πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Ticketmaster hackers could have exploited AWS instances to gain access to half a billion customer records πŸ“’

The Ticketmaster breach was reportedly due to threat actors exploiting vulnerable AWS instances.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🀬1
🦿 Do VPNs Change or Hide Your IP Address? 🦿

Will a virtual private network change your IP address? Find out in this article and discover what a VPN doesnt hide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Password auditing: Purge weak passwords from your organization πŸ“’

Scan your Active Directory for passwordrelated vulnerabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Europol Shuts Down 100+ Servers Linked to IcedID, TrickBot, and Other Malware πŸ–‹οΈ

Europol on Thursday said it shut down the infrastructure associated with several malware loader operations such as IcedID, SystemBC, PikaBot, SmokeLoader, Bumblebee, and TrickBot as part of a coordinated law enforcement effort codenamed Operation Endgame. "The actions focused on disrupting criminal services through arresting High Value Targets, taking down the criminal infrastructures and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The dark web is absolutely awash with stolen data on British MPs πŸ“’

Dark web marketplaces are full to the brim with email addresses and personal information belonging to British politicians.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Build Your Autonomous SOC Strategy πŸ–‹οΈ

Security leaders are in a tricky position trying to discern how much new AIdriven cybersecurity tools could actually benefit a security operations center SOC. The hype about generative AI is still everywhere, but security teams have to live in reality. They face constantly incoming alerts from endpoint security platforms, SIEM tools, and phishing emails reported by internal users. Security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 4 Security Questions to Ask Your Enterprise Generative AI Provider πŸ•΅οΈβ€β™‚οΈ

Security teams should understand their providers' approach to data privacy, transparency, user guidance, and secure design and development.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Shady 'Merry-Go-Round' Ad Fraud Network Leaves Orgs Hemorrhaging Cash πŸ•΅οΈβ€β™‚οΈ

Stealthy ad fraud rings turn legitimate marketing into spam at a large scale, creating 200M bid requests daily.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Protect Yourself From a Spear Phishing Scam 🧨

As the name implies, spear phishing attacks are highly targeted scams. They often occur in professional settings, where the scammers... The post How to Protect Yourself From a Spear Phishing Scam appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 What Personal Data Do Companies Track? 🧨

Private tech companies gather tremendous amounts of user data. Understand what information is being collected by tech companies, how its being used, and how you can protect your privacy online. The post What Personal Data Do Companies Track? appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ An Argument for Coordinated Disclosure of New Exploits πŸ•΅οΈβ€β™‚οΈ

By adopting a stance of coordinated disclosure for exploits, security researchers can give organizations time to patch vulnerabilities before they are exploited in the wild.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Active Exploitation of WordPress Plugin Vulnerabilities πŸ–‹οΈ

Cybersecurity researchers have warned that multiple highseverity security vulnerabilities in WordPress plugins are being actively exploited by threat actors to create rogue administrator accounts for followon exploitation. "These vulnerabilities are found in various WordPress plugins and are prone to unauthenticated stored crosssite scripting XSS attacks due to inadequate input sanitization.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Falco 0.38.0 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 What Is ShrinkLocker? New Ransomware Targets Microsoft BitLocker Encryption Feature 🦿

The malware exploits Windows BitLocker to encrypt corporate files.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ β€˜Operation Endgame’ Hits Malware Delivery Platforms β™ŸοΈ

Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the most popular cybercrime platforms for delivering ransomware and datastealing malware. Dubbed "the largest ever operation against botnets," the international effort is being billed as the opening salvo in an ongoing campaign targeting advanced malware "droppers" or "loaders" like IcedID, Smokeloader and Trickbot.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ RedTail Crypto-Mining Malware Exploiting Palo Alto Networks Firewall Vulnerability πŸ–‹οΈ

The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security flaw impacting Palo Alto Networks firewalls to its exploit arsenal. The addition of the PANOS vulnerability to its toolkit has been complemented by updates to the malware, which now incorporates new antianalysis techniques, according to findings from web infrastructure and security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” First American Reveals Data Breach Impacting 44,000 Individuals πŸ“”

The cyberattack, which occurred in December 2023, forced First American to shut down some systems.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Okta Warns Once Again of Credential-Stuffing Attacks πŸ•΅οΈβ€β™‚οΈ

This time it's the identity management service provider's crossorigin authentication feature that's being targeted by adversaries.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Important details about CIRCIA ransomware reporting 🧠

In March 2022, the Biden Administration signed into law the Cyber Incident Reporting for Critical Infrastructure Act of 2022 CIRCIA. This landmark legislation tasks the Cybersecurity and Infrastructure Security Agency CISA to develop and implement regulations requiring covered entities to report covered cyber incidents and ransomware payments. The CIRCIA incident reports are meant to enable The post Important details about CIRCIA ransomware reporting appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cyber Espionage Alert: LilacSquid Targets IT, Energy, and Pharma Sectors πŸ–‹οΈ

A previously undocumented cyber espionagefocused threat actor named LilacSquid has been linked to targeted attacks spanning various sectors in the United States U.S., Europe, and Asia as part of a data theft campaign since at least 2021. "The campaign is geared toward establishing longterm access to compromised victim organizations to enable LilacSquid to siphon data of interest to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Europol-Led Operation Endgame Hits Botnet, Ransomware Networks πŸ“”

The operation targeted several significant malware droppers, including IcedID, SystemBC, Pikabot, Smokeloader and Bumblebee.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity