πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  OpenSSL Toolkit 3.0.15 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with fullstrength cryptography worldwide.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Getting β€œIn Tune” with an Enterprise: Detecting Intune Lateral Movement 🧠

Organizations continue to implement cloudbased services, a shift that has led to the wider adoption of hybrid identity environments that connect onpremises Active Directory with Microsoft Entra ID formerly Azure AD. To manage devices in these hybrid identity environments, Microsoft Intune Intune has emerged as one of the most popular device management solutions. Since this The post Getting In Tune with an Enterprise Detecting Intune Lateral Movement appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Hackers Targets Job Seekers with Fake FreeConference App πŸ–‹οΈ

North Korean threat actors have leveraged a fake Windows video conferencing application impersonating FreeConference.com to backdoor developer systems as part of an ongoing financiallydriven campaign dubbed Contagious Interview. The new attack wave, spotted by Singaporean company GroupIB in midAugust 2024, is yet another indication that the activity is also leveraging native installers for.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Government Set Out to Improve Internet Routing Security πŸ“”

The US White House Office of the National Cyber Director proposes improving internet security by protecting the Border Gateway Protocol.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FBI: North Korean Actors Readying Aggressive Cyberattack Wave πŸ•΅οΈβ€β™‚οΈ

Sophisticated social engineering is expected to accompany threat campaigns that are highly targeted and aimed at stealing crypto and deploying malware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'Revival Hijack' on PyPI Disguises Malware with Legitimate File Names πŸ•΅οΈβ€β™‚οΈ

Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Iran Cyber Attack: Fox Kitten Facilitates Ransomware in US 🦿

Read more about an attack campaign led by Iranbased cyberespionage threat actor Fox Kitten, and learn how to protect your company from this threat.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Indian Army Propaganda Spread by 1.4K AI-Powered Social Media Accounts πŸ•΅οΈβ€β™‚οΈ

For three years now, more than a thousand social media accounts have been reposting the same proIndia, antiPakistan content on Facebook and X.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Cross-Platform Malware KTLVdoor Discovered in Attack on Chinese Trading Firm πŸ–‹οΈ

The Chinesespeaking threat actor known as Earth Lusca has been observed using a new backdoor dubbed KTLVdoor as part of a cyber attack targeting an unnamed trading company based in China. The previously unreported malware is written in Golang, and thus is a crossplatform weapon capable of targeting both Microsoft Windows and Linux systems. "KTLVdoor is a highly obfuscated malware that.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco Fixes Two Critical Flaws in Smart Licensing Utility to Prevent Remote Attacks πŸ–‹οΈ

Cisco has released security updates for two critical security flaws impacting its Smart Licensing Utility that could allow unauthenticated, remote attackers to elevate their privileges or access sensitive information. A brief description of the two vulnerabilities is below CVE202420439 CVSS score 9.8 The presence of an undocumented static user credential for an administrative account.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ The key considerations for cyber insurance: A pragmatic approach πŸš€

Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCore πŸ–‹οΈ

Threat actors are likely employing a tool designated for red teaming exercises to serve malware, according to new findings from Cisco Talos. The program in question is a payload generation framework called MacroPack, which is used to generate Office documents, Visual Basic scripts, Windows shortcuts, and other formats for penetration testing and social engineering assessments. It was developed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russian Blamed For Mass Disinformation Campaign Ahead of US Election πŸ“”

The DoJ says Russia paid a US company 10m to post disinformation that attracted millions of views online.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” OnlyFans Hackers Targeted With Infostealer Malware πŸ“”

Hackers interested in targeting OnlyFans users have themselves been singled out by an infostealing campaign.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ A cyber criminal group behind an MFA bypass operation promised hackers β€œprofit within minutes” – they’re now facing lengthy jail sentences πŸ“’

The group has pleaded guilty to operating an OTP interception service helping hackers bypass MFA protection to get access to potentially 12,000 individuals bank accounts.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ NIST Cybersecurity Framework (CSF) and CTEM – Better Together πŸ–‹οΈ

Its been a decade since the National Institute of Standards and Technology NIST introduced its Cybersecurity Framework CSF 1.0. Created following a 2013 Executive Order, NIST was tasked with designing a voluntary cybersecurity framework that would help organizations manage cyber risk, providing guidance based on established standards and best practices. While this version was originally.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 6 Best Enterprise Antivirus Software Choices in 2024 🦿

SentinelOne, Microsoft Defender for Endpoint, and CrowdStrike Falcon are among my top recommendations for businesses looking for an enterprise antivirus solution.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Researcher Finds Unfixable Yet Tricky to Exploit Flaw in Yubikeys πŸ“”

A security flaw exploiting side channel attacks means some Yubikeys can be cloned.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2πŸ‘1
πŸ•΅οΈβ€β™‚οΈ The Role of Trust Anchors in Modern IT Security πŸ•΅οΈβ€β™‚οΈ

To fully realize the benefits trust anchors provide, organizations need to implement processes and technologies that maintain the privacy and security of trust anchors and the personal data they contain.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Clam AntiVirus Toolkit 1.4.1 πŸ› 

Clam AntiVirus is an antivirus toolkit for Unix. The main purpose of this software is the integration with mail servers attachment scanning. The package provides a flexible and scalable multithreaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. This is the LTS source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🧠 New report shows ongoing gender pay gap in cybersecurity 🧠

The gender gap in cybersecurity isnt a new issue. The lack of women in cybersecurity and IT has been making headlines for years even decades. While progress has been made, there is still significant work to do, especially regarding salary. The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the The post New report shows ongoing gender pay gap in cybersecurity appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity