πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ White House Pledges $10 Million for Open Source Initiative πŸ•΅οΈβ€β™‚οΈ

The OpenSource Software Prevalence Initiative, announced at DEF CON, will examine how open source software is used in critical infrastructure.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ DARPA Announces AI Cyber Challenge Finalists πŸ•΅οΈβ€β™‚οΈ

Teams designed AI systems to secure open source infrastructure software to be used in industries like financial services, utilities, and healthcare. Each finalist was awarded a 2 million prize.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Multi-Stage ValleyRAT Targets Chinese Users with Advanced Tactics πŸ–‹οΈ

Chinesespeaking users are the target of an ongoing campaign that distributes malware known as ValleyRAT. "ValleyRAT is a multistage malware that utilizes diverse techniques to monitor and control its victims and deploy arbitrary plugins to cause further damage," Fortinet FortiGuard Labs researchers Eduardo Altares and Joie Salvio said. "Another noteworthy characteristic of this malware is its.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Hidden Security Gaps in Your SaaS Apps: Are You Doing Due Diligence? πŸ–‹οΈ

SaaS applications have become indispensable for organizations aiming to enhance productivity and streamline operations. However, the convenience and efficiency these applications offer come with inherent security risks, often leaving hidden gaps that can be exploited. Conducting thorough due diligence on SaaS apps is essential to identify and mitigate these risks, ensuring the protection of your.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Banshee Stealer Targets 100+ Browser Extensions on Apple macOS Systems πŸ–‹οΈ

Cybersecurity researchers have uncovered new stealer malware that's designed to specifically target Apple macOS systems. Dubbed Banshee Stealer, it's offered for sale in the cybercrime underground for a steep price of 3,000 a month and works across both x8664 and ARM64 architectures.  "Banshee Stealer targets a wide range of browsers, cryptocurrency wallets, and around 100 browser.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Pixel Devices Shipped with Vulnerable App, Leaving Millions at Risk πŸ–‹οΈ

A large percentage of Google's own Pixel devices shipped globally since September 2017 included dormant software that could be used to stage nefarious attacks and deliver various kinds of malware. The issue manifests in the form of a preinstalled Android app called "Showcase.apk" that comes with excessive system privileges, including the ability to remotely execute code and install arbitrary.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Mandates MFA for All Azure Sign-Ins πŸ“”

Microsoft is mandating MFA for all Azure signins, with customers given 60day advance notices to start implementation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Florida-Based National Public Data Confirms Data Breach πŸ“”

The US data broker did not address the threat actors claim that the breach concerns 2.9 billion records.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Geopolitical Tensions Drive Explosion in DDoS Attacks πŸ“”

Radware found that Web DDoS attacks rose by 265 in H1 2024, driven by hacktivist groups amid rising geopolitical tensions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… World Agricultural Cycling Competition (WACC) Participants Targeted for Havoc C2 Dissemination πŸ¦…

Key Takeaways Cyble Research and Intelligence Labs CRIL recently identified a phishing site that closely mimics the official website of the World Agricultural Cycling Competition WACC. This deceptive site was crafted by a Threat Actor TA who replicated the legitimate WACC site with only minor modifications, making it challenging for unsuspecting visitors to differentiate between the two. The World Agricultural Cycling Competition is an event held in France that aims to bridge the gap between the agriculture and sports industries. The timing and context suggest that the TA is likely targeting stakeholders and participants within this specific region and sector, aiming to exploit the event's popularity and relevance. The phishing campaign was deliberately launched in July 2024,...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hackers Using Fake Brand Sites to Spread DanaBot and StealC Malware πŸ–‹οΈ

Cybersecurity researchers have shed light on a sophisticated information stealer campaign that impersonates legitimate brands to distribute malware like DanaBot and StealC. The activity cluster, orchestrated by Russianspeaking cybercriminals and collectively codenamed Tusk, is said to encompass several subcampaigns, leveraging the reputation of the platforms to trick users into downloading the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why Are Organizations Losing the Ransomware Battle? πŸ•΅οΈβ€β™‚οΈ

Institutionalizing and sustaining fundamental cybersecurity practices requires a commitment to ongoing vigilance, active management, and a comprehensive understanding of evolving threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Bipartisan Committee Urges Investigation Into Chinese Wi-Fi Routers πŸ“”

Two Congressmen fear that the Chinese government might use TPLink WiFi routers to deploy hacking and espionage campaigns in the US.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hacker Jailed 3+ Years for Selling Stolen Credentials on Dark Web πŸ–‹οΈ

A 27yearold Russian national has been sentenced to over three years in prison for peddling financial information, login credentials, and other personally identifying information PII on a nowdefunct dark web marketplace called Slilpp. Georgy Kavzharadze, 27, of Moscow, Russia, pleaded guilty to one count of conspiracy to commit bank fraud and wire fraud earlier this February. In addition to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Security Experts Welcome NIST’s New Encryption Standards For Quantum Computers 🦿

Although quantum computing is not yet widespread, current encryption methods pose a significant risk of cyberattacks, the agency said.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Iran Reportedly Grapples With Major Cyberattack on Banking Systems πŸ•΅οΈβ€β™‚οΈ

The last known cyberattack waged against Iranian infrastructure took place last December with the blame placed on Israel and the US.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Are 2024 US Political Campaigns Prepared for the Coming Cyber Threats? πŸ•΅οΈβ€β™‚οΈ

When it comes to this year's candidates and political campaigns fending off major cyberattacks, a lot has changed since the 2016 election cycle.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Thousands of Oracle NetSuite E-Commerce Sites Expose Sensitive Customer Data πŸ•΅οΈβ€β™‚οΈ

Users of Oracle's ERP for Web storefronts might not be aware of a misconfiguration which could put customer data at risk of exposure.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ RansomHub Rolls Out Brand-New, EDR-Killing BYOVD Binary πŸ•΅οΈβ€β™‚οΈ

After loading a vulnerable driver, the utility uses a public exploit to gain privilege escalation and the ability to disable endpoint protection software.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISA, FBI Assure American Voters of Cyber-Safe Electoral Process πŸ•΅οΈβ€β™‚οΈ

Though it is possible for cyber disruptions to occur, CISA and the FBI say that ransomware will not impact casting or counting ballots.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Threat Actors Increasingly Target macOS, Report Finds 🦿

A new report from cyber threat intelligence company Intel471 reveals that threat actors are infiltrating macOS.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity