πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ¦… Cyble Recognized in Gartner’s Report on Digital Risk Protection Services: Hype Cycle for Cyber-Risk Management, 2024. πŸ¦…

Gartner's Hype Cycle Report, published on July 22, 2024, identified Cyble as a sample vendor in Digital Risk Protection Services for Cyber Risk Management.  The report emphasizes Cyberrisk management, which is now a top concern for executives and regulators. This provides a comprehensive overview of how different methods and techniques are being utilized to support governance, risk management, and compliance in todays fastevolving cyber landscape.  Cyble is setting new benchmarks in Digital Risk Protection Services DRPS for Cyber Risk Management.  Key Insights from Gartners July 2024 Hype Cycle Report  The rapid adoption of AI in cybersecurity during 2023 and 2024 is seen as both a potential cybersecurity risk and a valuable tool for enhancing security practices. This perspect...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 National Public Data Breach: Only 134 Million Unique Emails Leaked and Company Acknowledges Incident 🦿

In August, 2.7 billion records from National Public Data, including Social Security numbers, were leaked on a dark web forum.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are flocking to a new SMS spam tool – β€˜Xeon Sender’ exploits cloud APIs and exposed credentials to supercharge phishing campaigns πŸ“’

The Xeon Sender tool has been repurposed by numerous threat actor actors since its initial sighting in 2022.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How to implement identity and access management (IAM) effectively in your business πŸ“’

With pressure from the board and a new wave of threats, security leaders looking to implement IAM should start small and lean on the data.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” New DNS-Based Backdoor Threat Discovered at Taiwanese University πŸ“”

The Msupedge backdoor communicates with a commandandcontrol server by using DNS traffic.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Iranian Group TA453 Launches Phishing Attacks with BlackSmith πŸ“”

TA453, also known as Charming Kitten, launched a targeted phishing attack using PowerShell malware BlackSmith.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Widespread Cloud Exposure: Extortion Campaign Used Exposed AWS ENV Files to Target 110,000 Domains πŸ¦…

Key Takeaways A sophisticated cloud extortion campaign used misconfigured AWS .env files to target 110,000 domains, steal credentials and ransom cloud storage data. The threat actors obtained AWS Identity and Access Management IAM access keys by scanning for exposed .env files hosted on unsecured web applications. These environment variable files .env files define configuration variables within applications and platforms and often contain secrets. Cybles threat intelligence platform suggests that .env exposures PS1 may be more common than even this largescale attack suggests. The IAM credentials uncovered by the attackers had permissions to create new IAM roles and attach IAM policies to existing roles, which they used to create new IAM resources with unlimited access. Ove...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Detecting AWS Account Compromise: Key Indicators in CloudTrail Logs for Stolen API Keys πŸ–‹οΈ

As cloud infrastructure becomes the backbone of modern enterprises, ensuring the security of these environments is paramount. With AWS Amazon Web Services still being the dominant cloud it is important for any security professional to know where to look for signs of compromise. AWS CloudTrail stands out as an essential tool for tracking and logging API activity, providing a comprehensive.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Czech Mobile Users Targeted in New Banking Credential Theft Scheme πŸ–‹οΈ

Mobile users in the Czech Republic are the target of a novel phishing campaign that leverages a Progressive Web Application PWA in an attempt to steal their banking account credentials. The attacks have targeted the Czechbased eskoslovensk obchodn banka CSOB, as well as the Hungarian OTP Bank and the Georgian TBC Bank, according to Slovak cybersecurity company ESET. "The phishing.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Novel Phishing Method Used in Android/iOS Financial Fraud Campaigns πŸ“”

ESET detected a new phishing technique using progressive web applications PWAs as part of a largescale mobile financial scam.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Surge in Software Supply Chain Attacks Demands Heightened Third-Party Vigilance πŸ¦…

Key Takeaways  Attacks on the software supply chain have occurred at a rate of at least one every two days in 2024.  U.S. companies and IT providers have been by far the most frequent targets, accounting for onethird of all software supply chain attacks.  The UK, Australia, Germany, India and Japan have also been frequent targets, as have the aerospace defense, healthcare and manufacturing sectors.  These attacks are particularly damaging and costly because of their multiplication factor on downstream victims and trusted access to customer environments.  Even when the codebase isnt breached, customer databases contain critical information for threat actors to use in phishing, spoofing and credential attacks.  A defenseindepth approach is required to reduce risk, based on...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ GiveWP WordPress Plugin Vulnerability Puts 100,000+ Websites at Risk πŸ–‹οΈ

A maximumseverity security flaw has been disclosed in the WordPress GiveWP donation and fundraising plugin that exposes more than 100,000 websites to remote code execution attacks. The flaw, tracked as CVE20245932 CVSS score 10.0, impacts all versions of the plugin prior to version 3.14.2, which was released on August 7, 2024. A security researcher, who goes by the online alias villu164,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ CERT-UA Warns of New Vermin-Linked Phishing Attacks with PoW Bait πŸ–‹οΈ

The Computer Emergency Response Team of Ukraine CERTUA has warned of new phishing attacks that aim to infect devices with malware. The activity has been attributed to a threat cluster it tracks as UAC0020, which is also known as Vermin. The exact scale and scope of the attacks are presently unknown. The attack chains commence with phishing messages with photos of alleged prisoners of war .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Most Ransomware Attacks Now Happen at Night πŸ“”

Malwarebytes report warns security teams to be on high alert for ransomware attacks at night.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 6 Best Malware Removal Software Providers for 2024 🦿

Compare the top six malware removal software for 2024. Bitdefender leads, with Norton and Malwarebytes as strong contenders.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ It's Time To Untangle the SaaS Ball of Yarn πŸ–‹οΈ

It's no great revelation to say that SaaS applications have changed the way we operate, both in our personal and professional lives. We routinely rely on cloudbased and remote applications to conduct our basic functions, with the result that the only true perimeter of our networks has become the identities with which we log into these services. Unfortunately as is so often the case our.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Styx Stealer Creator's OPSEC Fail Leaks Client List and Profit Details πŸ–‹οΈ

In what's a case of an operational security OPSEC lapse, the operator behind a new information stealer called Styx Stealer leaked data from their own computer, including details related to the clients, profit information, nicknames, phone numbers, and email addresses. Styx Stealer, a derivative of the Phemedrone Stealer, is capable of stealing browser data, instant messenger sessions from.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New macOS Malware TodoSwift Linked to North Korean Hacking Groups πŸ–‹οΈ

Cybersecurity researchers have uncovered a new macOS malware strain dubbed TodoSwift that they say exhibits commonalities with known malicious software used by North Korean hacking groups. "This application shares several behaviors with malware we've seen that originated in North Korea DPRK specifically the threat actor known as BlueNoroff such as KANDYKORN and RustBucket," Kandji security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA to Get New Headquarters as $524M Contract Awarded πŸ“”

The building, located in Washington, DC, will be the new home of the US Cybersecurity and Infrastructure Security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Healthcare Hit by a Fifth of Ransomware Incidents πŸ“”

Healthcare has been the most targeted sector according to Barracuda analysis of 200 reported ransomware incidents from August 2023 to July 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Most Ransomware Attacks Now Happen at Night πŸ“”

Malwarebytes report warns security teams to be on high alert for ransomware attacks at night.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity