πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β™ŸοΈ When Get-Out-The-Vote Efforts Look Like Phishing β™ŸοΈ

Multiple media reports this week warned Americans to be on guard against a new phishing scam that arrives in a text message informing recipients they are not yet registered to vote. A bit of digging reveals the missives were sent by a California political consulting firm as part of a wellmeaning but potentially counterproductive getoutthevote effort that had all the hallmarks of a phishing campaign.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ French Authorities Charge Telegram CEO with Facilitating Criminal Activities on Platform πŸ–‹οΈ

French prosecutors on Wednesday formally charged CEO Pavel Durov with facilitating a litany of criminal activity on the popular messaging platform and placed him under formal investigation following his arrest Saturday. Russianborn Durov, who is also a French citizen, has been charged with being complicit in the spread of child sexual abuse material CSAM as well as enabling organized crime,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” IT Engineer Charged For Attempting to Extort Former Employer πŸ“”

A virtual machine specialist was arrested after a foiled data extortion plot targeting his former employer.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 NordVPN vs Proton VPN (2024): Which VPN Should You Choose? 🦿

While Proton VPNs strong focus on privacy is enticing, NordVPNs fastperforming and allaround VPN service is the better overall package between the two.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Iranian Hackers Secretly Aid Ransomware Attacks on US πŸ“”

CISA and the FBI warned that Iranian APT group, Fox Kitten, has helped ransomware groups to attack US organizations since 2017.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Agencies Warn of Iranian Hacking Group's Ongoing Ransomware Attacks πŸ–‹οΈ

U.S. cybersecurity and intelligence agencies have called out an Iranian hacking group for breaching multiple organizations across the country and coordinating with affiliates to deliver ransomware. The activity has been linked to a threat actor dubbed Pioneer Kitten, which is also known as Fox Kitten, Lemon Sandstorm formerly Rubidium, Parisite, and UNC757, which it described as connected to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How AitM Phishing Attacks Bypass MFA and EDRβ€”and How to Fight Back πŸ–‹οΈ

Attackers are increasingly using new phishing toolkits opensource, commercial, and criminal to execute adversaryinthemiddle AitM attacks. AitM enables attackers to not just harvest credentials but steal live sessions, allowing them to bypass traditional phishing prevention controls such as MFA, EDR, and email content filtering. In this article, were going to look at what AitM phishing.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks πŸ–‹οΈ

A yearsold highseverity flaw impacting AVTECH IP cameras has been weaponized by malicious actors as a zeroday to rope them into a botnet. CVE20247029 CVSS score 8.7, the vulnerability in question, is a "command injection vulnerability found in the brightness function of AVTECH closedcircuit television CCTV cameras that allows for remote code execution RCE," Akamai researchers Kyle.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Surge in New Scams as Pig Butchering Dominates πŸ“”

Chainalysis report reveals a likely increase in new internet scams this year as fraudsters adapt to increasing enforcement efforts.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Wireshark Analyzer 4.4.0 πŸ› 

Wireshark is a GTKbased network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercialquality analyzer for Unix and Win32 and to give Wireshark features that are missing from closedsource sniffers. This is the source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Faraday 5.6.1 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated PenetrationTest Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to reuse the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 How to embrace Secure by Design principles while adopting AI 🧠

The rapid rise of generative artificial intelligence gen AI technologies has ushered in a transformative era for industries worldwide. Over the past 18 months, enterprises have increasingly integrated gen AI into their operations, leveraging its potential to innovate and streamline processes. From automating customer service to enhancing product development, the applications of gen AI are The post How to embrace Secure by Design principles while adopting AI appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32 πŸ–‹οΈ

A nonprofit supporting Vietnamese human rights has been the target of a multiyear campaign designed to deliver a variety of malware on compromised hosts. Cybersecurity company Huntress attributed the activity to a threat cluster known as APT32, a Vietnamesealigned hacking crew that's also known as APTC00, Canvas Cyclone formerly Bismuth, Cobalt Kitty, and OceanLotus. The intrusion is.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack πŸ–‹οΈ

Cybersecurity researchers have flagged multiple inthewild exploit campaigns that leveraged nowpatched flaws in Apple Safari and Google Chrome browsers to infect mobile users with informationstealing malware. "These campaigns delivered nday exploits for which patches were available, but would still be effective against unpatched devices," Google Threat Analysis Group TAG researcher Clement.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ Stealing cash using NFC relay – Week in Security with Tony Anscombe πŸš€

The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” North Korean Hackers Launch New Wave of npm Package Attacks πŸ“”

North Korean groups exploited npm packages in coordinated attacks, targeting developers and cryptocurrency wallet browser extensions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” BlackByte Adopts New Tactics, Targets ESXi Hypervisors πŸ“”

BlackByte, linked to the Conti group, exploited VMware ESXi CVE202437085 to control virtual machines.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Unpatched CCTV Cameras Exploited to Spread Mirai Variant πŸ“”

Threat actors are exploiting a vulnerability found in CCTV cameras used in critical infrastructure to spread a Mirai malware variant.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Top ICS Vulnerabilities This Week: Addressing Flaws Within Rockwell Automation, Avtec, and MOBOTIX Products πŸ¦…

Cybles latest report reveals critical ICS vulnerabilities, including CVE202334873 in MOBOTIX cameras, highlighting urgent security concerns for August 2024. Key Takeaways Cyble highlights five significant vulnerabilities affecting industrial control systems ICS, as disclosed by the Cybersecurity and Infrastructure Security Agency CISA. Among the critical issues identified, CVE202334873, affecting MOBOTIX cameras, stands out due to its high CVSS v4 score of 8.7 and its potential for remote code execution.. Major vendors impacted by these vulnerabilities include Rockwell Automation and Avtec. Rockwell Automations Emulate3D and 5015 AENFTXT products, as well as Avtecs Outpost 0810 and Uploader Utility, have been highlighted for their critical flaws. The vulnerabilities have...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… #FreeDurov: Hacktivists Scramble on Telegram Supporting Pavel’s Release πŸ¦…

Executive Summary The arrest of Telegram's founder and CEO, Pavel Durov, on August 24, 2024, due to allegations that his messaging platform has been used for various illicit activities has sparked significant international attention and debate, particularly around issues of freedom of speech and the responsibilities of social media platforms. Conversely, the arrest has also incited the ire of several hacktivist groups in cyberspace because, for many in this community, Durov is more than just a tech entrepreneur he is the mastermind behind two pivotal communication platforms in their lives Vkontakte, Russias answer to Facebook, and the anonymous messaging app Telegram. Vkontakte played a significant role in fostering communication and forming groups within hacktivist collectives....

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How Telecom Vulnerabilities Can Be a Threat to Cybersecurity Posture πŸ•΅οΈβ€β™‚οΈ

Telecombased attacks such as SMS toll fraud and 2FA hijacking have evolved into a mainstream concern for CISOs.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity