πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Red Teaming Tool Abused for Malware Deployment πŸ“”

Cisco Talos has assessed that red teaming tool MacroPack is being abused by various threat actors in different geographies to deploy malware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Hijack 22,000 Removed PyPI Packages, Spreading Malicious Code to Developers πŸ–‹οΈ

A new supply chain attack technique targeting the Python Package Index PyPI registry has been exploited in the wild in an attempt to infiltrate downstream organizations. It has been codenamed Revival Hijack by software supply chain security firm JFrog, which said the attack method could be used to hijack 22,000 existing PyPI packages and result in "hundreds of thousands" of malicious package.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Mac management for beginners πŸ“’

Get the most out of your Apple technology investment.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Intricate Babylon RAT Campaign Targets Malaysian Politicians, Government πŸ¦…

Key takeaways  Cyble Research and Intelligence Lab CRIL has identified a highly targeted cyberattack aimed at political figures and government officials, in Malaysia.   The attack showcases the advanced tactics employed by Threat Actor TA in targeting highprofile individuals and institutions.  The campaign active since July, has employed at least three distinct malicious ISO files specifically designed to compromise Malaysian entities.  The malicious ISO files contain multiple components, including a shortcut LNK file, a hidden PowerShell script, a malicious executable, and a decoy PDF file.   The campaign delivers Babylon RAT as a final payload.   Babylon RAT, an opensource Remote Access Trojan RAT, provides unauthorized access to the victims machine. It allows the TA to...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ•΅οΈβ€β™‚οΈ How CISOs Can Effectively Communicate Cyber-Risk πŸ•΅οΈβ€β™‚οΈ

A proximity resilience graph offers a more accurate representation of risk than heat maps and risk registers, and allows CISOs to tell a complex story in a single visualization.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Confirms CVE-2024-32896 Exploited in the Wild, Releases Android Security Patch πŸ–‹οΈ

Google has released its monthly security updates for the Android operating system to address a known security flaw that it said has come under active exploitation in the wild. The highseverity vulnerability, tracked as CVE202432896 CVSS score 7.8, relates to a case of privilege escalation in the Android Framework component. According to the description of the bug in the NIST National.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” North Korea Targeting Crypto Industry, Says FBI πŸ“”

US law enforcement is tracking aggressive social engineering attacks against cryptocurrency operations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Zeek 6.0.6 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyberinfrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and openscience communities. This is the source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  OpenSSL Toolkit 3.3.2 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with fullstrength cryptography worldwide.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  OpenSSL Toolkit 3.2.3 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with fullstrength cryptography worldwide.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  OpenSSL Toolkit 3.1.7 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with fullstrength cryptography worldwide.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  OpenSSL Toolkit 3.0.15 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with fullstrength cryptography worldwide.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Getting β€œIn Tune” with an Enterprise: Detecting Intune Lateral Movement 🧠

Organizations continue to implement cloudbased services, a shift that has led to the wider adoption of hybrid identity environments that connect onpremises Active Directory with Microsoft Entra ID formerly Azure AD. To manage devices in these hybrid identity environments, Microsoft Intune Intune has emerged as one of the most popular device management solutions. Since this The post Getting In Tune with an Enterprise Detecting Intune Lateral Movement appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Hackers Targets Job Seekers with Fake FreeConference App πŸ–‹οΈ

North Korean threat actors have leveraged a fake Windows video conferencing application impersonating FreeConference.com to backdoor developer systems as part of an ongoing financiallydriven campaign dubbed Contagious Interview. The new attack wave, spotted by Singaporean company GroupIB in midAugust 2024, is yet another indication that the activity is also leveraging native installers for.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Government Set Out to Improve Internet Routing Security πŸ“”

The US White House Office of the National Cyber Director proposes improving internet security by protecting the Border Gateway Protocol.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FBI: North Korean Actors Readying Aggressive Cyberattack Wave πŸ•΅οΈβ€β™‚οΈ

Sophisticated social engineering is expected to accompany threat campaigns that are highly targeted and aimed at stealing crypto and deploying malware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'Revival Hijack' on PyPI Disguises Malware with Legitimate File Names πŸ•΅οΈβ€β™‚οΈ

Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Iran Cyber Attack: Fox Kitten Facilitates Ransomware in US 🦿

Read more about an attack campaign led by Iranbased cyberespionage threat actor Fox Kitten, and learn how to protect your company from this threat.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Indian Army Propaganda Spread by 1.4K AI-Powered Social Media Accounts πŸ•΅οΈβ€β™‚οΈ

For three years now, more than a thousand social media accounts have been reposting the same proIndia, antiPakistan content on Facebook and X.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Cross-Platform Malware KTLVdoor Discovered in Attack on Chinese Trading Firm πŸ–‹οΈ

The Chinesespeaking threat actor known as Earth Lusca has been observed using a new backdoor dubbed KTLVdoor as part of a cyber attack targeting an unnamed trading company based in China. The previously unreported malware is written in Golang, and thus is a crossplatform weapon capable of targeting both Microsoft Windows and Linux systems. "KTLVdoor is a highly obfuscated malware that.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco Fixes Two Critical Flaws in Smart Licensing Utility to Prevent Remote Attacks πŸ–‹οΈ

Cisco has released security updates for two critical security flaws impacting its Smart Licensing Utility that could allow unauthenticated, remote attackers to elevate their privileges or access sensitive information. A brief description of the two vulnerabilities is below CVE202420439 CVSS score 9.8 The presence of an undocumented static user credential for an administrative account.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity