πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Russian Hackers Using Fake Brand Sites to Spread DanaBot and StealC Malware πŸ–‹οΈ

Cybersecurity researchers have shed light on a sophisticated information stealer campaign that impersonates legitimate brands to distribute malware like DanaBot and StealC. The activity cluster, orchestrated by Russianspeaking cybercriminals and collectively codenamed Tusk, is said to encompass several subcampaigns, leveraging the reputation of the platforms to trick users into downloading the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why Are Organizations Losing the Ransomware Battle? πŸ•΅οΈβ€β™‚οΈ

Institutionalizing and sustaining fundamental cybersecurity practices requires a commitment to ongoing vigilance, active management, and a comprehensive understanding of evolving threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Bipartisan Committee Urges Investigation Into Chinese Wi-Fi Routers πŸ“”

Two Congressmen fear that the Chinese government might use TPLink WiFi routers to deploy hacking and espionage campaigns in the US.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hacker Jailed 3+ Years for Selling Stolen Credentials on Dark Web πŸ–‹οΈ

A 27yearold Russian national has been sentenced to over three years in prison for peddling financial information, login credentials, and other personally identifying information PII on a nowdefunct dark web marketplace called Slilpp. Georgy Kavzharadze, 27, of Moscow, Russia, pleaded guilty to one count of conspiracy to commit bank fraud and wire fraud earlier this February. In addition to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Security Experts Welcome NIST’s New Encryption Standards For Quantum Computers 🦿

Although quantum computing is not yet widespread, current encryption methods pose a significant risk of cyberattacks, the agency said.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Iran Reportedly Grapples With Major Cyberattack on Banking Systems πŸ•΅οΈβ€β™‚οΈ

The last known cyberattack waged against Iranian infrastructure took place last December with the blame placed on Israel and the US.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Are 2024 US Political Campaigns Prepared for the Coming Cyber Threats? πŸ•΅οΈβ€β™‚οΈ

When it comes to this year's candidates and political campaigns fending off major cyberattacks, a lot has changed since the 2016 election cycle.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Thousands of Oracle NetSuite E-Commerce Sites Expose Sensitive Customer Data πŸ•΅οΈβ€β™‚οΈ

Users of Oracle's ERP for Web storefronts might not be aware of a misconfiguration which could put customer data at risk of exposure.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ RansomHub Rolls Out Brand-New, EDR-Killing BYOVD Binary πŸ•΅οΈβ€β™‚οΈ

After loading a vulnerable driver, the utility uses a public exploit to gain privilege escalation and the ability to disable endpoint protection software.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISA, FBI Assure American Voters of Cyber-Safe Electoral Process πŸ•΅οΈβ€β™‚οΈ

Though it is possible for cyber disruptions to occur, CISA and the FBI say that ransomware will not impact casting or counting ballots.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Threat Actors Increasingly Target macOS, Report Finds 🦿

A new report from cyber threat intelligence company Intel471 reveals that threat actors are infiltrating macOS.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Attackers Exploit Public .env Files to Breach Cloud and Social Media Accounts πŸ–‹οΈ

A largescale extortion campaign has compromised various organizations by taking advantage of publicly accessible environment variable files .env that contain credentials associated with cloud and social media applications. "Multiple security missteps were present in the course of this campaign, including the following Exposing environment variables, using longlived credentials, and absence.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OpenAI Blocks Iranian Influence Operation Using ChatGPT for U.S. Election Propaganda πŸ–‹οΈ

OpenAI on Friday said it banned a set of accounts linked to what it said was an Iranian covert influence operation that leveraged ChatGPT to generate content that, among other things, focused on the upcoming U.S. presidential election. "This week we identified and took down a cluster of ChatGPT accounts that were generating content for a covert Iranian influence operation identified as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ“’ Serious flaws in Microsoft apps on macOS could let hackers spy on users πŸ“’

The security firm said attackers could bypass permissions for Microsoft apps on macOS and gain privileges without verification.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ SolarWinds urges customers to patch critical Web Help Desk flaw πŸ“’

The vulnerability affecting SolarWinds Web Help Desk has been given a critical severity score of 9.8.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 CyberGhost vs ExpressVPN (2024): Which VPN Is Better? 🦿

While CyberGhost VPN presents an impressive amount of servers, ExpressVPNs consistent VPN speeds and strong thirdparty audits give it the edge.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Supply Chain Security Policy 🦿

With the increasing reliance on complex and global supply chains, more companies are exposed to a wide range of risks, including theft, counterfeiting, cyberattacks, natural disasters, geopolitical conflicts, and regulatory changes. These hazards can disrupt operations, compromise the quality and safety of products, and erode customer trust. So, to remain competitive and resilient, it is ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks πŸ–‹οΈ

Malicious actors are using a cloud attack tool named Xeon Sender to conduct SMS phishing and spam campaigns on a large scale by abusing legitimate services. "Attackers can use Xeon to send messages through multiple softwareasaservice SaaS providers using valid credentials for the service providers," SentinelOne security researcher Alex Delamotte said in a report shared with The Hacker News.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Microsoft Patches Zero-Day Flaw Exploited by North Korea’s Lazarus Group πŸ–‹οΈ

A newly patched security flaw in Microsoft Windows was exploited as a zeroday by Lazarus Group, a prolific statesponsored actor affiliated with North Korea. The security vulnerability, tracked as CVE202438193 CVSS score 7.8, has been described as a privilege escalation bug in the Windows Ancillary Function Driver AFD.sys for WinSock. "An attacker who successfully exploited this.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover New Infrastructure Tied to FIN7 Cybercrime Group πŸ–‹οΈ

Cybersecurity researchers have discovered new infrastructure linked to a financially motivated threat actor known as FIN7. The two clusters of potential FIN7 activity "indicate communications inbound to FIN7 infrastructure from IP addresses assigned to Post Ltd Russia and SmartApe Estonia, respectively," Team Cymru said in a report published this week as part of a joint investigation with.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” NCSC Opens Cyber Resilience Audit Scheme to Applicants πŸ“”

The UKs National Cyber Security Centre wants prospective auditors to check compliance with its Cyber Assessment Framework.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity