…

Key Takeaways  Cyble Research Intelligence Labs CRIL identified a sample of Embargo ransomware, developed in Rust.  The Threat Actors behind this ransomware are using double extortion tactics.  We observed an instance where the ransomware group Initially demanded a 1 million ransom payment, threatening data leak and notifications to various parties upon nonpayment.  The leak site User Interfaces of Embargo and ALPHV ransomware resemble each other. Additionally, the leak site of ALPHV ransomware was taken down by law enforcement in March 2024.   The log generation structure of both the ransomware looks similar.  Embargo, to date, has disclosed details of four victims globally.  This ransomware Utilizes ChaCha20 and Curve25519 for file encryption and appends ".564ba1" ...

๐Ÿ“– Read more.

๐Ÿ”— Via "CYBLE"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ›  Faraday 5.3.0 ๐Ÿ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated PenetrationTest Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to reuse the available tools in the community to take advantage of them in a multiuser way.

๐Ÿ“– Read more.

๐Ÿ”— Via "Packet Storm - Tools"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack ๐Ÿ–‹๏ธ

The MITRE Corporation has revealed that the cyber attack targeting the notforprofit company towards late December 2023 by exploiting zeroday flaws in Ivanti Connect Secure ICS involved the actor creating rogue virtual machines VMs within its VMware environment. "The adversary created their own rogue VMs within the VMware environment, leveraging compromised vCenter Server access," MITRE.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ Microsoft's 'Recall' Feature Draws Criticism From Privacy Advocates ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Despite Microsoft's reassurances, multiple security researchers describe the technology as problematic for users and their organizations.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ AI Voice Generator App Used to Drop Gipy Malware ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Users get duped into downloading malicious files disguised to look like an application that uses artificial intelligence to alter voices.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿงจ Deepfake Drama: How Gwyneth Paltrow Became the Latest Target in AI Deception ๐Ÿงจ

As technology advances, so do the methods used by cybercriminals to spread misinformation and scams. One of the most concerning... The post Deepfake Drama How Gwyneth Paltrow Became the Latest Target in AI Deception appeared first on McAfee Blog.

๐Ÿ“– Read more.

๐Ÿ”— Via "McAfee"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿš€ Mandatory reporting for ransomware attacks? โ€“ Week in security with Tony Anscombe ๐Ÿš€

As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyberinsurance come into play, and how might cybercriminals respond?.

๐Ÿ“– Read more.

๐Ÿ”— Via "ESET - WeLiveSecurity"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ‘2
๐Ÿ–‹๏ธ Experts Find Flaw in Replicate AI Service Exposing Customers' Models and Data ๐Ÿ–‹๏ธ

Cybersecurity researchers have discovered a critical security flaw in an artificial intelligence AIasaservice provider Replicate that could have allowed threat actors to gain access to proprietary AI models and sensitive information. "Exploitation of this vulnerability would have allowed unauthorized access to the AI prompts and results of all Replicate's platform customers,".

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ 6 Facts About How Interpol Fights Cybercrime ๐Ÿ•ต๏ธโ€โ™‚๏ธ

So you think you know Interpol? Here are some key details of how this international law enforcement entity disrupts cybercrime worldwide.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets ๐Ÿ–‹๏ธ

The Pakistannexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian government, defense, and aerospace sectors using crossplatform malware written in Python, Golang, and Rust. "This cluster of activity spanned from late 2023 to April 2024 and is anticipated to persist," the BlackBerry Research and Intelligence Team said in a technical report.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆฟ Learn how to Protect your Business with this $30 Cybersecurity Training ๐Ÿฆฟ

This extensive bundle includes eight courses from leading instructors covering certification exams from CompTIA and Cisco to set you up for success.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ New Tricks in the Phishing Playbook: Cloudflare Workers, HTML Smuggling, GenAI ๐Ÿ–‹๏ธ

Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users' credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail. The attack method, called transparent phishing or adversaryinthemiddle AitM phishing, "uses Cloudflare Workers to act as a reverse proxy server for a.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ‘1
๐Ÿ–‹๏ธ Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud ๐Ÿ–‹๏ธ

Microsoft is calling attention to a Moroccobased cybercrime group dubbed Storm0539 that's behind gift card fraud and theft through highly sophisticated email and SMS phishing attacks. "Their primary motivation is to steal gift cards and profit by selling them online at a discounted rate," the company said in its latest Cyber Signals report. "We've seen some examples where.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Report: The Dark Side of Phishing Protection ๐Ÿ–‹๏ธ

The transition to the cloud, poor password hygiene and the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to mitigate them through email protection, firewall rules and employee education phishing attacks are still a very risky attack vector. A new report by LayerX explores the state of.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆฟ SentinelOne vs Palo Alto: Compare EDR software ๐Ÿฆฟ

Compare the key features of two EDR tools SentinelOne's Singularity XDR and Palo Alto's Cortex XDR.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆฟ Get 9 Courses on Ethical Hacking for Just $50 ๐Ÿฆฟ

Kickstart a lucrative career in pentesting and ethical hacking with this ninecourse bundle from IDUNOVA, now on sale for just 49.99 for a limited time.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“ข WithSecure Sphere 2024 live: All the news and updates as they happen ๐Ÿ“ข

ITPro is live on the ground in Helsinki for WithSecure SPHERE 2024 follow all the news, updates, and announcements as they happen.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ‘2
๐Ÿ–‹๏ธ WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites ๐Ÿ–‹๏ธ

Unknown threat actors are abusing lesserknown code snippet plugins for WordPress to insert malicious PHP code in victim sites that are capable of harvesting credit card data. The campaign, observed by Sucuri on May 11, 2024, entails the abuse of a WordPress plugin called Dessky Snippets, which allows users to add custom PHP code. It has over 200 active installations.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks ๐Ÿ–‹๏ธ

A maximumseverity security flaw has been disclosed in the TPLink Archer C5400X gaming router that could lead to remote code execution on susceptible devices by sending specially crafted requests. The vulnerability, tracked as CVE20245035, carries a CVSS score of 10.0. It impacts all versions of the router firmware including and prior to 11.1.6. It has .

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” #Infosec2024: Why Human Risk Management is Cybersecurity's Next Step for Awareness ๐Ÿ“”

With most cyberattacks still involving a nonmalicious human element, it is clear that awareness training alone is insufficient, this is where human risk management comes into play.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity