πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ New Gafgyt Botnet Variant Targets Weak SSH Passwords for GPU Crypto Mining πŸ–‹οΈ

Cybersecurity researchers have discovered a new variant of the Gafgyt botnet that's targeting machines with weak SSH passwords to ultimately mine cryptocurrency on compromised instances using their GPU computational power. This indicates that the "IoT botnet is targeting more robust servers running on cloud native environments," Aqua Security researcher Assaf Morag said in a Wednesday analysis.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Thousands targeted with phishing emails after cyber attack on Greater Manchester councils πŸ“’

Manchester, Salford, and Bolton are just the latest local authorities to be targeted by cyber criminals.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Suspected leader of 'prolific' Reveton ransomware group arrested and deported to US πŸ“’

Maksim Silnikau aka J.P. Morgan is accused of being behind the Reveton ransomware as a service and Angler exploit kit.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Deepfake attacks are prompting drastic security changes at enterprises πŸ“’

Deepfake attacks have wrought havoc on unsuspecting victims over the last year, and the method is expected to grow in popularity.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How Can Organizations Navigate SEC's Cyber Materiality Disclosures? πŸ•΅οΈβ€β™‚οΈ

Inconsistencies and lack of information in cybersecurity disclosures highlight the need for organizations to establish a robust materiality assessment framework.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Beyond the Hype: Unveiling the Realities of WormGPT in Cybersecurity πŸ•΅οΈβ€β™‚οΈ

Though WormGPT tools may not be a major problem now, organizations can't let their guard down.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Private Internet Access (PIA) vs ExpressVPN (2024): Which VPN Is Better? 🦿

ExpressVPNs overall polish, fast performance and wider server network give it a slight edge over PIA VPNs featurerich and affordable package.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Clam AntiVirus Toolkit 1.4.0 πŸ› 

Clam AntiVirus is an antivirus toolkit for Unix. The main purpose of this software is the integration with mail servers attachment scanning. The package provides a flexible and scalable multithreaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. This is the LTS source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🧠 CISOs list human error as their top cybersecurity risk 🧠

With cybersecurity, the focus often is on technology specifically, how cyber criminals use it to conduct attacks and the tools that organizations can use to keep their systems and data safe. However, this overlooks the most important element in cybersecurity risk human error. Human risk in cybersecurity Proofpoints 2024 Voice of the CISO report The post CISOs list human error as their top cybersecurity risk appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SolarWinds Releases Patch for Critical Flaw in Web Help Desk Software πŸ–‹οΈ

SolarWinds has released patches to address a critical security vulnerability in its Web Help Desk software that could be exploited to execute arbitrary code on susceptible instances. The flaw, tracked as CVE202428986 CVSS score 9.8, has been described as a deserialization bug. "SolarWinds Web Help Desk was found to be susceptible to a Java deserialization remote code execution vulnerability.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian-Linked Hackers Target Eastern European NGOs and Media πŸ–‹οΈ

Russian and Belarusian nonprofit organizations, Russian independent media, and international nongovernmental organizations active in Eastern Europe have become the target of two separate spearphishing campaigns orchestrated by threat actors whose interests align with that of the Russian government. While one of the campaigns dubbed River of Phish has been attributed to COLDRIVER, an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Identity Threat Detection and Response Solution Guide πŸ–‹οΈ

The Emergence of Identity Threat Detection and Response Identity Threat Detection and Response ITDR has emerged as a critical component to effectively detect and respond to identitybased attacks. Threat actors have shown their ability to compromise the identity infrastructure and move laterally into IaaS, Saas, PaaS and CICD environments. Identity Threat Detection and Response solutions help.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks πŸ–‹οΈ

A cybercrime group with links to the RansomHub ransomware has been observed using a new tool designed to terminate endpoint detection and response EDR software on compromised hosts, joining the likes of other similar programs like AuKill aka AvNeutralizer and Terminator. The EDRkilling utility has been dubbed EDRKillShifter by cybersecurity company Sophos, which discovered the tool in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cyber-criminals Exploited Paris Olympics With Fake Domains πŸ“”

166 Olympicsrelated domains displayed signs of DNS abuse like keyword stuffing and typosquatting.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Advanced ValleyRAT Campaign Hits Windows Users in China πŸ“”

Discovered by FortiGuard Labs, the ValleyRAT campaign targets Chinese Windows systems.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Cyber-criminals Exploited Paris Olympics With Fake Domains πŸ“”

166 Olympicsrelated domains displayed signs of DNS abuse like keyword stuffing and typosquatting.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Advanced ValleyRAT Campaign Hits Windows Users in China πŸ“”

Discovered by FortiGuard Labs, the ValleyRAT campaign targets Chinese Windows systems.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russia's FSB Behind Massive Phishing Espionage Campaign πŸ“”

Citizen Lab attributed the campaign to Coldriver, a notorious FSB subordinate team, and Coldwastrel, a new, Russianaligned group.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Another Record Year For Ransomware Beckons as Crypto Profits Hit $460m πŸ“”

Ransom payments in the first half of 2024 hit 460m, according to Chainalysis.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Warns of Iranian Cyber-Attacks on Presidential Campaigns πŸ“”

Google has highlighted sophisticated spearphishing attacks by Iranian state actor APT42 targeting individuals associated with the US Presidential campaign.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SolarWinds Urges Upgrade After Revealing Critical RCE Bug πŸ“”

SolarWinds has discovered and fixed a critical remote code execution vulnerability in Web Help Desk.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity