πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Ransomware Gangs Pummel Southeast Asia πŸ•΅οΈβ€β™‚οΈ

Successful ransomware attacks against organizations in Asia continue at peak levels in 2024 following a wave of highprofile data breaches last year.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers’ Systems πŸ–‹οΈ

Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once again underscoring how threat actors continue to exploit the trust in the opensource ecosystem to deliver malware. "By mimicking the popular 'noblox.js' library, attackers have published dozens of packages designed to steal sensitive data and compromise systems," Checkmarx.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download 🦿

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Webinar: Learn to Boost Cybersecurity with AI-Powered Vulnerability Management πŸ–‹οΈ

The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and attackers are becoming more sophisticated. In this highstakes game, security leaders need every advantage they can get. That's where Artificial Intelligence AI comes in. AI isn't just a buzzword it's a gamechanger for vulnerability management. AI is poised to revolutionize vulnerability.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Next-Generation Attacks, Same Targets - How to Protect Your Users' Identities πŸ–‹οΈ

The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note on August 29, the FBI and CISA issued a joint advisory as part of their ongoing StopRansomware effort to help organizations protect against ransomware. The latest advisory, AA24242A, describes a new cybercriminal group and its attack methods. It also details three important actions to take today to mitigate.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cicada3301 Ransomware Group Emerges From the Ashes of ALPHV πŸ“”

Truesec claims new Cicada3301 ransomwareasaservice group could have ties to ALPHVBlackCat and Brutus.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Scores of Organizations Hit By Novel Voldemort Malware πŸ“”

Proofpoint has uncovered a new cyberespionage campaign deploying new malware dubbed Voldemort.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 6 Best Small Business VPNs for 2024 🦿

Looking for the best VPN services for SMBs? Here's a comprehensive guide covering the top options for secure remote access and data protection on a budget.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Passkey Adoption Is Accelerating in APAC β€” Except for Australia 🦿

Australian banks and government agencies are not rushing to adopt passkey authentication methods, despite the added security benefits.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Verkada Facing $3m Penalty After Hackers Viewed Sensitive Video Footage πŸ“”

The US FTC has proposed a 2.95m fine for security camera firm Verkada for alleged security failings that allowed hackers to access customers' video footage.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” South Korea Police Investigates Telegram Over Deepfake Porn πŸ“”

The Asian countrys law enforcement suspects the instant messaging app of abetting deepfake sex crimes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ“’ Managing security in a diverse cloud environment πŸ“’

Observability and a consistent, centralized security strategy are dayone demands for any multi or hybrid cloud organization.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The history – and future – of automation in security πŸ“’

Automation has transformed the security sector, from its early beginnings to its pivotal role today, but where are things headed?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ How businesses can align their security strategy with their cloud strategy πŸ“’

Aligning cloud and security strategies is essential for businesses to mitigate risks, enhance resilience, and ensure robust data protection in an era of rapid cloud adoption and evolving cyber threats.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  tcpdump 4.99.5 πŸ› 

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers andor contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Owners of 1-Time Passcode Theft Service Plead Guilty β™ŸοΈ

Three men in the United Kingdom have pleaded guilty to operating otp.agency, a once popular online service that helped attackers intercept the onetime passcodes OTPs that many websites require as a second authentication factor in addition to passwords. Launched in November 2019, OTP Agency was a service for intercepting onetime passwords needed to log in to various websites. Scammers would enter the targets phone number and name, and the service would initiate an automated phone call to the target that alerts them about unauthorized activity on their account.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors πŸ–‹οΈ

Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception in February 2024, the U.S. government said. The victims span various sectors, including water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Irish Wildlife Park Warns Customers to Cancel Credit Cards Following Breach πŸ“”

Fota Wildlife Park in Co Cork has told visitors to its website to cancel credit and debit cards, following a cyberattack.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Authorities Issue RansomHub Ransomware Alert πŸ“”

Agencies under the Stopransomware banner publish details of RansomHub groups tactics, indicators of compromise and essential mitigations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Iranian State-Sponsored Hackers Have Become Access Brokers for Ransomware Gangsca πŸ¦…

Iranian statebacked actors operating under aliases like "Pioneer Kitten" are increasingly targeting critical infrastructure and expanding their activities into brokering access for ransomware affiliates. Key Takeaways A group of Iranian statesponsored hackers has evolved into access brokers for ransomware gangs, targeting critical U.S. and allies sectors like education, finance, healthcare, and defense. The FBI, CISA, and DC3 have issued a joint advisory highlighting the dual nature of these threat actors' activities, which include both monetizing network access and conducting espionage aligned with Iranian government interests. The hackers, known by names like "Pioneer Kitten" and "Lemon Sandstorm," are highly adaptive, continuously evolving their methods to exploit vulnera...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt πŸ–‹οΈ

A 57yearold man from the U.S. state of Missouri has been arrested in connection with a failed data extortion campaign that targeted his former employer. Daniel Rhyne of Kansas City, Missouri, has been charged with one count of extortion in relation to a threat to cause damage to a protected computer, one count of intentional damage to a protected computer, and one count of wire fraud. He was.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2