πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Check Point Warns of Zero-Day Attacks on its VPN Gateway Products πŸ–‹οΈ

Check Point is warning of a zeroday vulnerability in its Network Security gateway products that threat actors have exploited in the wild. Tracked as CVE202424919, the issue impacts CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark appliances. "The vulnerability potentially allows an attacker to read certain information on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Brazilian Banks Targeted by New AllaKore RAT Variant Called AllaSenha πŸ–‹οΈ

Brazilian banking institutions are the target of a new campaign that distributes a custom variant of the Windowsbased AllaKore remote access trojan RAT called AllaSenha. The malware is "specifically aimed at stealing credentials that are required to access Brazilian bank accounts, and leverages Azure cloud as commandandcontrol C2 infrastructure," French cybersecurity company HarfangLab.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Advance Fee Fraud Targets Colleges With Free Piano Offers πŸ“”

Proofpoint discovered over 125,000 emails linked to this scam cluster in the past year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New PyPI Malware β€œPytoileur” Steals Crypto and Evades Detection πŸ“”

The package posed as an API management tool and downloaded trojanized Windows binaries.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Is Your Computer Part of β€˜The Largest Botnet Ever?’ β™ŸοΈ

The U.S. Department of Justice DOJ today said they arrested the alleged operator of 911 S5, a tenyearold online anonymity service that was powered by what the director of the FBI called "likely the world's largest botnet ever." The arrest coincided with the seizure of the 911 S5 website and supporting infrastructure, which the government says turned computers running various "free VPN" products into Internet traffic relays that facilitated billions of dollars in online fraud and cybercrime.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Leak Site BreachForums Springs Back to Life Weeks After FBI Takedown πŸ•΅οΈβ€β™‚οΈ

It's unclear whether a dataset for sale on the site allegedly containing data from more than 500 million TicketMaster users is real or just law enforcement bait.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 9 Tips to Avoid Burnout in Cybersecurity πŸ•΅οΈβ€β™‚οΈ

When security professionals are at the end of their rope feeling both mentally and physically exhausted it's often because of burnout. Unfortunately, burnout is becoming more common in the industry. Here are 9 ways to try to combat it.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸš€ ESET World 2024: Big on prevention, even bigger on AI πŸš€

What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Okta Warns of Credential Stuffing Attacks Targeting Customer Identity Cloud πŸ–‹οΈ

Okta is warning that a crossorigin authentication feature in Customer Identity Cloud CIC is susceptible to credential stuffing attacks orchestrated by threat actors. "We observed that the endpoints used to support the crossorigin authentication feature being attacked via credential stuffing for a number of our customers," the Identity and access management IAM services provider said. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Why Credential-Based Attacks Need Modern Solutions πŸ“”

1Passwords Steve Won discusses why modern security solutions, such as passkeys, can substantially reduce the risk of credentialbased attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Dismantles World's Largest 911 S5 Botnet, with 19 Million Infected Devices πŸ–‹οΈ

The U.S. Department of Justice DoJ on Wednesday said it dismantled what it described as "likely the world's largest botnet ever," which consisted of an army of 19 million infected devices that was leased to other threat actors to commit a wide array of offenses. The botnet, which has a global footprint spanning more than 190 countries, functioned as a residential proxy service known as 911 S5.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Employee Termination Policy 🦿

Whether due to resignation, layoff or firing, separating employees from the business is never a pleasant process nor is it always easy. Because many staff members have access to confidential data or company assets, it is critical to utilize a series of detailed and comprehensive steps to complete employee terminations and streamline the experience as ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US-Led Operation Takes Down World’s Largest Botnet πŸ“”

A global law enforcement operation has disrupted the 911 S5 botnet, a global network of compromised devices used to facilitate criminal activity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ BBC pension scheme data breach exposes more than 25,000 current and former employees πŸ“’

Thousands of current and former BBC employees have been impacted by the breach, prompting the corporation to offer credit monitoring services.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ticketmaster hackers could have exploited AWS instances to gain access to half a billion customer records πŸ“’

The Ticketmaster breach was reportedly due to threat actors exploiting vulnerable AWS instances.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🀬1
🦿 Do VPNs Change or Hide Your IP Address? 🦿

Will a virtual private network change your IP address? Find out in this article and discover what a VPN doesnt hide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Password auditing: Purge weak passwords from your organization πŸ“’

Scan your Active Directory for passwordrelated vulnerabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Europol Shuts Down 100+ Servers Linked to IcedID, TrickBot, and Other Malware πŸ–‹οΈ

Europol on Thursday said it shut down the infrastructure associated with several malware loader operations such as IcedID, SystemBC, PikaBot, SmokeLoader, Bumblebee, and TrickBot as part of a coordinated law enforcement effort codenamed Operation Endgame. "The actions focused on disrupting criminal services through arresting High Value Targets, taking down the criminal infrastructures and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The dark web is absolutely awash with stolen data on British MPs πŸ“’

Dark web marketplaces are full to the brim with email addresses and personal information belonging to British politicians.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Build Your Autonomous SOC Strategy πŸ–‹οΈ

Security leaders are in a tricky position trying to discern how much new AIdriven cybersecurity tools could actually benefit a security operations center SOC. The hype about generative AI is still everywhere, but security teams have to live in reality. They face constantly incoming alerts from endpoint security platforms, SIEM tools, and phishing emails reported by internal users. Security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 4 Security Questions to Ask Your Enterprise Generative AI Provider πŸ•΅οΈβ€β™‚οΈ

Security teams should understand their providers' approach to data privacy, transparency, user guidance, and secure design and development.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity