πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ 4-Step Approach to Mapping and Securing Your Organization's Most Critical Assets πŸ–‹οΈ

Youre probably familiar with the term critical assets. These are the technology assets within your company's IT infrastructure that are essential to the functioning of your organization. If anything happens to these assets, such as application servers, databases, or privileged identities, the ramifications to your security posture can be severe.  But is every technology asset considered.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique πŸ–‹οΈ

The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in various software over the past three months to infiltrate vulnerable devices and coopt them into a botnet for conducting distributed denialofservice DDoS attacks. "CatDDoSrelated gangs' samples have used a large number of known vulnerabilities to deliver samples," the QiAnXin XLab team .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” TeaBot Banking Trojan Activity on the Rise, Zscaler Observes πŸ“”

Researchers from Zscaler ThreatLabz observed an uptick in the TeaBot Andoird banking Trojan, also known as Anatsa.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Courtroom Recording Software Vulnerable to Backdoor Attacks πŸ“”

Rapid7 warned that users of Justice AV Solutions JAVS Viewer v8.3.7 recording software are at high risk of stolen credentials and having malware installed.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: What to Expect at Infosecurity Europe 2024 πŸ“”

Get ready for Infosecurity Europe 2024 with these top five picks from Infosecurity Magazine to help you plan your visit.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Looking to Leverage Generative AI? Prep for Success With These 4 Tips πŸ•΅οΈβ€β™‚οΈ

There's plenty of upside to this emerging technology, especially if organizations smartly plan for GenAI's rollout and longterm management.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top 5 Cloud Trends U.K. Businesses Should Watch in 2024 🦿

TechRepublic identified the top five emerging cloud technology trends that businesses in the U.K. should be aware of this year.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Get 3 Years of Rock-Solid Protection With Surfshark VPN for $67.20 by 5/31 🦿

Find out more about why Surfshark VPN is a great choice for your digital privacy. Get advantage of this limited time offer by using code ENJOY20 at checkout.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme πŸ–‹οΈ

An Indian national has pleaded guilty in the U.S. over charges of stealing more than 37 million by setting up a website that impersonated the Coinbase cryptocurrency exchange platform. Chirag Tomar, 30, pleaded guilty to wire fraud conspiracy, which carries a maximum sentence of 20 years in prison and a 250,000 fine. He was arrested on December 20, 2023, upon entering the country. "Tomar and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Will Australia Ever Dig Itself Out of the Cybersecurity Skills Shortage? 🦿

Australia is grappling with this cyber security challenge that is resulting in frequent breaches across large companies. Here are possible solutions, including how cyber security pros can help.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Protect your attack vectors from emerging threats πŸ“’

Discover an effective way to reduce your attack surface.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 90+ Malicious Apps Totaling 5.5M Downloads Lurk on Google Play πŸ•΅οΈβ€β™‚οΈ

The dangerous Anatsa banking Trojan is among the malware being spread to Android users via decoy mobile apps in recent months.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The SEC's New Take on Cybersecurity Risk Management πŸ•΅οΈβ€β™‚οΈ

Insights from three companies that recently reported breaches under the new disclosure regulations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” XSS Vulnerabilities Found in WordPress Plugin Slider Revolution πŸ“”

Slider Revolution is a widely used premium Wordpress plugin with over 9 million active users.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Check Point Urges VPN Configuration Review Amid Attack Spike πŸ“”

These attacks did not exploit a vulnerability but instead leveraged weaker authentication methods.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 The Top 10 Riskiest Online Destinations Revealed 🧨

As Americans make their travel plans, scammers lie in wait. Weve uncovered the top ten riskiest destinations for travel scams... The post The Top 10 Riskiest Online Destinations Revealed appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OpenAI Forms Another Safety Committee After Dismantling Prior Team πŸ•΅οΈβ€β™‚οΈ

The committee is being set up as the ChatGPT creator begins to train its latest large language model, GPT5, which will reach "a new level of capabilities.".

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Attackers Target Check Point VPNs to Access Corporate Networks πŸ•΅οΈβ€β™‚οΈ

Using VPNs as an initial access vector is ironic, given that security is the very reason enterprises employ them in the first place.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CatDDOS Threat Groups Sharply Ramp Up DDoS Attacks πŸ•΅οΈβ€β™‚οΈ

In attacks over the past three months, threat actors have exploited more than 80 vulnerabilities to accelerate distribution of the Mirai variant.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Treasury Sanctions Creators of 911 S5 Proxy Botnet β™ŸοΈ

The U.S. Department of the Treasury today unveiled sanctions against three Chinese nationals for allegedly operating 911 S5, an online anonymity service that for many years was the easiest and cheapest way to route one's Web traffic through malwareinfected computers around the globe. KrebsOnSecurity identified one of the three men in a July 2022 investigation into 911 S5, which was massively hacked and then closed ten days later.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Pakistani 'Transparent Tribe' APT Aims for Cross-Platform Impact πŸ•΅οΈβ€β™‚οΈ

Targeting India's government, defense, and aerospace sectors, the cyberthreat group now attacks Linux as well as Windows in its quest to compromise the Indian military's homegrown MayaOS Linux systems.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity