πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Top Tech Conferences & Events to Add to Your Calendar in 2024 🦿

A great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our 2024 tech events guide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FlyingYeti APT Serves Up Cookbox Malware Using WinRAR πŸ•΅οΈβ€β™‚οΈ

The Russiaaligned FlyingYeti's phishing campaign exploited Ukrainian citizens' financial stress to spread Cookbox malware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Banking details of 30 million Santander customers exposed during breach allegedly up for sale on the dark web πŸ“’

The ShinyHunters threat group claims to have financial data stolen during a data breach on 14 May after an attack on an unknown third party.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  RansomLord Anti-Ransomware Exploit Tool 3.1 πŸ› 

RansomLord is a proofofconcept tool that automates the creation of PE files, used to compromise ransomware preencryption. This tool uses dll hijacking to defeat ransomware by placing PE files in the x32 or x64 directories where the program is run from.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ›  jSQL Injection 0.97 πŸ› 

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S. πŸ–‹οΈ

More than 600,000 small officehome office SOHO routers are estimated to have been bricked and taken offline following a destructive cyber attack staged by unidentified cyber actors, disrupting users' access to the internet. The mysterious event, which took place between October 25 and 27, 2023, and impacted a single internet service provider ISP in the U.S., has been codenamed Pumpkin.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OpenAI Disrupts 5 AI-Powered, State-Backed Influence Ops πŸ•΅οΈβ€β™‚οΈ

Most of the operations were feckless efforts with little impact, but they illustrate how AI is changing the game for inauthentic content on both the adversary and defense sides.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ BBC Breach Puts 25K Pension Scheme Members at Risk πŸ•΅οΈβ€β™‚οΈ

Though information such as dates of birth, email addresses, and home addresses were compromised, "the Beeb" assures individuals that financial information is still protected.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🀯1
πŸ•΅οΈβ€β™‚οΈ LilacSquid APT Employs Open Source Tools, QuasarRAT πŸ•΅οΈβ€β™‚οΈ

The previously unknown threat actor uses tools similar to those used by North Korean APT groups, according to Cisco Talos.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 International Malware Takedown Seized 100+ Servers 🦿

Operation Endgame is an ongoing effort to disrupt botnets, malware droppers and malwareasaservice.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud 🧨

Authored by Dexter Shin Many government agencies provide their services online for the convenience of their citizens. Also, if this... The post Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ What happens when facial recognition gets it wrong – Week in security with Tony Anscombe πŸš€

A woman in London has been misidentified as a shoplifter by a facial recognition system amid fresh concerns over the technology's accuracy and reliability.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI Company Hugging Face Notifies Users of Suspected Unauthorized Access πŸ–‹οΈ

Artificial Intelligence AI company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform earlier this week. "We have suspicions that a subset of Spaces secrets could have been accessed without authorization," it said in an advisory. Spaces offers a way for users to create, host, and share AI and machine learning ML applications. It also functions as a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ As Allies, Kenya & US Aim to Bolster Digital Security in Africa πŸ•΅οΈβ€β™‚οΈ

Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect the country's fastgrowing digital economy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Beware: Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware πŸ–‹οΈ

Fake web browser updates are being used to deliver remote access trojans RATs and information stealer malware such as BitRAT and Lumma Stealer aka LummaC2. "Fake browser updates have been responsible for numerous malware infections, including those of the wellknown SocGholish malware," cybersecurity firm eSentire said in a new report. "In April 2024, we observed FakeBat being distributed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ 97% of FTSE 100 firms suffered supply chain breaches last year πŸ“’

Large enterprises across Europe were plagued by third and fourth party breaches last year, prompting calls for a more robust approach to supply chain security.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 TechRepublic Premium Editorial Calendar: Policies, Checklists, Hiring Kits and Glossaries for Download 🦿

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Andariel Hackers Target South Korean Institutes with New Dora RAT Malware πŸ–‹οΈ

The North Korealinked threat actor known as Andariel has been observed using a new Golangbased backdoor called Dora RAT in its attacks targeting educational institutes, manufacturing firms, and construction businesses in South Korea. "Keylogger, Infostealer, and proxy tools on top of the backdoor were utilized for the attacks," the AhnLab Security Intelligence Center ASEC said in a report.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Nearly All of FTSE 100 Exposed to Third and Fourth-Party Breaches πŸ“”

SecurityScorecard estimates 97 of UK FTSE 100 firms are at risk from supply chain breaches.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ticketmaster Confirms Breach Potentially Impacting 560 Million Users πŸ“”

Ticketing giant Live Nation has confirmed a May data breach involving tech supplier Snowflake.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 The Introduction to External Attack Surface Management: Find & Fix Hidden Threats 🌊

Cloud adoption, hybrid work, and interconnected IT ecosystems create a spreading external attack surface. This includes everything from web applications to public cloud resources, which are becoming a growing challenge for security teams. External Attack Surface Management EASM is vital in the ongoing fight against cyber threats. It offers comprehensive visibility, proactive vulnerability management, and The post The Introduction to External Attack Surface Management Find Fix Hidden Threats appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity