πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns πŸ–‹οΈ

Threat actors are actively exploiting a nowpatched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server to conduct illicit cryptocurrency mining on susceptible instances. "The attacks involve threat actors that employ methods such as the deployment of shell scripts and XMRig miners, targeting of SSH endpoints, killing competing crypto mining processes,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Published Vulnerabilities Surge by 43% πŸ“”

Forescout highlighted a 43 increase in published vulnerabilities in H1 2024, with attackers targeting flaws in VPNs and network infrastructure for initial access.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Russian Hackers Use Commercial Spyware Exploits to Target Victims πŸ“”

In a campaign targeting Mongolian government websites, Russianbacked APT29 leveraged exploits previously used by spyware vendors NSO Group and Intellexa.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Weekly IT Vulnerability Report: Cyble Researchers Find Nearly 1 Million Exposed Fortinet, SonicWall Devices πŸ¦…

Key Takeaways Cyble researchers investigated 17 vulnerabilities and six dark web exploits in the week of August 2127. The researchers identified three vulnerabilities in particular in products by SonicWall, Traccar and Fortra as meriting highpriority attention. Cyble vulnerability scanners detected nearly 1 million webfacing assets exposed to the weeks top vulnerabilities and dark web exploits, with SonicWall and Fortinet devices accounting for more than 941,000 exposed vulnerabilities. Cyble researchers also warned that a 9.8severity Incorrect Authorization vulnerability in affected versions of Apache OFbiz is at risk of mass exploitation. Overview Cybles weekly vulnerability report for August 2127 found the highest number of exposed vulnerable assets in nearly th...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… Critical Advisory on RansomHub Ransomware: A Comprehensive Analysis and Mitigation Guide πŸ¦…

Key Takeaways RansomHub ransomware emerged in February 2024 and has rapidly become a significant threat, targeting a wide range of sectors, including critical infrastructure like water treatment, healthcare, and government services. RansomHub uses a doubleextortion model, encrypting data and exfiltrating it to demand ransoms. Victims must pay not only to regain access to their encrypted data but also to prevent the public release of stolen information. Cybles Vision platform reported that the ransomware employs sophisticated techniques, such as exploiting zeroday vulnerabilities like Zerologon and using advanced data exfiltration methods. It utilizes tools for scanning networks, mapping potential targets, and evading detection. RansomHub affiliates gain access through phish...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… ManticoraLoader: New Loader Announced from the Developers of AresLoader πŸ¦…

Cyble Research Intelligence Labs CRIL has discovered the announcement of a new malwareasaservice named ManticoraLoader in the underground. The threat actors behind the group DeadXInject have been offering the service in underground forums and on their Telegram channel since August 8, 2024. The same threat actors are behind the development of the infamous AresLoader and, as reported by CRIL, were observed to be targeting Citrix users in April 2023. Previously, researchers attributed the same threat group to the development of AiDLocker ransomware in late 2022. Figure 1 TAs advertisement on the Telegram Channel. In a detailed post under the alias 'DarkBLUP'previously used to advertise AresLoader on the XSS forumthe threat actors outlined the functionalities, operational logic,...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit πŸ–‹οΈ

A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zeroday by North Korean actors in a campaign designed to deliver the FudModule rootkit. The development is indicative of the persistent efforts made by the nationstate adversary, which had made a habit of incorporating rafts of Windows zeroday exploits into its arsenal in recent months.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ransomware Gangs Pummel Southeast Asia πŸ•΅οΈβ€β™‚οΈ

Successful ransomware attacks against organizations in Asia continue at peak levels in 2024 following a wave of highprofile data breaches last year.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers’ Systems πŸ–‹οΈ

Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once again underscoring how threat actors continue to exploit the trust in the opensource ecosystem to deliver malware. "By mimicking the popular 'noblox.js' library, attackers have published dozens of packages designed to steal sensitive data and compromise systems," Checkmarx.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download 🦿

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Webinar: Learn to Boost Cybersecurity with AI-Powered Vulnerability Management πŸ–‹οΈ

The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and attackers are becoming more sophisticated. In this highstakes game, security leaders need every advantage they can get. That's where Artificial Intelligence AI comes in. AI isn't just a buzzword it's a gamechanger for vulnerability management. AI is poised to revolutionize vulnerability.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Next-Generation Attacks, Same Targets - How to Protect Your Users' Identities πŸ–‹οΈ

The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note on August 29, the FBI and CISA issued a joint advisory as part of their ongoing StopRansomware effort to help organizations protect against ransomware. The latest advisory, AA24242A, describes a new cybercriminal group and its attack methods. It also details three important actions to take today to mitigate.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cicada3301 Ransomware Group Emerges From the Ashes of ALPHV πŸ“”

Truesec claims new Cicada3301 ransomwareasaservice group could have ties to ALPHVBlackCat and Brutus.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Scores of Organizations Hit By Novel Voldemort Malware πŸ“”

Proofpoint has uncovered a new cyberespionage campaign deploying new malware dubbed Voldemort.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 6 Best Small Business VPNs for 2024 🦿

Looking for the best VPN services for SMBs? Here's a comprehensive guide covering the top options for secure remote access and data protection on a budget.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Passkey Adoption Is Accelerating in APAC β€” Except for Australia 🦿

Australian banks and government agencies are not rushing to adopt passkey authentication methods, despite the added security benefits.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Verkada Facing $3m Penalty After Hackers Viewed Sensitive Video Footage πŸ“”

The US FTC has proposed a 2.95m fine for security camera firm Verkada for alleged security failings that allowed hackers to access customers' video footage.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” South Korea Police Investigates Telegram Over Deepfake Porn πŸ“”

The Asian countrys law enforcement suspects the instant messaging app of abetting deepfake sex crimes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ“’ Managing security in a diverse cloud environment πŸ“’

Observability and a consistent, centralized security strategy are dayone demands for any multi or hybrid cloud organization.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The history – and future – of automation in security πŸ“’

Automation has transformed the security sector, from its early beginnings to its pivotal role today, but where are things headed?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ How businesses can align their security strategy with their cloud strategy πŸ“’

Aligning cloud and security strategies is essential for businesses to mitigate risks, enhance resilience, and ensure robust data protection in an era of rapid cloud adoption and evolving cyber threats.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity