πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ How businesses can align their security strategy with their cloud strategy πŸ“’

Aligning cloud and security strategies is essential for businesses to mitigate risks, enhance resilience, and ensure robust data protection in an era of rapid cloud adoption and evolving cyber threats.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  tcpdump 4.99.5 πŸ› 

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers andor contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Owners of 1-Time Passcode Theft Service Plead Guilty β™ŸοΈ

Three men in the United Kingdom have pleaded guilty to operating otp.agency, a once popular online service that helped attackers intercept the onetime passcodes OTPs that many websites require as a second authentication factor in addition to passwords. Launched in November 2019, OTP Agency was a service for intercepting onetime passwords needed to log in to various websites. Scammers would enter the targets phone number and name, and the service would initiate an automated phone call to the target that alerts them about unauthorized activity on their account.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors πŸ–‹οΈ

Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception in February 2024, the U.S. government said. The victims span various sectors, including water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Irish Wildlife Park Warns Customers to Cancel Credit Cards Following Breach πŸ“”

Fota Wildlife Park in Co Cork has told visitors to its website to cancel credit and debit cards, following a cyberattack.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Authorities Issue RansomHub Ransomware Alert πŸ“”

Agencies under the Stopransomware banner publish details of RansomHub groups tactics, indicators of compromise and essential mitigations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Iranian State-Sponsored Hackers Have Become Access Brokers for Ransomware Gangsca πŸ¦…

Iranian statebacked actors operating under aliases like "Pioneer Kitten" are increasingly targeting critical infrastructure and expanding their activities into brokering access for ransomware affiliates. Key Takeaways A group of Iranian statesponsored hackers has evolved into access brokers for ransomware gangs, targeting critical U.S. and allies sectors like education, finance, healthcare, and defense. The FBI, CISA, and DC3 have issued a joint advisory highlighting the dual nature of these threat actors' activities, which include both monetizing network access and conducting espionage aligned with Iranian government interests. The hackers, known by names like "Pioneer Kitten" and "Lemon Sandstorm," are highly adaptive, continuously evolving their methods to exploit vulnera...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt πŸ–‹οΈ

A 57yearold man from the U.S. state of Missouri has been arrested in connection with a failed data extortion campaign that targeted his former employer. Daniel Rhyne of Kansas City, Missouri, has been charged with one count of extortion in relation to a threat to cause damage to a protected computer, one count of intentional damage to a protected computer, and one count of wire fraud. He was.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ“’ Lockbit claims breach on Canada’s largest school board: Is the group back with a vengeance? πŸ“’

A breach at the largest school board in Canada has been claimed by LockBit as the group rears its head once more.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Rubrik partners with Cisco to bolster cyber resilience πŸ“’

Rubrik now integrates with Cisco XDR and is listed on the connectivity giants SolutionsPlus program.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Everything we know about the TfL cyber attack so far πŸ“’

Details of the incident are still emerging, but TfL says customer data doesn't appear to have been compromised.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 6 Best Antivirus Software Options for Windows in 2024 🦿

Bitdefender GravityZone is best overall when it comes to our top choices for protection from malware like viruses, spyware, trojans, and bots.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 10 Topics Every Cybersecurity Awareness Training Program Should Cover 🦿

While the cybersecurity team plays a critical role in the fight against data breaches, a companys employees are often the first line of defense or failure. The numbers back this up IBMs 2024 data breach report shows cybersecurity employee training is the second most costeffective mitigation strategy, reducing the cost of the average data breach ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users πŸ–‹οΈ

Mobile users in Brazil are the target of a new malware campaign that delivers a new Android banking trojan named Rocinante. "This malware family is capable of performing keylogging using the Accessibility Service, and is also able to steal PII from its victims using phishing screens posing as different banks," Dutch security company ThreatFabric said. "Finally, it can use all this exfiltrated.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Secrets Exposed: Why Your CISO Should Worry About Slack πŸ–‹οΈ

In the digital realm, secrets API keys, private keys, username and password combos, etc. are the keys to the kingdom. But what if those keys were accidentally left out in the open in the very tools we use to collaborate every day? A Single Secret Can Wreak Havoc Imagine this It's a typical Tuesday in June 2024. Your dev team is kneedeep in sprints, Jira tickets are flying, and Slack is.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access πŸ–‹οΈ

Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or access sensitive data by circumventing the operating system's permissionsbased model, which revolves around the Transparency, Consent, and Control TCC framework. "If successful, the adversary could gain any privileges already granted to the affected.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Three Plead Guilty to Running MFA Bypass Site πŸ“”

Three British men are facing jail after pleading guilty to running an MFA bypass site dubbed OTP Agency.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Three Plead Guilty to Running MFA Bypass Site πŸ“”

Three British men are facing jail after pleading guilty to running an MFA bypass site dubbed OTP Agency.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” TfL Claims Cyber-Incident is Not Impacting Services πŸ“”

Londons transport body, TfL, is playing down the impact of a cybersecurity incident on its services.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Improved Software Supply Chain Resilience Equals Increased Security πŸ•΅οΈβ€β™‚οΈ

Understanding through visibility, managing through governance, and anticipating through continuous deployment will better prepare organizations for the next supply chain attack.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Cost of a data breach: Cost savings with law enforcement involvement 🧠

For those working in the information security and cybersecurity industries, the technical impacts of a data breach are generally understood. But for those outside of these technical functions, such as executives, operators and business support functions, explaining the real impact of a breach can be difficult. Therefore, explaining impacts in terms of quantifiable financial figures The post Cost of a data breach Cost savings with law enforcement involvement appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity