πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Chinese 'Tropic Trooper' APT Targets Mideast Governments πŸ•΅οΈβ€β™‚οΈ

In the past, the group has targeted different sectors in East and Southeast Asia, but recently has pivoted its focus to the Middle East, specifically to entities that publish human rights studies.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ China's 'Earth Lusca' Propagates Multiplatform Backdoor πŸ•΅οΈβ€β™‚οΈ

The malware, KTLVdoor, has already been found on more than 50 commandandcontrol servers and enables full control of any environment it compromises.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Biden Admin Files Charges Against Election Meddlers From Russia πŸ•΅οΈβ€β™‚οΈ

Working with the Treasury and Justice departments, the president has sanctioned antidemocratic Russian adversaries.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 IBM Executive on Future Cybersecurity: Passkeys, Deepfakes & Quantum Computing 🦿

IBM's Chris Hockings predicts a safer internet with advances in passkey tech, digital identity, deepfake defenses, and postquantum cryptography.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The State of the Virtual CISO Report: MSP/MSSP Security Strategies for 2025 πŸ–‹οΈ

The 2024 State of the vCISO Report continues Cynomis tradition of examining the growing popularity of virtual Chief Information Security Officer vCISO services. According to the independent survey, the demand for these services is increasing, with both providers and clients reaping the rewards. The upward trend is set to continue, with even faster growth expected in the future. However,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Security Flaw Found in LiteSpeed Cache Plugin for WordPress πŸ–‹οΈ

Cybersecurity researchers have discovered yet another critical security flaw in the LiteSpeed Cache plugin for WordPress that could allow unauthenticated users to take control of arbitrary accounts. The vulnerability, tracked as CVE202444000 CVSS score 7.5, impacts versions before and including 6.4.1. It has been addressed in version 6.5.0.1.  "The plugin suffers from an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apache OFBiz Update Fixes High-Severity Flaw Leading to Remote Code Execution πŸ–‹οΈ

A new security flaw has been addressed in the Apache OFBiz opensource enterprise resource planning ERP system that, if successfully exploited, could lead to unauthenticated remote code execution on Linux and Windows. The highseverity vulnerability, tracked as CVE202445195 CVSS score 7.5, affects all versions of the software before 18.12.16. "An attacker with no valid.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Pavel Durov Criticizes Outdated Laws After Arrest Over Telegram Criminal Activity πŸ–‹οΈ

Telegram CEO Pavel Durov has broken his silence nearly two weeks after his arrest in France, stating the charges are misguided. "If a country is unhappy with an internet service, the established practice is to start a legal action against the service itself," Durov said in a 600word statement on his Telegram account. "Using laws from the presmartphone era to charge a CEO with crimes committed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ ESET Research Podcast: HotPage πŸš€

ESET researchers discuss HotPage, a recently discovered adware armed with a highestprivilege, yet vulnerable, Microsoftsigned driver.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US and Allies Accuse Russian Military of Destructive Cyber-Attacks πŸ“”

The joint government advisory highlighted the cyber activities of Unit 29155, which has launched destructive cyberattacks against critical infrastructure globally.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Spear-Phishing in the Battlefield: Gamaredon’s Ongoing Assault on Ukraine’s Military πŸ¦…

Key Takeaways Cyble Research and Intelligence Labs CRIL identified an active Gamaredon campaign targeting Ukrainian military personnel through spearphishing emails. The emails include malicious XHTML attachments, which, when opened, execute obfuscated JavaScript code that downloads a malicious archive to the victims system. This archive contains a Windows shortcut LNK file that, when triggered, initiates the execution of a remote .tar archive hosted on TryCloudflare.com via mshta.exe. The Threat Actors TAs leverage TryCloudflares onetime tunnel feature to anonymously host malicious files and access resources remotely without detection. The campaign appears to be largescale and coordinated, as indicated by the widespread distribution of similar files, and it remains ongoing ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISA issues alert over two high-severity DrayTek vulnerabilities – here’s what you need to know πŸ“’

Users of DrayTek's network equipment management software have been urged to remain vigilant.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Using Transparency & Sharing to Defend Critical Infrastructure πŸ•΅οΈβ€β™‚οΈ

No organization can singlehandedly defend against sophisticated attacks. Governments and private sector entities need to collaborate, share information, and develop defenses against cyber threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🧠 How cyber criminals are compromising AI software supply chains 🧠

With the adoption of artificial intelligence AI soaring across industries and use cases, preventing AIdriven software supply chain attacks has never been more important. Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in opensource repositories like Hugging Face and GitHub. The group, claiming to The post How cyber criminals are compromising AI software supply chains appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Spyware Vendors' Nebulous Ecosystem Helps Them Evade Sanctions πŸ“”

The secret web of at least 435 entities across 42 countries making up the spyware landscape facilitates unpunished security and human rights violations, the Atlantic Council found.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ CISA issues alert over two high-severity DrayTek vulnerabilities – here’s what you need to know πŸ“’

Users of DrayTek's network equipment management software have been urged to remain vigilant.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Feds Warn on Russian Actors Targeting Critical Infrastructure πŸ•΅οΈβ€β™‚οΈ

In the past, Putin's Unit 29155 has utilized malware like WhisperGate to target organizations, particularly those in Ukraine.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ CISA Flags ICS Bugs in Baxter, Mitsubishi Products πŸ•΅οΈβ€β™‚οΈ

The vulnerabilities affect industrial control tech used across the healthcare and critical manufacturing sectors.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Commercial Spyware Use Roars Back Despite Sanctions πŸ•΅οΈβ€β™‚οΈ

Vendors of mercenary spyware tools used by nationstates to track citizens and enemies have gotten savvy about evading efforts to limit their use.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity Talent Shortage Prompts White House Action πŸ•΅οΈβ€β™‚οΈ

The Biden administration launches an initiative to encourage careers in cybersecurity, as businesses try new tactics to get unfilled IT security roles staffed.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Tenable: 26,500 Cyber Vulnerabilities Risk SE Asia’s Banks 🦿

The internetfacing assets were found to be susceptible to potential exploitation in a sample of 90 banking and financial services organisations.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity