πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” #Infosec2024: Why Credential-Based Attacks Need Modern Solutions πŸ“”

1Passwords Steve Won discusses why modern security solutions, such as passkeys, can substantially reduce the risk of credentialbased attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Dismantles World's Largest 911 S5 Botnet, with 19 Million Infected Devices πŸ–‹οΈ

The U.S. Department of Justice DoJ on Wednesday said it dismantled what it described as "likely the world's largest botnet ever," which consisted of an army of 19 million infected devices that was leased to other threat actors to commit a wide array of offenses. The botnet, which has a global footprint spanning more than 190 countries, functioned as a residential proxy service known as 911 S5.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Employee Termination Policy 🦿

Whether due to resignation, layoff or firing, separating employees from the business is never a pleasant process nor is it always easy. Because many staff members have access to confidential data or company assets, it is critical to utilize a series of detailed and comprehensive steps to complete employee terminations and streamline the experience as ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US-Led Operation Takes Down World’s Largest Botnet πŸ“”

A global law enforcement operation has disrupted the 911 S5 botnet, a global network of compromised devices used to facilitate criminal activity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ BBC pension scheme data breach exposes more than 25,000 current and former employees πŸ“’

Thousands of current and former BBC employees have been impacted by the breach, prompting the corporation to offer credit monitoring services.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ticketmaster hackers could have exploited AWS instances to gain access to half a billion customer records πŸ“’

The Ticketmaster breach was reportedly due to threat actors exploiting vulnerable AWS instances.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🀬1
🦿 Do VPNs Change or Hide Your IP Address? 🦿

Will a virtual private network change your IP address? Find out in this article and discover what a VPN doesnt hide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Password auditing: Purge weak passwords from your organization πŸ“’

Scan your Active Directory for passwordrelated vulnerabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Europol Shuts Down 100+ Servers Linked to IcedID, TrickBot, and Other Malware πŸ–‹οΈ

Europol on Thursday said it shut down the infrastructure associated with several malware loader operations such as IcedID, SystemBC, PikaBot, SmokeLoader, Bumblebee, and TrickBot as part of a coordinated law enforcement effort codenamed Operation Endgame. "The actions focused on disrupting criminal services through arresting High Value Targets, taking down the criminal infrastructures and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The dark web is absolutely awash with stolen data on British MPs πŸ“’

Dark web marketplaces are full to the brim with email addresses and personal information belonging to British politicians.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Build Your Autonomous SOC Strategy πŸ–‹οΈ

Security leaders are in a tricky position trying to discern how much new AIdriven cybersecurity tools could actually benefit a security operations center SOC. The hype about generative AI is still everywhere, but security teams have to live in reality. They face constantly incoming alerts from endpoint security platforms, SIEM tools, and phishing emails reported by internal users. Security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 4 Security Questions to Ask Your Enterprise Generative AI Provider πŸ•΅οΈβ€β™‚οΈ

Security teams should understand their providers' approach to data privacy, transparency, user guidance, and secure design and development.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Shady 'Merry-Go-Round' Ad Fraud Network Leaves Orgs Hemorrhaging Cash πŸ•΅οΈβ€β™‚οΈ

Stealthy ad fraud rings turn legitimate marketing into spam at a large scale, creating 200M bid requests daily.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Protect Yourself From a Spear Phishing Scam 🧨

As the name implies, spear phishing attacks are highly targeted scams. They often occur in professional settings, where the scammers... The post How to Protect Yourself From a Spear Phishing Scam appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 What Personal Data Do Companies Track? 🧨

Private tech companies gather tremendous amounts of user data. Understand what information is being collected by tech companies, how its being used, and how you can protect your privacy online. The post What Personal Data Do Companies Track? appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ An Argument for Coordinated Disclosure of New Exploits πŸ•΅οΈβ€β™‚οΈ

By adopting a stance of coordinated disclosure for exploits, security researchers can give organizations time to patch vulnerabilities before they are exploited in the wild.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Active Exploitation of WordPress Plugin Vulnerabilities πŸ–‹οΈ

Cybersecurity researchers have warned that multiple highseverity security vulnerabilities in WordPress plugins are being actively exploited by threat actors to create rogue administrator accounts for followon exploitation. "These vulnerabilities are found in various WordPress plugins and are prone to unauthenticated stored crosssite scripting XSS attacks due to inadequate input sanitization.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Falco 0.38.0 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 What Is ShrinkLocker? New Ransomware Targets Microsoft BitLocker Encryption Feature 🦿

The malware exploits Windows BitLocker to encrypt corporate files.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ β€˜Operation Endgame’ Hits Malware Delivery Platforms β™ŸοΈ

Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the most popular cybercrime platforms for delivering ransomware and datastealing malware. Dubbed "the largest ever operation against botnets," the international effort is being billed as the opening salvo in an ongoing campaign targeting advanced malware "droppers" or "loaders" like IcedID, Smokeloader and Trickbot.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ RedTail Crypto-Mining Malware Exploiting Palo Alto Networks Firewall Vulnerability πŸ–‹οΈ

The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security flaw impacting Palo Alto Networks firewalls to its exploit arsenal. The addition of the PANOS vulnerability to its toolkit has been complemented by updates to the malware, which now incorporates new antianalysis techniques, according to findings from web infrastructure and security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity