πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  RansomLord Anti-Ransomware Exploit Tool 3.1 πŸ› 

RansomLord is a proofofconcept tool that automates the creation of PE files, used to compromise ransomware preencryption. This tool uses dll hijacking to defeat ransomware by placing PE files in the x32 or x64 directories where the program is run from.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ›  jSQL Injection 0.97 πŸ› 

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S. πŸ–‹οΈ

More than 600,000 small officehome office SOHO routers are estimated to have been bricked and taken offline following a destructive cyber attack staged by unidentified cyber actors, disrupting users' access to the internet. The mysterious event, which took place between October 25 and 27, 2023, and impacted a single internet service provider ISP in the U.S., has been codenamed Pumpkin.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OpenAI Disrupts 5 AI-Powered, State-Backed Influence Ops πŸ•΅οΈβ€β™‚οΈ

Most of the operations were feckless efforts with little impact, but they illustrate how AI is changing the game for inauthentic content on both the adversary and defense sides.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ BBC Breach Puts 25K Pension Scheme Members at Risk πŸ•΅οΈβ€β™‚οΈ

Though information such as dates of birth, email addresses, and home addresses were compromised, "the Beeb" assures individuals that financial information is still protected.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🀯1
πŸ•΅οΈβ€β™‚οΈ LilacSquid APT Employs Open Source Tools, QuasarRAT πŸ•΅οΈβ€β™‚οΈ

The previously unknown threat actor uses tools similar to those used by North Korean APT groups, according to Cisco Talos.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 International Malware Takedown Seized 100+ Servers 🦿

Operation Endgame is an ongoing effort to disrupt botnets, malware droppers and malwareasaservice.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud 🧨

Authored by Dexter Shin Many government agencies provide their services online for the convenience of their citizens. Also, if this... The post Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ What happens when facial recognition gets it wrong – Week in security with Tony Anscombe πŸš€

A woman in London has been misidentified as a shoplifter by a facial recognition system amid fresh concerns over the technology's accuracy and reliability.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI Company Hugging Face Notifies Users of Suspected Unauthorized Access πŸ–‹οΈ

Artificial Intelligence AI company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform earlier this week. "We have suspicions that a subset of Spaces secrets could have been accessed without authorization," it said in an advisory. Spaces offers a way for users to create, host, and share AI and machine learning ML applications. It also functions as a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ As Allies, Kenya & US Aim to Bolster Digital Security in Africa πŸ•΅οΈβ€β™‚οΈ

Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect the country's fastgrowing digital economy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Beware: Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware πŸ–‹οΈ

Fake web browser updates are being used to deliver remote access trojans RATs and information stealer malware such as BitRAT and Lumma Stealer aka LummaC2. "Fake browser updates have been responsible for numerous malware infections, including those of the wellknown SocGholish malware," cybersecurity firm eSentire said in a new report. "In April 2024, we observed FakeBat being distributed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ 97% of FTSE 100 firms suffered supply chain breaches last year πŸ“’

Large enterprises across Europe were plagued by third and fourth party breaches last year, prompting calls for a more robust approach to supply chain security.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 TechRepublic Premium Editorial Calendar: Policies, Checklists, Hiring Kits and Glossaries for Download 🦿

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Andariel Hackers Target South Korean Institutes with New Dora RAT Malware πŸ–‹οΈ

The North Korealinked threat actor known as Andariel has been observed using a new Golangbased backdoor called Dora RAT in its attacks targeting educational institutes, manufacturing firms, and construction businesses in South Korea. "Keylogger, Infostealer, and proxy tools on top of the backdoor were utilized for the attacks," the AhnLab Security Intelligence Center ASEC said in a report.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Nearly All of FTSE 100 Exposed to Third and Fourth-Party Breaches πŸ“”

SecurityScorecard estimates 97 of UK FTSE 100 firms are at risk from supply chain breaches.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ticketmaster Confirms Breach Potentially Impacting 560 Million Users πŸ“”

Ticketing giant Live Nation has confirmed a May data breach involving tech supplier Snowflake.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 The Introduction to External Attack Surface Management: Find & Fix Hidden Threats 🌊

Cloud adoption, hybrid work, and interconnected IT ecosystems create a spreading external attack surface. This includes everything from web applications to public cloud resources, which are becoming a growing challenge for security teams. External Attack Surface Management EASM is vital in the ongoing fight against cyber threats. It offers comprehensive visibility, proactive vulnerability management, and The post The Introduction to External Attack Surface Management Find Fix Hidden Threats appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Snowflake data breach claims spark war of words over culpability πŸ“’

Snowflake CISO Brad Jones hit back at claims the Ticketmaster and Santander data breaches were caused by platform vulnerabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Price Drop: Learn Cybersecurity Skills From Scratch for Just $35 🦿

Save on tech services or switch to a lucrative new tech career by training at your own pace to develop highdemand cybersecurity skills. Get this bundle at 34.97 through June 9.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researcher Uncovers Flaws in Cox Modems, Potentially Impacting Millions πŸ–‹οΈ

Nowpatched authorization bypass issues impacting Cox modems that could have been abused as a starting point to gain unauthorized access to the devices and run malicious commands. "This series of vulnerabilities demonstrated a way in which a fully external attacker with no prerequisites could've executed commands and modified the settings of millions of modems, accessed any business customer's.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity