πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ OpenAI Blocks Iranian Influence Operation Using ChatGPT for U.S. Election Propaganda πŸ–‹οΈ

OpenAI on Friday said it banned a set of accounts linked to what it said was an Iranian covert influence operation that leveraged ChatGPT to generate content that, among other things, focused on the upcoming U.S. presidential election. "This week we identified and took down a cluster of ChatGPT accounts that were generating content for a covert Iranian influence operation identified as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ“’ Serious flaws in Microsoft apps on macOS could let hackers spy on users πŸ“’

The security firm said attackers could bypass permissions for Microsoft apps on macOS and gain privileges without verification.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ SolarWinds urges customers to patch critical Web Help Desk flaw πŸ“’

The vulnerability affecting SolarWinds Web Help Desk has been given a critical severity score of 9.8.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 CyberGhost vs ExpressVPN (2024): Which VPN Is Better? 🦿

While CyberGhost VPN presents an impressive amount of servers, ExpressVPNs consistent VPN speeds and strong thirdparty audits give it the edge.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Supply Chain Security Policy 🦿

With the increasing reliance on complex and global supply chains, more companies are exposed to a wide range of risks, including theft, counterfeiting, cyberattacks, natural disasters, geopolitical conflicts, and regulatory changes. These hazards can disrupt operations, compromise the quality and safety of products, and erode customer trust. So, to remain competitive and resilient, it is ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks πŸ–‹οΈ

Malicious actors are using a cloud attack tool named Xeon Sender to conduct SMS phishing and spam campaigns on a large scale by abusing legitimate services. "Attackers can use Xeon to send messages through multiple softwareasaservice SaaS providers using valid credentials for the service providers," SentinelOne security researcher Alex Delamotte said in a report shared with The Hacker News.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Microsoft Patches Zero-Day Flaw Exploited by North Korea’s Lazarus Group πŸ–‹οΈ

A newly patched security flaw in Microsoft Windows was exploited as a zeroday by Lazarus Group, a prolific statesponsored actor affiliated with North Korea. The security vulnerability, tracked as CVE202438193 CVSS score 7.8, has been described as a privilege escalation bug in the Windows Ancillary Function Driver AFD.sys for WinSock. "An attacker who successfully exploited this.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover New Infrastructure Tied to FIN7 Cybercrime Group πŸ–‹οΈ

Cybersecurity researchers have discovered new infrastructure linked to a financially motivated threat actor known as FIN7. The two clusters of potential FIN7 activity "indicate communications inbound to FIN7 infrastructure from IP addresses assigned to Post Ltd Russia and SmartApe Estonia, respectively," Team Cymru said in a report published this week as part of a joint investigation with.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” NCSC Opens Cyber Resilience Audit Scheme to Applicants πŸ“”

The UKs National Cyber Security Centre wants prospective auditors to check compliance with its Cyber Assessment Framework.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Unicoin Staff Locked Out of G-Suite in Mystery Attack πŸ“”

Employees at crypto firm Unicoin couldnt access Google services for four days during a recent breach.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber insurance claims are declining as firms take ransomware recovery into their own hands πŸ“’

Organizations are stepping up their backup capabilities to support recover, rather than being forced to meet the demands of ransomware groups.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Automate the Hardest Parts of Employee Offboarding πŸ–‹οΈ

According to recent research on employee offboarding, 70 of IT professionals say theyve experienced the negative effects of incomplete IT offboarding, whether in the form of a security incident tied to an account that wasn't deprovisioned, a surprise bill for resources that arent in use anymore, or a missed handoff of a critical resource or account. This is despite an average of five.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware Resilience Drives Down Cyber Insurance Claims πŸ“”

Cyber insurance claims in the UK have fallen by over a third between 2022 and 2024 as businesses refuse ransom payments.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Falco 0.38.2 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
β™ŸοΈ National Public Data Published Its Own Passwords β™ŸοΈ

New details are emerging about a breach at National Public Data NPD, a consumer data broker that recently spilled hundreds of millions of Americans' Social Security Numbers, addresses, and phone numbers online. KrebsOnSecurity has learned that another NPD data broker which shares access to the same consumer records inadvertently published the passwords to its backend database in a file that was freely available for download from its homepage until today.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia πŸ–‹οΈ

A new type of malware called UULoader is being used by threat actors to deliver nextstage payloads like Gh0st RAT and Mimikatz. The Cyberint Research Team, which discovered the malware, said it's distributed in the form of malicious installers for legitimate applications targeting Korean and Chinese speakers. There is evidence pointing to UULoader being the work of a Chinese speaker due to the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware πŸ–‹οΈ

Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing a loader called FakeBat. "These attacks are opportunistic in nature, targeting users seeking popular business software," the Mandiant Managed Defense team said in a technical report. "The infection utilizes a trojanized MSIX installer, which executes a PowerShell script to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FBI and CISA Assure Public on Election Ransomware Security πŸ“”

The FBI and CISA said ransomware on local networks may cause delays but won't impact voting system integrity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Tool Xeon Sender Enables Large-Scale SMS Spam Attacks πŸ“”

Xeon Sender features SMS spam via APIs, NexmoTwilio credentials validation and phone number generation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Apps for macOS Exposed to Library Injection Attacks πŸ“”

Cisco Talos researchers found a flaw in eight Microsoft apps for macOS that could enable library injection attacks, putting sensitive data at risk.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 SOCI Act 2024: Thales Report Reveals Critical Infrastructure Breaches in Australia 🦿

Thales' 2024 Data Threat Report reveals key insights for Australian critical infrastructure under the SOCI Act 2024. Our exclusive interview with Erick Reyes reveals the security impacts.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity