πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Cisco Warns of Critical Vulnerabilities in Smart Licensing Utility πŸ“”

Cisco has urged customers to apply software updates to fix the critical vulnerabilities, which could allow attackers to collect sensitive data or administer services.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Rise of Head Mare: A Geopolitical and Cybersecurity Analysis πŸ¦…

Key takeaways  The Head Mare hacktivist group targets Russian and Belarusian organizations, linking their cyberattacks to geopolitical tensions with Ukraine.  Head Mare's attacks on Russia and Belarus are strategic, aiming to influence political and economic stability in these countries and support its own objectives.  The group uses sophisticated phishing and ransomware attacks, exploiting vulnerabilities like CVE202338831 in WinRAR and ransomware strains like LockBit and Babuk.  Head Mares cyber operations align with the RussoUkrainian conflict, applying pressure on Russia and Belarus to distract from Ukraine's military actions.  The group employs advanced techniques for persistence and evasion, disguising malware and using sophisticated tools to control compromised syste...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Australia Proposes Mandatory Guardrails for AI 🦿

New mandatory guardrails will apply to AI models in highrisk settings, with businesses encouraged to adopt new safety standards starting now.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese-Speaking Hacker Group Targets Human Rights Studies in Middle East πŸ–‹οΈ

Unnamed government entities in the Middle East and Malaysia are the target of a persistent cyber campaign orchestrated by a threat actor known as Tropic Trooper since June 2023. "Sighting this group's Tactics, Techniques, and Procedures in critical governmental entities in the Middle East, particularly those related to human rights studies, marks a new strategic move for them," Kaspersky.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Veeam Releases Security Updates to Fix 18 Flaws, Including 5 Critical Issues πŸ–‹οΈ

Veeam has shipped security updates to address a total of 18 security flaws impacting its software products, including five critical vulnerabilities that could result in remote code execution. The list of shortcomings is below CVE202440711 CVSS score 9.8 A vulnerability in Veeam Backup Replication that allows unauthenticated remote code execution. CVE202442024 CVSS score 9.1.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ What is the Shared Fate Model? πŸ•΅οΈβ€β™‚οΈ

New threats, an overburdened workforce, and regulatory pressures mean cloud service providers need a more resilient model than the shared responsibility framework. That's where "shared fate" comes in.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Malvertising Campaign Builds a Phish for Lowe's Employees πŸ•΅οΈβ€β™‚οΈ

Retail employees are being duped into divulging their credentials by typosquatting malvertisements.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese 'Tropic Trooper' APT Targets Mideast Governments πŸ•΅οΈβ€β™‚οΈ

In the past, the group has targeted different sectors in East and Southeast Asia, but recently has pivoted its focus to the Middle East, specifically to entities that publish human rights studies.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ China's 'Earth Lusca' Propagates Multiplatform Backdoor πŸ•΅οΈβ€β™‚οΈ

The malware, KTLVdoor, has already been found on more than 50 commandandcontrol servers and enables full control of any environment it compromises.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Biden Admin Files Charges Against Election Meddlers From Russia πŸ•΅οΈβ€β™‚οΈ

Working with the Treasury and Justice departments, the president has sanctioned antidemocratic Russian adversaries.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 IBM Executive on Future Cybersecurity: Passkeys, Deepfakes & Quantum Computing 🦿

IBM's Chris Hockings predicts a safer internet with advances in passkey tech, digital identity, deepfake defenses, and postquantum cryptography.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The State of the Virtual CISO Report: MSP/MSSP Security Strategies for 2025 πŸ–‹οΈ

The 2024 State of the vCISO Report continues Cynomis tradition of examining the growing popularity of virtual Chief Information Security Officer vCISO services. According to the independent survey, the demand for these services is increasing, with both providers and clients reaping the rewards. The upward trend is set to continue, with even faster growth expected in the future. However,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Security Flaw Found in LiteSpeed Cache Plugin for WordPress πŸ–‹οΈ

Cybersecurity researchers have discovered yet another critical security flaw in the LiteSpeed Cache plugin for WordPress that could allow unauthenticated users to take control of arbitrary accounts. The vulnerability, tracked as CVE202444000 CVSS score 7.5, impacts versions before and including 6.4.1. It has been addressed in version 6.5.0.1.  "The plugin suffers from an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apache OFBiz Update Fixes High-Severity Flaw Leading to Remote Code Execution πŸ–‹οΈ

A new security flaw has been addressed in the Apache OFBiz opensource enterprise resource planning ERP system that, if successfully exploited, could lead to unauthenticated remote code execution on Linux and Windows. The highseverity vulnerability, tracked as CVE202445195 CVSS score 7.5, affects all versions of the software before 18.12.16. "An attacker with no valid.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Pavel Durov Criticizes Outdated Laws After Arrest Over Telegram Criminal Activity πŸ–‹οΈ

Telegram CEO Pavel Durov has broken his silence nearly two weeks after his arrest in France, stating the charges are misguided. "If a country is unhappy with an internet service, the established practice is to start a legal action against the service itself," Durov said in a 600word statement on his Telegram account. "Using laws from the presmartphone era to charge a CEO with crimes committed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ ESET Research Podcast: HotPage πŸš€

ESET researchers discuss HotPage, a recently discovered adware armed with a highestprivilege, yet vulnerable, Microsoftsigned driver.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US and Allies Accuse Russian Military of Destructive Cyber-Attacks πŸ“”

The joint government advisory highlighted the cyber activities of Unit 29155, which has launched destructive cyberattacks against critical infrastructure globally.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Spear-Phishing in the Battlefield: Gamaredon’s Ongoing Assault on Ukraine’s Military πŸ¦…

Key Takeaways Cyble Research and Intelligence Labs CRIL identified an active Gamaredon campaign targeting Ukrainian military personnel through spearphishing emails. The emails include malicious XHTML attachments, which, when opened, execute obfuscated JavaScript code that downloads a malicious archive to the victims system. This archive contains a Windows shortcut LNK file that, when triggered, initiates the execution of a remote .tar archive hosted on TryCloudflare.com via mshta.exe. The Threat Actors TAs leverage TryCloudflares onetime tunnel feature to anonymously host malicious files and access resources remotely without detection. The campaign appears to be largescale and coordinated, as indicated by the widespread distribution of similar files, and it remains ongoing ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISA issues alert over two high-severity DrayTek vulnerabilities – here’s what you need to know πŸ“’

Users of DrayTek's network equipment management software have been urged to remain vigilant.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Using Transparency & Sharing to Defend Critical Infrastructure πŸ•΅οΈβ€β™‚οΈ

No organization can singlehandedly defend against sophisticated attacks. Governments and private sector entities need to collaborate, share information, and develop defenses against cyber threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🧠 How cyber criminals are compromising AI software supply chains 🧠

With the adoption of artificial intelligence AI soaring across industries and use cases, preventing AIdriven software supply chain attacks has never been more important. Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in opensource repositories like Hugging Face and GitHub. The group, claiming to The post How cyber criminals are compromising AI software supply chains appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity