πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Most Ransomware Attacks Now Happen at Night πŸ“”

Malwarebytes report warns security teams to be on high alert for ransomware attacks at night.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 6 Best Malware Removal Software Providers for 2024 🦿

Compare the top six malware removal software for 2024. Bitdefender leads, with Norton and Malwarebytes as strong contenders.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ It's Time To Untangle the SaaS Ball of Yarn πŸ–‹οΈ

It's no great revelation to say that SaaS applications have changed the way we operate, both in our personal and professional lives. We routinely rely on cloudbased and remote applications to conduct our basic functions, with the result that the only true perimeter of our networks has become the identities with which we log into these services. Unfortunately as is so often the case our.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Styx Stealer Creator's OPSEC Fail Leaks Client List and Profit Details πŸ–‹οΈ

In what's a case of an operational security OPSEC lapse, the operator behind a new information stealer called Styx Stealer leaked data from their own computer, including details related to the clients, profit information, nicknames, phone numbers, and email addresses. Styx Stealer, a derivative of the Phemedrone Stealer, is capable of stealing browser data, instant messenger sessions from.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New macOS Malware TodoSwift Linked to North Korean Hacking Groups πŸ–‹οΈ

Cybersecurity researchers have uncovered a new macOS malware strain dubbed TodoSwift that they say exhibits commonalities with known malicious software used by North Korean hacking groups. "This application shares several behaviors with malware we've seen that originated in North Korea DPRK specifically the threat actor known as BlueNoroff such as KANDYKORN and RustBucket," Kandji security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA to Get New Headquarters as $524M Contract Awarded πŸ“”

The building, located in Washington, DC, will be the new home of the US Cybersecurity and Infrastructure Security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Healthcare Hit by a Fifth of Ransomware Incidents πŸ“”

Healthcare has been the most targeted sector according to Barracuda analysis of 200 reported ransomware incidents from August 2023 to July 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Most Ransomware Attacks Now Happen at Night πŸ“”

Malwarebytes report warns security teams to be on high alert for ransomware attacks at night.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microchip Technology Says IT Incident Impacted Operations πŸ“”

US chip firm Microchip reveals operational disruption stemming from cyber incident.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The top API risks of 2024 and how to mitigate them πŸ“’

While APIs are the backbone of online applications, they can offer a backdoor to sensitive information making API monitoring by IT teams an absolute imperative.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ NIS2 is a double-edged sword for the IT channel πŸ“’

NIS2 presents demanding new compliance obligations for channel partners, but it's vital if they are going to build the resilience they need in today's threat landscape.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Toyota’s cyber woes continue as latest breach marks fifth major IT incident in two years πŸ“’

Toyota is once again in the headlines after a hacker collective claimed to have exfiltrated 240GB of sensitive data from the car manufacturers internal systems.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ransomware gangs are rolling in cash, with hackers taking home $459.8 million in the first half of 2024 alone πŸ“’

Ransomware criminals are ramping up attacks globally and reaping the financial rewards.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Australia Calls Off Clearview AI Investigation Despite Lack of Compliance πŸ“”

Australias data protection watchdog has decided to stop its investigation into US facial recognition company Clearview AI.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Oregon Zoo Warns Over 100,000 Customers of Payment Card Compromise πŸ“”

Oregon Zoo revealed that an unauthorized actor potentially obtained payment card information used in transactions over six months.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 More than 3 in 4 Tech Leaders Worry About SaaS Security Threats, New Survey Reveals 🦿

The average enterprise uses 130 different SaaS applications today, up from 80 in 2020, according to Onymos.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New MoonPeak RAT Linked to North Korean Threat Group UAT-5394 πŸ“”

The MoonPeak RAT as used by UAT5394 showed a possible connection to North Korean threat Kimsuky.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data πŸ–‹οΈ

Cybersecurity researchers have disclosed a critical security flaw impacting Microsoft's Copilot Studio that could be exploited to access sensitive information. Tracked as CVE202438206 CVSS score 8.5, the vulnerability has been described as an information disclosure bug stemming from a serverside request forgery SSRF attack. "An authenticated attacker can bypass ServerSide Request.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Hackers Deploy New MoonPeak Trojan in Cyber Campaign πŸ–‹οΈ

A new remote access trojan called MoonPeak has been discovered as being used by a statesponsored North Korean threat activity cluster as part of a new campaign. Cisco Talos attributed the malicious cyber campaign to a hacking group it tracks as UAT5394, which it said exhibits some level of tactical overlaps with a known nationstate actor codenamed Kimsuky. MoonPeak, under active development.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New MoonPeak RAT Linked to North Korean Threat Group UAT-5394 πŸ“”

The MoonPeak RAT as used by UAT5394 showed a possible connection to North Korean threat Kimsuky.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Critical LiteSpeed Cache Plugin Flaw Exposes WordPress Sites πŸ“”

The LiteSpeed Cache flaw may expose millions of WordPress sites to severe security risks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity