πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ UK law firms are facing a torrent of cyber threats – here’s why πŸ“’

Cyber criminals are targeting the sensitive customer data UK law firms hold for ransomware attacks or blackmail.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Check Point, Cisco Boost AI Investments With Latest Deals πŸ•΅οΈβ€β™‚οΈ

Cisco's deal to acquire Robust Intelligence will make it possible to use redteam algorithms to assess risk in AI models and applications, while Check Point's acquisition of Cyberint will add threat intelligence to its SOC platform.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Commercial Spyware Vendors Have a Copycat in Top Russian APT πŸ•΅οΈβ€β™‚οΈ

Russia's Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using wateringhole tactics.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'Voldemort' Malware Curses Orgs Using Global Tax Authorities πŸ•΅οΈβ€β™‚οΈ

The global malware campaign that must not be named? is targeting organizations by impersonating tax authorities, and using custom tools like Google Sheets for command and control.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ NASA Focuses on Cybersecurity of its Mission-Critical Software πŸ•΅οΈβ€β™‚οΈ

The software verification and validation efforts helps NASA improve the safety and costeffectiveness of its mission critical software. Cybersecurity is now part of the evaluation.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why Identity Teams Need to Start Reporting to the CISO πŸ•΅οΈβ€β™‚οΈ

Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it's time identity security was owned by a leader with a security background, like the CISO.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  GNUnet P2P Framework 0.22.0 πŸ› 

GNUnet is a peertopeer framework with focus on providing security. All peertopeer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP IPv4 and IPv6, TCP IPv4 and IPv6, HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign πŸ–‹οΈ

Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a commandandcontrol C2 mechanism. The activity, detected by Proofpoint starting August 5, 2024, impersonates tax authorities from governments in Europe, Asia, and the U.S., with the goal of targeting over 70 organizations worldwide by means of a bespoke tool called Voldemort that's equipped to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Iranian Hackers Set Up New Network to Target U.S. Political Campaigns πŸ–‹οΈ

Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent targeting of U.S. political campaigns. Recorded Future's Insikt Group has linked the infrastructure to a threat it tracks as GreenCharlie, an Irannexus cyber threat group that overlaps with APT42, Charming Kitten, Damselfly, Mint Sandstorm formerly.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Breaking Down AD CS Vulnerabilities: Insights for InfoSec Professionals πŸ–‹οΈ

The most dangerous vulnerability youve never heard of. In the world of cybersecurity, vulnerabilities are discovered so often, and at such a high rate, that it can be very difficult to keep up with. Some vulnerabilities will start ringing alarm bells within your security tooling, while others are far more nuanced, but still pose an equally dangerous threat. Today, we want to discuss one of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Malware Masquerades as Palo Alto VPN Targeting Middle East Users πŸ–‹οΈ

Cybersecurity researchers have disclosed a new campaign that potentially targets users in the Middle East through malware that disguises itself as Palo Alto Networks GlobalProtect virtual private network VPN tool. "The malware can execute remote PowerShell commands, download and exfiltrate files, encrypt communications, and bypass sandbox solutions, representing a significant threat to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Hackers Target Developers with Malicious npm Packages πŸ–‹οΈ

Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the npm registry, indicating "coordinated and relentless" efforts to target developers with malware and steal cryptocurrency assets. The latest wave, which was observed between August 12 and 27, 2024, involved packages named tempetherscanapi, ethersscanapi, telegramcon, helmetvalidate, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SANS Institute Unveils Critical Infrastructure Strategy Guide for 2024: A Call to Action for Securing ICS/OT Environments πŸ–‹οΈ

A comprehensive guide authored by Dean Parsons, SANS Certified Instructor and CEO Principal Consultant of ICS Defense Force, emphasizes the growing need for specialized ICS security measures in the face of rising cyber threats. With a staggering 50 increase in ransomware attacks targeting industrial control systems ICS in 2023, the SANS Institute is taking decisive action by announcing the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Cyberattack Targets Chinese-Speaking Businesses with Cobalt Strike Payloads πŸ–‹οΈ

Chinesespeaking users are the target of a "highly organized and sophisticated attack" campaign that is likely leveraging phishing emails to infect Windows systems with Cobalt Strike payloads. "The attackers managed to move laterally, establish persistence and remain undetected within the systems for more than two weeks," Securonix researchers Den Iuzvyk and Tim Peck said in a new report. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns πŸ–‹οΈ

Threat actors are actively exploiting a nowpatched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server to conduct illicit cryptocurrency mining on susceptible instances. "The attacks involve threat actors that employ methods such as the deployment of shell scripts and XMRig miners, targeting of SSH endpoints, killing competing crypto mining processes,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Published Vulnerabilities Surge by 43% πŸ“”

Forescout highlighted a 43 increase in published vulnerabilities in H1 2024, with attackers targeting flaws in VPNs and network infrastructure for initial access.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Russian Hackers Use Commercial Spyware Exploits to Target Victims πŸ“”

In a campaign targeting Mongolian government websites, Russianbacked APT29 leveraged exploits previously used by spyware vendors NSO Group and Intellexa.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Weekly IT Vulnerability Report: Cyble Researchers Find Nearly 1 Million Exposed Fortinet, SonicWall Devices πŸ¦…

Key Takeaways Cyble researchers investigated 17 vulnerabilities and six dark web exploits in the week of August 2127. The researchers identified three vulnerabilities in particular in products by SonicWall, Traccar and Fortra as meriting highpriority attention. Cyble vulnerability scanners detected nearly 1 million webfacing assets exposed to the weeks top vulnerabilities and dark web exploits, with SonicWall and Fortinet devices accounting for more than 941,000 exposed vulnerabilities. Cyble researchers also warned that a 9.8severity Incorrect Authorization vulnerability in affected versions of Apache OFbiz is at risk of mass exploitation. Overview Cybles weekly vulnerability report for August 2127 found the highest number of exposed vulnerable assets in nearly th...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… Critical Advisory on RansomHub Ransomware: A Comprehensive Analysis and Mitigation Guide πŸ¦…

Key Takeaways RansomHub ransomware emerged in February 2024 and has rapidly become a significant threat, targeting a wide range of sectors, including critical infrastructure like water treatment, healthcare, and government services. RansomHub uses a doubleextortion model, encrypting data and exfiltrating it to demand ransoms. Victims must pay not only to regain access to their encrypted data but also to prevent the public release of stolen information. Cybles Vision platform reported that the ransomware employs sophisticated techniques, such as exploiting zeroday vulnerabilities like Zerologon and using advanced data exfiltration methods. It utilizes tools for scanning networks, mapping potential targets, and evading detection. RansomHub affiliates gain access through phish...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… ManticoraLoader: New Loader Announced from the Developers of AresLoader πŸ¦…

Cyble Research Intelligence Labs CRIL has discovered the announcement of a new malwareasaservice named ManticoraLoader in the underground. The threat actors behind the group DeadXInject have been offering the service in underground forums and on their Telegram channel since August 8, 2024. The same threat actors are behind the development of the infamous AresLoader and, as reported by CRIL, were observed to be targeting Citrix users in April 2023. Previously, researchers attributed the same threat group to the development of AiDLocker ransomware in late 2022. Figure 1 TAs advertisement on the Telegram Channel. In a detailed post under the alias 'DarkBLUP'previously used to advertise AresLoader on the XSS forumthe threat actors outlined the functionalities, operational logic,...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit πŸ–‹οΈ

A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zeroday by North Korean actors in a campaign designed to deliver the FudModule rootkit. The development is indicative of the persistent efforts made by the nationstate adversary, which had made a habit of incorporating rafts of Windows zeroday exploits into its arsenal in recent months.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity