πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β™ŸοΈ Sextortion Scams Now Include Photos of Your Home β™ŸοΈ

An old but persistent email scam known as "sextortion" has a new personalized touch The missives, which claim that malware has captured webcam footage of recipients pleasuring themselves, now include a photo of the target's home in a bid to make threats about publishing the videos more frightening and convincing.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
😱1
πŸ“” Civil Rights Groups Call For Spyware Controls πŸ“”

Civil society and journalists organizations in Europe ask the EU to take steps to regulate spyware technologies.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Rapid Growth of Password Reset Attacks Boosts Fraud and Account Takeovers πŸ“”

Researchers say password reset attacks have grown fourfold in the last year and one in four password reset attempts are fraudulent.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Active Ransomware Groups Surge by 56% in 2024 πŸ“”

Searchlight Cyber observed a 56 rise in active ransomware groups in H1 2024, demonstrating the growing fragmentation of the ransomware landscape.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 SOC Automation: Streamlining Security Operations (+CISO’s Checklist) 🌊

Are you sure your SOC is invincible armor? How often do you hear about the burnout of inhouse SOC analysts? I will not bore you with dry statistics proving that security operation centers SOCs are swamped with tasks, most of which do not require any actions yet missed out on critical.  The solution is clear The post SOC Automation Streamlining Security Operations CISOs Checklist appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Product Manager 🌊

The post Product Manager appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CERT-In Advisory and WikiLoader Campaign: Comprehensive Overview of Recent Security Threats πŸ¦…

CERTIn's advisory on Palo Alto Networks vulnerabilities and WikiLoaders fake GlobalProtect installers highlight major security risks. Key Takeaways CERTIn has issued a critical advisory highlighting vulnerabilities in multiple Palo Alto Networks applications, including GlobalProtect, Cloud NGFW, PANOS, and Cortex XSOAR. Concurrently, new malware distribution methods involving WikiLoader have been detected, leveraging spoofed GlobalProtect installers. The vulnerabilities identified include privilege escalation CVE20245915, information disclosure CVE20245916, and command injection CVE20245914. WikiLoader, a sophisticated loader, uses advanced evasion techniques such as SEO poisoning to distribute its payload. Specific versions of affected software and newly observed malware t...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ City of Columbus Sues Researcher After Ransomware Attack πŸ•΅οΈβ€β™‚οΈ

The city filed for a restraining order, claiming the researcher was working in tandem with the ransomware attackers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cyberattackers Spoof Palo Alto VPNs to Spread WikiLoader Variant πŸ•΅οΈβ€β™‚οΈ

The malware, first discovered two years ago, has returned in campaigns using SEO poisoning.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Halliburton Data Stolen in Oil-Sector Cyberattack πŸ•΅οΈβ€β™‚οΈ

The energy kahuna said that operations were disrupted after an attack on its supporting business applications.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Evolving npm Package Campaign Targets Roblox Devs, for Years πŸ•΅οΈβ€β™‚οΈ

Attackers have added aggressive social engineering to their arsenal, along with a novel Windowsmanipulating persistence mechanism that demands developer vigilance.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ BlackCat Spin-off 'Cicada3301' Uses Stolen Creds on the Fly, Skirts EDR πŸ•΅οΈβ€β™‚οΈ

Malware authors have iterated on one of the premier encryptors on the market, building something even bigger and better.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Apple device management for beginners πŸ“’

The next evolution of endpoint management and security.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Alert issued for β€˜Voldemort’ malware as dozens of organizations hit πŸ“’

Proofpoint researchers say the Voldemort malware campaign appears to be aimed at cyber espionage.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Modern management: The future of MDM πŸ“’

The next evolution of endpoint management and security.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How not to conduct cyber awareness training: UCSC slammed for β€˜tone deaf’ Ebola phishing tests πŸ“’

Phishing training at a university in California went wrong when its IT department distributed highly alarming emails.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ California Approves Privacy Bill Requiring Opt-Out Tools πŸ•΅οΈβ€β™‚οΈ

This bill requires Web browsers to have an easytofind and use setting for consumers to send an optout preference signal by default to every site and app they interact with.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ North Korean APT Exploits Novel Chromium, Windows Bugs to Steal Crypto πŸ•΅οΈβ€β™‚οΈ

DPRK's innovative tack chains together previously unknown browser issues, then adds a rootkit to the mix to gain deep system access.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Apptio: How Australians Are Navigating Economic Pressure Through Strategic IT Investments 🦿

Many Australian companies are investing in new technology, but others are having a hard time justifying such investments given the current economic climate.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The New Effective Way to Prevent Account Takeovers πŸ–‹οΈ

Account takeover attacks have emerged as one of the most persistent and damaging threats to cloudbased SaaS environments. Yet despite significant investments in traditional security measures, many organizations continue to struggle with preventing these attacks. A new report, "Why Account Takeover Attacks Still Succeed, and Why the Browser is Your Secret Weapon in Stopping Them" argues that the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Clearview AI Faces €30.5M Fine for Building Illegal Facial Recognition Database πŸ–‹οΈ

The Dutch Data Protection Authority Dutch DPA has imposed a fine of 30.5 million 33.7 million against facial recognition firm Clearview AI for violating the General Data Protection Regulation GDPR in the European Union E.U. by building an "illegal database with billions of photos of faces," including those of Dutch citizens. "Facial recognition is a highly intrusive technology that you.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity