πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.2K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Cybercriminals Deploy New Malware to Steal Data via Android’s Near Field Communication (NFC) 🦿

A new malware called NGate allows cybercriminals to steal near field communication data from Android phones via sophisticated social engineering. The data is relayed to the fraudsters before being used to steal cash.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Constantly Evolving MoonPeak RAT Linked to North Korean Spying πŸ•΅οΈβ€β™‚οΈ

The malware is a customized variant of the powerful open source XenoRAT information stealing malware often deployed by Kimsuky and other DPRK APTs.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ NIST Hands Off Post-Quantum Cryptography Work to Cyber Teams πŸ•΅οΈβ€β™‚οΈ

The release of new NIST quantumproof cryptography standards signals it's time for cybersecurity teams to get serious about preparing for the rise of quantum threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Patch Now: Second SolarWinds Critical Bug in Web Help Desk πŸ•΅οΈβ€β™‚οΈ

The disclosure of CVE202428987 means that, in two weeks, there have been two critical bugs and corresponding patches for SolarWinds' lessoftendiscussed IT help desk software.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Liverpool Fans Take English Premier League Title for Ticket Scams πŸ•΅οΈβ€β™‚οΈ

Ticket scams are costing football fans close to 200 a season, on average, according to a report.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ C-Suite Involvement in Cybersecurity Is Little More Than Lip Service πŸ•΅οΈβ€β™‚οΈ

Collaboration with security teams, making cybersecurity a core principle of business strategy, and investing in defenses better position organizations to thwart threats and ensure business continuity.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ NFC Traffic Stealer Targets Android Users & Their Banking Info πŸ•΅οΈβ€β™‚οΈ

The malware builds on a nearfield communication tool in combination with phishing and social engineering to steal cash.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ NSA Issues Tips for Better Logging, Threat Detection in LotL Incidents πŸ•΅οΈβ€β™‚οΈ

The guidance is part of a coordinated, global effort to eradicate livingofftheland techniques used against critical infrastructure.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ PWA phishing on Android and iOS – Week in security with Tony Anscombe πŸš€

Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA has placed a security flaw impacting Versa Director to its Known Exploited Vulnerabilities KEV catalog based on evidence of active exploitation. The mediumseverity vulnerability, tracked as CVE202439717 CVSS score 6.6, is case of file upload bug impacting the "Change Favicon" feature that could allow a threat actor to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Meta Exposes Iranian Hacker Group Targeting Global Political Figures on WhatsApp πŸ–‹οΈ

Meta Platforms on Friday became the latest company after Microsoft, Google, and OpenAI to expose the activities of an Iranian statesponsored threat actor, who it said used a set of WhatsApp accounts that attempted to target individuals in Israel, Palestine, Iran, the U.K., and the U.S. The activity cluster, which originated from Iran, "appeared to have focused on political and diplomatic.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Telegram Founder Pavel Durov Arrested in France for Content Moderation Failures πŸ–‹οΈ

Pavel Durov, founder and chief executive of the popular messaging app Telegram, was arrested in France on Saturday, according to French television network TF1. Durov is believed to have been apprehended pursuant to a warrant issued in connection with a preliminary police investigation. TF1 said the probe was focused on a lack of content moderation on the instant messaging service, which the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Linux Malware 'sedexp' Hides Credit Card Skimmers Using Udev Rules πŸ–‹οΈ

Cybersecurity researchers have uncovered a new stealthy piece of Linux malware that leverages an unconventional technique to achieve persistence on infected systems and hide credit card skimmer code. The malware, attributed to a financially motivated threat actor, has been codenamed sedexp by Aon's Stroz Friedberg incident response services team. "This advanced threat, active since 2022, hides.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ•΅οΈβ€β™‚οΈ India's Critical Infrastructure Suffers Spike in Cyberattacks πŸ•΅οΈβ€β™‚οΈ

The financial and government sectors have come under increasing attacks in India, with the Reserve Bank of India RBI warning banks to double down on cybersecurity.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Flaws in Traccar GPS System Expose Users to Remote Attacks πŸ–‹οΈ

Two security vulnerabilities have been disclosed in the opensource Traccar GPS tracking system that could be potentially exploited by unauthenticated attackers to achieve remote code execution under certain circumstances. Both the vulnerabilities are path traversal flaws and could be weaponized if guest registration is enabled, which is the default configuration for Traccar 5, Horizon3.ai.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Android Malware NGate Steals NFC Data to Clone Contactless Payment Cards πŸ–‹οΈ

Cybersecurity researchers have uncovered new Android malware that can relay victims' contactless payment data from physical credit and debit cards to an attackercontrolled device with the goal of conducting fraudulent operations. The Slovak cybersecurity company is tracking the novel malware as NGate, stating it observed the crimeware campaign targeting three banks in Czechia. The malware "has.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese Velvet Ant Uses Cisco Zero-Day to Deploy Custom Malware πŸ“”

The Chinese cyber espionage group was observed jailbreaking a Cisco switch appliance using a zeroday exploit.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1πŸ”₯1πŸ€”1
πŸ•΅οΈβ€β™‚οΈ Aggressively Monitoring for Changes Is a Key Aspect of Cybersecurity πŸ•΅οΈβ€β™‚οΈ

Employees and management must fully support change detection and file integrity monitoring, allowing a proactive approach with definitive security controls to be implemented against threat actors.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 CyberGhost vs NordVPN (2024): Which VPN Should You Choose? 🦿

While CyberGhost VPNs optimized servers bring a lot of value, NordVPNs more consistent speed performance and extensive feature inclusions give it the slight edge.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ›  Faraday 5.6.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated PenetrationTest Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to reuse the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Unpacking Slack Hacks: 6 Ways to Protect Sensitive Data with Secure Collaboration πŸ–‹οΈ

Nowadays, sensitive and critical data is traveling in everyday business channels that offer only the basic level of security and encryption, and companies are often oblivious to the risk. A case in point Disney suffered a devastating data leak by a hacktivist group known as NullBulge that got hold of over 1.2 terabytes of data from Disney's internal Slack messaging channels. The breach exposed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity