πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ The New Effective Way to Prevent Account Takeovers πŸ–‹οΈ

Account takeover attacks have emerged as one of the most persistent and damaging threats to cloudbased SaaS environments. Yet despite significant investments in traditional security measures, many organizations continue to struggle with preventing these attacks. A new report, "Why Account Takeover Attacks Still Succeed, and Why the Browser is Your Secret Weapon in Stopping Them" argues that the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Clearview AI Faces €30.5M Fine for Building Illegal Facial Recognition Database πŸ–‹οΈ

The Dutch Data Protection Authority Dutch DPA has imposed a fine of 30.5 million 33.7 million against facial recognition firm Clearview AI for violating the General Data Protection Regulation GDPR in the European Union E.U. by building an "illegal database with billions of photos of faces," including those of Dutch citizens. "Facial recognition is a highly intrusive technology that you.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Use Fake GlobalProtect VPN Software in New WikiLoader Malware Attack πŸ–‹οΈ

A new malware campaign is spoofing Palo Alto Networks' GlobalProtect VPN software to deliver a variant of the WikiLoader aka WailingCrab loader by means of a search engine optimization SEO campaign. The malvertising activity, observed in June 2024, is a departure from previously observed tactics wherein the malware has been propagated via traditional phishing emails, Unit 42 researchers.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ In plain sight: Malicious ads hiding in search results πŸš€

Sometimes theres more than just an enticing product offer hiding behind an ad.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Clearview AI Fined €30.5m by Dutch Watchdog Over Illegal Data Collection πŸ“”

The USbased facial recognition data company may even have to pay up to 5.1m in penalties for noncompliance.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Initial Access Brokers Target $2bn Revenue Companies πŸ“”

Cyberint claims that initial access brokers target companies with average revenue of nearly 2bn.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” APP Fraud Dominates as Scams Hit All-Time High πŸ“”

UKs Financial Ombudsman warns fraud and scams hit a record high in Q2 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… TA-FudModule Rootkit Targets Crypto, Linked to North Korean Citrine Sleet Group πŸ¦…

Key Takeaways  A North Korean threat actor, Citrine Sleet, has been observed exploiting a zeroday vulnerability in Chromium, designated as CVE20247971, to achieve Remote Code Execution RCE.  Citrine Sleet, also tracked by other security firms under the names AppleJeus, Labyrinth Chollima, UNC4736, and Hidden Cobra, is attributed to Bureau 121 of North Korea's Reconnaissance General Bureau. The group primarily focuses on financial institutions, especially those involved with cryptocurrency, aiming for financial gain.  The group's tactics, techniques, and procedures TTPs have now been linked to the FudModule rootkit, which has also been associated with Diamond Sleet, another North Korean threat actor.  Citrine Sleet creates fraudulent websites that mimic legitimate crypto...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ¦… CISA Warns of Critical ICS Vulnerabilities in Rockwell and Delta Electronics πŸ¦…

Key Takeaways  CISA Alert CISA warns of critical ICS vulnerabilities in Rockwell Automation and Delta Electronics products.  ThinManager ThinServer Flaws in Rockwell Automations ThinManager ThinServer versions 11.1.0 to 13.2.1 could allow systemlevel code execution. Affected sector Manufacturing.  Delta DTN Soft Vulnerability in Deltas DTN Soft version 2.0.1 and prior enables remote code execution. Update to version 2.1. Affected sector Energy.  FactoryTalk View SE A flaw in Rockwell Automations FactoryTalk View SE 13.0 allows unauthorized file modifications. Affected sectors Chemical, Energy, and others.  Mitigation CISA advises minimizing ICS exposure, securing remote access, updating software, and implementing layered security measures.  Overview  On August ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ White House outlines plans to finally secure the border gateway protocol πŸ“’

The White House announces its plans to shore up the integrity of internet by boosting adoption of security measures to address frailties in the outdated border gateway protocol.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Compliance management for beginners πŸ“’

Adhere to laws, meet safety standards, and implement security requirements.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ The New Effective Way to Prevent Account Takeovers πŸ–‹οΈ

Account takeover attacks have emerged as one of the most persistent and damaging threats to cloudbased SaaS environments. Yet despite significant investments in traditional security measures, many organizations continue to struggle with preventing these attacks. A new report, "Why Account Takeover Attacks Still Succeed, and Why the Browser is Your Secret Weapon in Stopping Them" argues that the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Zyxel Patches Critical OS Command Injection Flaw in Access Points and Routers πŸ–‹οΈ

Zyxel has released software updates to address a critical security flaw impacting certain access point AP and security router versions that could result in the execution of unauthorized commands. Tracked as CVE20247261 CVSS score 9.8, the vulnerability has been described as a case of operating system OS command injection. "The improper neutralization of special elements in the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Learning, Sharing, and Exploring with NIST’s New Human-Centered Cybersecurity Community of Interest πŸͺ–

Humancentered cybersecurity also known as usable security involves the social, organizational, and technological influences on peoples understanding of and interactions with cybersecurity. By taking a humancentered cybersecurity HCC approach, we can both improve people's cybersecurity experiences and achieve better cybersecurity outcomes, which is so important in todays digitally interconnected world. At NIST, we understand the value of making connections, listening, and interactivity. We also understand that researchers and practitioners want to hear directly from each otherand.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Identity management for beginners πŸ“’

Your infrastructure in one seamless experience.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ•΅οΈβ€β™‚οΈ CEO's Arrest Will Likely Not Dampen Cybercriminal Interest in Telegram πŸ•΅οΈβ€β™‚οΈ

In recent years, the platform has become a goto tool for executing almost all conceivable cybercriminal activity.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Red Teaming Tool Abused for Malware Deployment πŸ“”

Cisco Talos has assessed that red teaming tool MacroPack is being abused by various threat actors in different geographies to deploy malware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Hijack 22,000 Removed PyPI Packages, Spreading Malicious Code to Developers πŸ–‹οΈ

A new supply chain attack technique targeting the Python Package Index PyPI registry has been exploited in the wild in an attempt to infiltrate downstream organizations. It has been codenamed Revival Hijack by software supply chain security firm JFrog, which said the attack method could be used to hijack 22,000 existing PyPI packages and result in "hundreds of thousands" of malicious package.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Mac management for beginners πŸ“’

Get the most out of your Apple technology investment.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Intricate Babylon RAT Campaign Targets Malaysian Politicians, Government πŸ¦…

Key takeaways  Cyble Research and Intelligence Lab CRIL has identified a highly targeted cyberattack aimed at political figures and government officials, in Malaysia.   The attack showcases the advanced tactics employed by Threat Actor TA in targeting highprofile individuals and institutions.  The campaign active since July, has employed at least three distinct malicious ISO files specifically designed to compromise Malaysian entities.  The malicious ISO files contain multiple components, including a shortcut LNK file, a hidden PowerShell script, a malicious executable, and a decoy PDF file.   The campaign delivers Babylon RAT as a final payload.   Babylon RAT, an opensource Remote Access Trojan RAT, provides unauthorized access to the victims machine. It allows the TA to...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ•΅οΈβ€β™‚οΈ How CISOs Can Effectively Communicate Cyber-Risk πŸ•΅οΈβ€β™‚οΈ

A proximity resilience graph offers a more accurate representation of risk than heat maps and risk registers, and allows CISOs to tell a complex story in a single visualization.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity