πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” South Korean Spies Exploit WPS Office Zero-Day πŸ“”

ESET uncovers a South Korean cyberespionage campaign featuring a zeroday exploit for WPS Office.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 How to Prevent Account Takeover: Real-life Scenarios and Mitigation Steps 🌊

Ignoring security in the name of progress is a risky gamble. Even tiny oversight, like failing to verify passwords during email changes can result in an account takeover. You read that right this seemingly minor issue can be a major troublemaker. In this article, our expert security team will discuss simple yet effective steps to The post How to Prevent Account Takeover Reallife Scenarios and Mitigation Steps appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CVE-2024-39717 Exposes Critical Vulnerability in Versa Director πŸ¦…

Key Takeaways This CVE202439717 vulnerability impacts Versa Director, a key platform for managing Versa SDWAN solutions used by ISPs and MSPs. CVE202439717 involves an unrestricted file upload flaw that allows authenticated users to upload malicious files disguised as .png images. Exploitation of this flaw can lead to unauthorized access and potential system compromise, posing a serious risk to affected organizations. Cybles scan reveals 31 internetexposed instances of Versa Director, with 16 in the U.S., indicating significant potential for exploitation. An APT actor has exploited the vulnerability due to a failure to implement recommended firewall and hardening measures. Users are advised to upgrade to Versa Director version 22.1.4 or later and follow additional sec...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Scammers Use ScreenConnect to Defraud SSA Beneficiaries πŸ¦…

Key Takeaways Cyble Research and Intelligence Labs CRIL has uncovered a phishing site designed to mimic Zoom, which facilitates the download of ScreenConnect software. Scammers are leveraging Zoom's trusted reputation to trick victims into downloading ScreenConnect. By impersonating a widely recognized platform, the phishing site increases the likelihood that victims will believe the download is legitimate, lowering their guard. This ScreenConnect software allows attackers to establish a remote connection to the victims computer, giving them full access to the system. The IP address associated with the ScreenConnect software is also linked to other malicious activities. Notably, it hosts a domain involved in scamming Social Security Administration SSA account holders, indicat...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Attackers Exploit Critical Atlassian Confluence Flaw for Cryptojacking πŸ•΅οΈβ€β™‚οΈ

Novel attack vectors leverage the CVE202322527 RCE flaw discovered in January, which is still under active attack, to turn targeted cloud environments into cryptomining networks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ BlackByte Targets ESXi Bug With Ransomware to Access Virtual Assets πŸ•΅οΈβ€β™‚οΈ

The pivot is one of several changes the groups using the malware have used in recent attacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CCTV Zero-Day Exposes Critical Infrastructure to Mirai Botnet πŸ•΅οΈβ€β™‚οΈ

CISA warned about the RCE zeroday vulnerability in AVTECH IP cameras in early August, and now vulnerable systems are being used to spread malware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware Attacks Exposed 6.7 Million Records in US Schools πŸ“”

Ransomware attacks on US schools and colleges have surged, with 491 incidents since 2018, affecting over 8000 institutions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Kursk Offensive Unveiled: Ukraine’s Strategic Planning and Cyber-Kinetic Convergence πŸ¦…

Executive Summary The geopolitical situation surrounding Ukraine in 2024 showcases a complicated interaction of changing international alliances and the difficulties the Ukrainian government faces in sustaining this support as global priorities shift. While Ukraine continues to receive significant international support, the landscape in 2024 indicates a potential decline in the international community's patience and commitment. The combination of reduced U.S. aid, significant gaps in European allocations, and the distraction of global conflicts poses serious challenges for Ukraine. However, on August 6, 2024, after its longtime defensive posture since the beginning of the conflict in February 2022, Ukraine threw caution to the wind by launching a significant mechanized leanon, s...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Microsoft issues warning over potent malware strain developed by Iranian threat actor πŸ“’

The Iranian statebacked hacking group has continued its usual password spraying and social engineering techniques to gain a foothold in target environments.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cybersecurity spending is going to surge in 2025 – and AI threats are a key factor πŸ“’

Enterprises globally have already ramped up cybersecurity spending to contend with potent new threats and theres more to come in the year ahead.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ South Korean APT Exploits 1-Click WPS Office Bug, Nabs Chinese Intel πŸ•΅οΈβ€β™‚οΈ

The most popular office software suite in China actually has two critical vulnerabilities, which allowed hackers the opportunity for remote code execution. Time to patch.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Don’t Leave Your Digital Security to Chance: Get Norton 360 🦿

Norton 360 Standard offers awardwinning protection for your digital life malware defense, cloud backup, and a VPN for just 17.99 for a 15month plan.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
β™ŸοΈ When Get-Out-The-Vote Efforts Look Like Phishing β™ŸοΈ

Multiple media reports this week warned Americans to be on guard against a new phishing scam that arrives in a text message informing recipients they are not yet registered to vote. A bit of digging reveals the missives were sent by a California political consulting firm as part of a wellmeaning but potentially counterproductive getoutthevote effort that had all the hallmarks of a phishing campaign.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ French Authorities Charge Telegram CEO with Facilitating Criminal Activities on Platform πŸ–‹οΈ

French prosecutors on Wednesday formally charged CEO Pavel Durov with facilitating a litany of criminal activity on the popular messaging platform and placed him under formal investigation following his arrest Saturday. Russianborn Durov, who is also a French citizen, has been charged with being complicit in the spread of child sexual abuse material CSAM as well as enabling organized crime,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” IT Engineer Charged For Attempting to Extort Former Employer πŸ“”

A virtual machine specialist was arrested after a foiled data extortion plot targeting his former employer.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 NordVPN vs Proton VPN (2024): Which VPN Should You Choose? 🦿

While Proton VPNs strong focus on privacy is enticing, NordVPNs fastperforming and allaround VPN service is the better overall package between the two.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Iranian Hackers Secretly Aid Ransomware Attacks on US πŸ“”

CISA and the FBI warned that Iranian APT group, Fox Kitten, has helped ransomware groups to attack US organizations since 2017.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Agencies Warn of Iranian Hacking Group's Ongoing Ransomware Attacks πŸ–‹οΈ

U.S. cybersecurity and intelligence agencies have called out an Iranian hacking group for breaching multiple organizations across the country and coordinating with affiliates to deliver ransomware. The activity has been linked to a threat actor dubbed Pioneer Kitten, which is also known as Fox Kitten, Lemon Sandstorm formerly Rubidium, Parisite, and UNC757, which it described as connected to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How AitM Phishing Attacks Bypass MFA and EDRβ€”and How to Fight Back πŸ–‹οΈ

Attackers are increasingly using new phishing toolkits opensource, commercial, and criminal to execute adversaryinthemiddle AitM attacks. AitM enables attackers to not just harvest credentials but steal live sessions, allowing them to bypass traditional phishing prevention controls such as MFA, EDR, and email content filtering. In this article, were going to look at what AitM phishing.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks πŸ–‹οΈ

A yearsold highseverity flaw impacting AVTECH IP cameras has been weaponized by malicious actors as a zeroday to rope them into a botnet. CVE20247029 CVSS score 8.7, the vulnerability in question, is a "command injection vulnerability found in the brightness function of AVTECH closedcircuit television CCTV cameras that allows for remote code execution RCE," Akamai researchers Kyle.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity