πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ New Cross-Platform Malware KTLVdoor Discovered in Attack on Chinese Trading Firm πŸ–‹οΈ

The Chinesespeaking threat actor known as Earth Lusca has been observed using a new backdoor dubbed KTLVdoor as part of a cyber attack targeting an unnamed trading company based in China. The previously unreported malware is written in Golang, and thus is a crossplatform weapon capable of targeting both Microsoft Windows and Linux systems. "KTLVdoor is a highly obfuscated malware that.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco Fixes Two Critical Flaws in Smart Licensing Utility to Prevent Remote Attacks πŸ–‹οΈ

Cisco has released security updates for two critical security flaws impacting its Smart Licensing Utility that could allow unauthenticated, remote attackers to elevate their privileges or access sensitive information. A brief description of the two vulnerabilities is below CVE202420439 CVSS score 9.8 The presence of an undocumented static user credential for an administrative account.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ The key considerations for cyber insurance: A pragmatic approach πŸš€

Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCore πŸ–‹οΈ

Threat actors are likely employing a tool designated for red teaming exercises to serve malware, according to new findings from Cisco Talos. The program in question is a payload generation framework called MacroPack, which is used to generate Office documents, Visual Basic scripts, Windows shortcuts, and other formats for penetration testing and social engineering assessments. It was developed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russian Blamed For Mass Disinformation Campaign Ahead of US Election πŸ“”

The DoJ says Russia paid a US company 10m to post disinformation that attracted millions of views online.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” OnlyFans Hackers Targeted With Infostealer Malware πŸ“”

Hackers interested in targeting OnlyFans users have themselves been singled out by an infostealing campaign.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ A cyber criminal group behind an MFA bypass operation promised hackers β€œprofit within minutes” – they’re now facing lengthy jail sentences πŸ“’

The group has pleaded guilty to operating an OTP interception service helping hackers bypass MFA protection to get access to potentially 12,000 individuals bank accounts.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ NIST Cybersecurity Framework (CSF) and CTEM – Better Together πŸ–‹οΈ

Its been a decade since the National Institute of Standards and Technology NIST introduced its Cybersecurity Framework CSF 1.0. Created following a 2013 Executive Order, NIST was tasked with designing a voluntary cybersecurity framework that would help organizations manage cyber risk, providing guidance based on established standards and best practices. While this version was originally.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 6 Best Enterprise Antivirus Software Choices in 2024 🦿

SentinelOne, Microsoft Defender for Endpoint, and CrowdStrike Falcon are among my top recommendations for businesses looking for an enterprise antivirus solution.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Researcher Finds Unfixable Yet Tricky to Exploit Flaw in Yubikeys πŸ“”

A security flaw exploiting side channel attacks means some Yubikeys can be cloned.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2πŸ‘1
πŸ•΅οΈβ€β™‚οΈ The Role of Trust Anchors in Modern IT Security πŸ•΅οΈβ€β™‚οΈ

To fully realize the benefits trust anchors provide, organizations need to implement processes and technologies that maintain the privacy and security of trust anchors and the personal data they contain.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Clam AntiVirus Toolkit 1.4.1 πŸ› 

Clam AntiVirus is an antivirus toolkit for Unix. The main purpose of this software is the integration with mail servers attachment scanning. The package provides a flexible and scalable multithreaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. This is the LTS source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🧠 New report shows ongoing gender pay gap in cybersecurity 🧠

The gender gap in cybersecurity isnt a new issue. The lack of women in cybersecurity and IT has been making headlines for years even decades. While progress has been made, there is still significant work to do, especially regarding salary. The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the The post New report shows ongoing gender pay gap in cybersecurity appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Seizes 32 Pro-Russian Propaganda Domains in Major Disinformation Crackdown πŸ–‹οΈ

The U.S. Department of Justice DoJ on Wednesday announced the seizure of 32 internet domains used by a proRussian propaganda operation called Doppelganger as part of a sweeping set of actions. Accusing the Russian governmentdirected foreign malign influence campaign of violating U.S. money laundering and criminal trademark laws, the agency called out companies Social Design Agency SDA,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” PyPI Revival Hijack Puts Thousands of Applications at Risk πŸ“”

Revival Hijack Python Package Index supply chain attack threatens 22,000 packages through malicious downloads.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Security Budgets Come Under Pressure as β€œHypergrowth” Ends πŸ“”

Despite rising threats researchers find a third of firms see flat or falling security budgets and hiring slows.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Signs Council of Europe AI Convention πŸ“”

The first legally binding international treaty on AI was adopted by all 46 Council of Europe member states in May 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cisco Warns of Critical Vulnerabilities in Smart Licensing Utility πŸ“”

Cisco has urged customers to apply software updates to fix the critical vulnerabilities, which could allow attackers to collect sensitive data or administer services.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Rise of Head Mare: A Geopolitical and Cybersecurity Analysis πŸ¦…

Key takeaways  The Head Mare hacktivist group targets Russian and Belarusian organizations, linking their cyberattacks to geopolitical tensions with Ukraine.  Head Mare's attacks on Russia and Belarus are strategic, aiming to influence political and economic stability in these countries and support its own objectives.  The group uses sophisticated phishing and ransomware attacks, exploiting vulnerabilities like CVE202338831 in WinRAR and ransomware strains like LockBit and Babuk.  Head Mares cyber operations align with the RussoUkrainian conflict, applying pressure on Russia and Belarus to distract from Ukraine's military actions.  The group employs advanced techniques for persistence and evasion, disguising malware and using sophisticated tools to control compromised syste...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Australia Proposes Mandatory Guardrails for AI 🦿

New mandatory guardrails will apply to AI models in highrisk settings, with businesses encouraged to adopt new safety standards starting now.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese-Speaking Hacker Group Targets Human Rights Studies in Middle East πŸ–‹οΈ

Unnamed government entities in the Middle East and Malaysia are the target of a persistent cyber campaign orchestrated by a threat actor known as Tropic Trooper since June 2023. "Sighting this group's Tactics, Techniques, and Procedures in critical governmental entities in the Middle East, particularly those related to human rights studies, marks a new strategic move for them," Kaspersky.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity