πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” #Infosec2024: Decoding SentinelOne's AI Threat Hunting Assistant πŸ“”

SentinelOne will present a threathunting demonstration during which a security analyst will compete against a nontechnical person using its AI assistant.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Internet Archive Disrupted by Sustained and β€œMean” DDoS Attack πŸ“”

The Internet Archive said sustained DDoS attacks have disrupted access to its preserved web pages and other historical archives.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ This new hacker group is targeting software developers with phony job offers and fake projects πŸ“’

From targeting software developers to infiltrating IT firms, the Moonstone Sleet hacker group has an unusually wide range of attacks and isnt shy about using them.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Mastermind Behind Biden AI Deepfake Indicted for Robocall Scheme πŸ•΅οΈβ€β™‚οΈ

The political consultant who wrote the script and paid for the deepfake audio used in robocalls was fined 6 million by the FCC.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Exploit for Fortinet Critical RCE Bug Allows SIEM Root Access πŸ•΅οΈβ€β™‚οΈ

Corporate admins should patch the maxseverity CVE202423108 immediately, which allows unauthenticated command injection.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ BlackSuit Claims Dozens of Victims With Carefully Curated Ransomware πŸ•΅οΈβ€β™‚οΈ

Researchers went indepth on an attack by the threat group, which mainly targets US companies in the education and industrial goods sectors, specifically to maximize financial gain.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why CVEs Are an Incentives Problem πŸ•΅οΈβ€β™‚οΈ

It's time to rethink the pivotal role incentives play in shaping behavior to find and disclose software vulnerabilities. More accurate guidance to reflect realworld risks and a tiered verification process to establish potential impact could slow misleading submissions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  GRR 3.4.7.4 πŸ› 

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action downloading file, listing a directory, etc. GRR server infrastructure consists of several components frontends, workers, UI servers and provides webbased graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  jSQL Injection 0.96 πŸ› 

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Proxmark3 4.18589 Custom Firmware πŸ› 

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware. This release is nicknamed "Aurora".

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cybercriminals Abuse StackOverflow to Promote Malicious Python Package πŸ–‹οΈ

Cybersecurity researchers have warned of a new malicious Python package that has been discovered in the Python Package Index PyPI repository to facilitate cryptocurrency theft as part of a broader campaign. The package in question is pytoileur, which has been downloaded 316 times as of writing. Interestingly, the package author, who goes by the name PhilipsPY, has uploaded a new version of the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Check Point Warns of Zero-Day Attacks on its VPN Gateway Products πŸ–‹οΈ

Check Point is warning of a zeroday vulnerability in its Network Security gateway products that threat actors have exploited in the wild. Tracked as CVE202424919, the issue impacts CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark appliances. "The vulnerability potentially allows an attacker to read certain information on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Brazilian Banks Targeted by New AllaKore RAT Variant Called AllaSenha πŸ–‹οΈ

Brazilian banking institutions are the target of a new campaign that distributes a custom variant of the Windowsbased AllaKore remote access trojan RAT called AllaSenha. The malware is "specifically aimed at stealing credentials that are required to access Brazilian bank accounts, and leverages Azure cloud as commandandcontrol C2 infrastructure," French cybersecurity company HarfangLab.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Advance Fee Fraud Targets Colleges With Free Piano Offers πŸ“”

Proofpoint discovered over 125,000 emails linked to this scam cluster in the past year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New PyPI Malware β€œPytoileur” Steals Crypto and Evades Detection πŸ“”

The package posed as an API management tool and downloaded trojanized Windows binaries.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Is Your Computer Part of β€˜The Largest Botnet Ever?’ β™ŸοΈ

The U.S. Department of Justice DOJ today said they arrested the alleged operator of 911 S5, a tenyearold online anonymity service that was powered by what the director of the FBI called "likely the world's largest botnet ever." The arrest coincided with the seizure of the 911 S5 website and supporting infrastructure, which the government says turned computers running various "free VPN" products into Internet traffic relays that facilitated billions of dollars in online fraud and cybercrime.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Leak Site BreachForums Springs Back to Life Weeks After FBI Takedown πŸ•΅οΈβ€β™‚οΈ

It's unclear whether a dataset for sale on the site allegedly containing data from more than 500 million TicketMaster users is real or just law enforcement bait.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 9 Tips to Avoid Burnout in Cybersecurity πŸ•΅οΈβ€β™‚οΈ

When security professionals are at the end of their rope feeling both mentally and physically exhausted it's often because of burnout. Unfortunately, burnout is becoming more common in the industry. Here are 9 ways to try to combat it.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸš€ ESET World 2024: Big on prevention, even bigger on AI πŸš€

What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Okta Warns of Credential Stuffing Attacks Targeting Customer Identity Cloud πŸ–‹οΈ

Okta is warning that a crossorigin authentication feature in Customer Identity Cloud CIC is susceptible to credential stuffing attacks orchestrated by threat actors. "We observed that the endpoints used to support the crossorigin authentication feature being attacked via credential stuffing for a number of our customers," the Identity and access management IAM services provider said. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Why Credential-Based Attacks Need Modern Solutions πŸ“”

1Passwords Steve Won discusses why modern security solutions, such as passkeys, can substantially reduce the risk of credentialbased attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity