πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Ways iOS Sideloading Can Be More Secure πŸ•΅οΈβ€β™‚οΈ

Sideloading apps is now possible on iOS devices, forcing Apple to add some security features in an attempt to mitigate the dangers of loading unknown apps.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Oracle WebLogic Server OS Command Injection Flaw Under Active Attack πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday added a security flaw impacting the Oracle WebLogic Server to the Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. Tracked as CVE20173506 CVSS score 7.4, the issue concerns an operating system OS command injection vulnerability that could be exploited to obtain unauthorized.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ DarkGate Malware Replaces AutoIt with AutoHotkey in Latest Cyber Attacks πŸ–‹οΈ

Cyber attacks involving the DarkGate malwareasaservice MaaS operation have shifted away from AutoIt scripts to an AutoHotkey mechanism to deliver the last stages, underscoring continued efforts on the part of the threat actors to continuously stay ahead of the detection curve. The updates have been observed in version 6 of DarkGate released in March 2024 by its developer RastaFarEye, who.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ The murky world of password leaks – and how to check if you’ve been hit πŸš€

Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky unless you know where to look.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Conflicts Drive DDoS Attack Surge in EMEA πŸ“”

Akamai research found DDoS attacks in EMEA surpassed North America in Q1 2024, with ongoing conflicts helping driving a surge of incidents in the region.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: UK Businesses Faced with Month-Long Recoveries from Supply Chain Attacks πŸ“”

A new BlackBerry survey reveals frequent software supply chain attacks in the UK, highlighting the need for improved security measures and robust guidance for software vendors.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Disgruntled ex-employees are using β€˜weaponized’ data subject access requests to pester firms πŸ“’

Some disgruntled staff are using DSARs as a means to pressure former employers into a financial settlement.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 6 Best VPNs for the UK in 2024 🦿

VPN capabilities and performance levels differ from place to place. Which VPNs are best for U.K. users and expats?.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How to Start a Career in Cybersecurity 🦿

Cybersecurity is a booming career path for professionals looking to enhance the value of their skillsets in the 2020s. This guide, written by Madeline Clarke for TechRepublic Premium, highlights the methods people can take to begin a career in cybersecurity, provides expert insights from industry professionals and discusses the varying factors surrounding this lucrative area ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Snowflake Warns: Targeted Credential Theft Campaign Hits Cloud Customers πŸ–‹οΈ

Cloud computing and analytics company Snowflake said a "limited number" of its customers have been singled out as part of a targeted campaign. "We have not identified evidence suggesting this activity was caused by a vulnerability, misconfiguration, or breach of Snowflakes platform," the company said in a joint statement along with CrowdStrike and Googleowned Mandiant. "We have not identified.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec24: Deepfake Expert Warns of β€œAI Tax Havens” πŸ“”

Keynote speaker Henry Ajder warns that regulatory measures may be undermined if some countries ignore global rules.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Next Generation of RBI (Remote Browser Isolation) πŸ–‹οΈ

The landscape of browser security has undergone significant changes over the past decade. While Browser Isolation was once considered the gold standard for protecting against browser exploits and malware downloads, it has become increasingly inadequate and insecure in today's SaaScentric world. The limitations of Browser Isolation, such as degraded browser performance and inability to tackle.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Use MS Excel Macro to Launch Multi-Stage Malware Attack in Ukraine πŸ–‹οΈ

A new sophisticated cyber attack has been observed targeting endpoints geolocated to Ukraine with an aim to deploy Cobalt Strike and seize control of the compromised hosts. The attack chain, per Fortinet FortiGuard Labs, involves a Microsoft Excel file that carries an embedded VBA macro to initiate the infection, "The attacker uses a multistage malware strategy to deliver the notorious 'Cobalt.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ NIST Commits to Vulnerability Plan, But Researchers' Concerns Remain πŸ•΅οΈβ€β™‚οΈ

The agency aims to burn down the backlog of vulnerabilities that need enrichment using additional funding and a thirdparty contract, but what's the longterm solution?.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec24: Enterprise Browser Touted as Solution to GenAI Privacy Risks πŸ“”

Island Technologies discusses the security and user experience benefits of the enterprise browser.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… UNC1151 Strikes Again: Unveiling Their Tactics Against Ukraine’s Ministry of Defence πŸ¦…

Key Takeaways  Cyble Research and Intelligence Labs CRIL recently encountered a campaign using a malicious Excel document linked to the UNC1151 APT group.   The UNC1151 APT group, originating from Belarus, is notorious for targeting Eastern European countries, including Ukraine, Lithuania, Latvia, Poland, and others.  In the recent campaign, there are indications that the group is possibly targeting Ukraine, with a potential focus on the Ministry of Defence based on the lure document.  Upon execution of the lure Excel document, which contains an embedded VBA Macro content that drops an LNK and a DLL loader file. Subsequently, running the LNK file initiates the DLL loader, potentially leading to a final payload infection.  In last year's campaign, the Threat Actor TA obtaine...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Perfecting the Proactive Security Playbook πŸ•΅οΈβ€β™‚οΈ

It's more important than ever for organizations to prepare themselves and their cybersecurity postures against known and unknown threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Multi-Stage Malware Targets Windows Users in Ukraine πŸ“”

Discovered by FortiGuard Labs, the attack leverages an Excel file embedded with a VBA macro.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cox Biz Auth-Bypass Bug Exposes Millions of Devices to Takeover πŸ•΅οΈβ€β™‚οΈ

The US broadband provider fixed an issue that allowed attackers to gain access to business customers modems, and then access info and execute commands with the same permissions of an ISP support team.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: How to Develop Your Future Team πŸ“”

Expert panel advises CISOs to look beyond pay and at career progression and worklife balance to fill skills gaps.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber attacks force London hospital trusts to suspend non-emergency operations πŸ“’

The cyber attacks have caused widespread disruption for patients and staff.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity