πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.2K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide πŸ–‹οΈ

Cybersecurity researchers have uncovered a hardware backdoor within a particular model of MIFARE Classic contactless cards that could allow authentication with an unknown key and open hotel rooms and office doors. The attacks have been demonstrated against FM11RF08S, a new variant of MIFARE Classic that was released by Shanghai Fudan Microelectronics in 2020. "The FM11RF08S backdoor enables any.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hardcoded Credential Vulnerability Found in SolarWinds Web Help Desk πŸ–‹οΈ

SolarWinds has issued patches to address a new security flaw in its Web Help Desk WHD software that could allow remote unauthenticated users to gain unauthorized access to susceptible instances. "The SolarWinds Web Help Desk WHD software is affected by a hardcoded credential vulnerability, allowing a remote unauthenticated user to access internal functionality and modify data," the company.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese Hackers Exploit Zero-Day Cisco Switch Flaw to Gain System Control πŸ–‹οΈ

Details have emerged about a Chinanexus threat group's exploitation of a recently disclosed, nowpatched security flaw in Cisco switches as a zeroday to seize control of the appliances and evade detection. The activity, attributed to Velvet Ant, was observed early this year and involved the weaponization of CVE202420399 CVSS score 6.0 to deliver bespoke malware and gain extensive control.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New 'ALBeast' Vulnerability Exposes Weakness in AWS Application Load Balancer πŸ–‹οΈ

As many as 15,000 applications using Amazon Web Services' AWS Application Load Balancer ALB for authentication are potentially susceptible to a configurationbased issue that could expose them to sidestep access controls and compromise applications. That's according to findings from Israeli cybersecurity company Miggo, which dubbed the problem ALBeast. "This vulnerability allows attackers to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cthulhu Stealer Malware Targets macOS With Deceptive Tactics πŸ“”

Cthulhu Stealer targets macOS, posing a major threat by disguising as legitimate software via DMG files.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FAA Admits Gaps in Aircraft Cybersecurity Rules: New Regulation Proposed πŸ“”

The US FAA has proposed new rules for aircraft to address cyber vulnerabilities caused by the increased interconnectivity of critical systems.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 3400 High and Critical Cyber Alerts Recorded in First Half of 2024 πŸ“”

The United States bore most of these cyberthreats, with a 46.15 rise in attacks compared to 2023.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Company Fined $1m for Fake Joe Biden AI Calls πŸ“”

FCC charges Lingo Telecom with 1m fine over voice deepfake during the 2024 New Hampshire primary election.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… New Cheana Stealer Targets VPN Users Across Multiple Operating Systems πŸ¦…

Key takeaways  Cyble Research and Intelligence Lab CRIL has identified a phishing site impersonating a VPN provider. The site specifically targets individuals downloading Virtual Private Network VPN applications for Windows, Linux, and macOS.  The Threat Actor TA has created distinct binaries for each platformWindows, Linux, and macOStargeting users across these systems.  The Windows version of the stealer targets cryptocurrencyrelated browser extensions, standalone crypto wallets, and stored browser passwords.  The Linux Version of the stealer Focuses on cryptocurrency browser extensions, standalone crypto wallets, browser login data, cookies, and SSH keys.  In addition to cryptocurrency browser extensions and crypto wallets, MacOS version steals browser login data...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Comprehensive Analysis of Critical Vulnerabilities in Atlassian Products πŸ¦…

Key Takeaways CERTIn's August 2024 bulletin emphasizes the urgent need for organizations to update their Atlassian products due to critical vulnerabilities. Prompt patch application is essential to address these highseverity issues and mitigate risks.  The vulnerabilities uncovered span a range of severe risks, including arbitrary code execution, crosssite scripting XSS, and privilege escalation. These affect multiple Atlassian products, such as Bamboo, Confluence, and Jira, posing significant security threats.  Critical vulnerabilities are linked to specific versions of Atlassian software Bamboo versions prior to 9.6.5, Confluence versions before 8.9.5, Crowd versions below 5.3.2, Jira versions older than 9.17.1, and Jira Service Management versions before 5.17.1.   No...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Implementation Challenges in Privacy-Preserving Federated Learning πŸͺ–

In this post, we talk with Dr. Xiaowei Huang and Dr. Yi Dong University of Liverpool, Dr. Mat Weldon United Kingdom UK Office of National Statistics ONS, and Dr. Michael Fenton Trata who were winners in the UKUS PrivacyEnhancing Technologies PETs Prize Challenges. We discuss implementation challenges of privacypreserving federated learning PPFL specifically, the areas of threat modeling and real world deployments. Threat Modeling In research on privacypreserving federated learning PPFL, the protections of a PPFL system are usually encoded in a threat model that defines.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  UFONet 1.9 πŸ› 

UFONet abuses OSI Layer 7HTTP to createmanage 'zombies' and to conduct different attacks using GETPOST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Local Networks Go Global When Domain Names Collide β™ŸοΈ

The proliferation of new toplevel domains TLDs has exacerbated a wellknown security weakness Many organizations set up their internal Microsoft authentication systems years ago using domain names in TLDs that didn't exist at the time. Meaning, they are continuously sending their Windows usernames and passwords to domain names they do not control and which are freely available for anyone to register. Here's a look at one security researcher's efforts to map and shrink the size of this insidious problem.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 How Paris Olympic authorities battled cyberattacks, and won gold 🧠

The Olympic Games Paris 2024 was by most accounts a highly successful Olympics. Some 10,000 athletes from 204 nations competed in 329 events over 16 days. But before and during the event, authorities battled Olympicsize cybersecurity threats coming from multiple directions. In preparation for expected attacks, authorities took several proactive measures to ensure the security The post How Paris Olympic authorities battled cyberattacks, and won gold appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New PEAKLIGHT Dropper Deployed in Attacks Targeting Windows with Malicious Movie Downloads πŸ–‹οΈ

Cybersecurity researchers have uncovered a neverbeforeseen dropper that serves as a conduit to launch nextstage malware with the ultimate goal of infecting Windows systems with information stealers and loaders. "This memoryonly dropper decrypts and executes a PowerShellbased downloader," Googleowned Mandiant said. "This PowerShellbased downloader is being tracked as PEAKLIGHT." Some of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Webinar: Experience the Power of a Must-Have All-in-One Cybersecurity Platform πŸ–‹οΈ

Let's be honest. The world of cybersecurity feels like a constant war zone. You're bombarded by threats, scrambling to keep up with patches, and drowning in an endless flood of alerts. It's exhausting, isnt it? But what if there was a better way? Imagine having every essential cybersecurity tool at your fingertips, all within a single, intuitive platform, backed by expert support 247. This is.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Focus on What Matters Most: Exposure Management and Your Attack Surface πŸ–‹οΈ

Read the full article for key points from Intruders VP of Product, Andy Hornegolds recent talk on exposure management. If youd like to hear Andys insights firsthand, watch Intruders ondemand webinar. To learn more about reducing your attack surface, reach out to their team today.  Attack surface management vs exposure management Attack surface management ASM is the ongoing.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data πŸ–‹οΈ

The threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored in Google Chrome browsers on a small set of compromised endpoints. The use of credential harvesting in connection with a ransomware infection marks an unusual twist, and one that could have cascading consequences, cybersecurity firm Sophos said in a Thursday report. The attack, detected in July.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ NGate Android malware relays NFC traffic to steal cash πŸš€

Android malware discovered by ESET Research relays NFC data from victims payment cards, via victims mobile phones, to the device of a perpetrator waiting at an ATM.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Georgia Tech Sued Over Cybersecurity Violations πŸ“”

The US government has filed a lawsuit against Georgia Tech for alleged cybersecurity violations as a Department of Defense contractor.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Qilin Caught Red-Handed Stealing Credentials in Google Chrome πŸ“”

Browser credential harvesting is an unusual activity for a ransomware group.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity