πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” US and Allies Accuse Russian Military of Destructive Cyber-Attacks πŸ“”

The joint government advisory highlighted the cyber activities of Unit 29155, which has launched destructive cyberattacks against critical infrastructure globally.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Spear-Phishing in the Battlefield: Gamaredon’s Ongoing Assault on Ukraine’s Military πŸ¦…

Key Takeaways Cyble Research and Intelligence Labs CRIL identified an active Gamaredon campaign targeting Ukrainian military personnel through spearphishing emails. The emails include malicious XHTML attachments, which, when opened, execute obfuscated JavaScript code that downloads a malicious archive to the victims system. This archive contains a Windows shortcut LNK file that, when triggered, initiates the execution of a remote .tar archive hosted on TryCloudflare.com via mshta.exe. The Threat Actors TAs leverage TryCloudflares onetime tunnel feature to anonymously host malicious files and access resources remotely without detection. The campaign appears to be largescale and coordinated, as indicated by the widespread distribution of similar files, and it remains ongoing ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISA issues alert over two high-severity DrayTek vulnerabilities – here’s what you need to know πŸ“’

Users of DrayTek's network equipment management software have been urged to remain vigilant.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Using Transparency & Sharing to Defend Critical Infrastructure πŸ•΅οΈβ€β™‚οΈ

No organization can singlehandedly defend against sophisticated attacks. Governments and private sector entities need to collaborate, share information, and develop defenses against cyber threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🧠 How cyber criminals are compromising AI software supply chains 🧠

With the adoption of artificial intelligence AI soaring across industries and use cases, preventing AIdriven software supply chain attacks has never been more important. Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in opensource repositories like Hugging Face and GitHub. The group, claiming to The post How cyber criminals are compromising AI software supply chains appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Spyware Vendors' Nebulous Ecosystem Helps Them Evade Sanctions πŸ“”

The secret web of at least 435 entities across 42 countries making up the spyware landscape facilitates unpunished security and human rights violations, the Atlantic Council found.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ CISA issues alert over two high-severity DrayTek vulnerabilities – here’s what you need to know πŸ“’

Users of DrayTek's network equipment management software have been urged to remain vigilant.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Feds Warn on Russian Actors Targeting Critical Infrastructure πŸ•΅οΈβ€β™‚οΈ

In the past, Putin's Unit 29155 has utilized malware like WhisperGate to target organizations, particularly those in Ukraine.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ CISA Flags ICS Bugs in Baxter, Mitsubishi Products πŸ•΅οΈβ€β™‚οΈ

The vulnerabilities affect industrial control tech used across the healthcare and critical manufacturing sectors.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Commercial Spyware Use Roars Back Despite Sanctions πŸ•΅οΈβ€β™‚οΈ

Vendors of mercenary spyware tools used by nationstates to track citizens and enemies have gotten savvy about evading efforts to limit their use.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity Talent Shortage Prompts White House Action πŸ•΅οΈβ€β™‚οΈ

The Biden administration launches an initiative to encourage careers in cybersecurity, as businesses try new tactics to get unfilled IT security roles staffed.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Tenable: 26,500 Cyber Vulnerabilities Risk SE Asia’s Banks 🦿

The internetfacing assets were found to be susceptible to potential exploitation in a sample of 90 banking and financial services organisations.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SonicWall Urges Users to Patch Critical Firewall Flaw Amid Possible Exploitation πŸ–‹οΈ

SonicWall has revealed that a recently patched critical security flaw impacting SonicOS may have come under active exploitation, making it essential that users apply the patches as soon as possible. The vulnerability, tracked as CVE202440766, carries a CVSS score of 9.3 out of a maximum of 10. "An improper access control vulnerability has been identified in the SonicWall SonicOS management.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ GeoServer Vulnerability Targeted by Hackers to Deliver Backdoors and Botnet Malware πŸ–‹οΈ

A recently disclosed security flaw in OSGeo GeoServer GeoTools has been exploited as part of multiple campaigns to deliver cryptocurrency miners, botnet malware such as Condi and JenX, and a known backdoor called SideWalk. The security vulnerability is a critical remote code execution bug CVE202436401, CVSS score 9.8 that could allow malicious actors to take over susceptible instances. In.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ GitHub Actions Vulnerable to Typosquatting, Exposing Developers to Hidden Malicious Code πŸ–‹οΈ

Threat actors have long leveraged typosquatting as a means to trick unsuspecting users into visiting malicious websites or downloading boobytrapped software and packages. These attacks typically involve registering domains or packages with names slightly altered from their legitimate counterparts e.g., goog1e.com vs. google.com. Adversaries targeting opensource repositories across.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Threat Actors Deploy COVERTCATCH Malware via LinkedIn Job Scams πŸ–‹οΈ

Threat actors affiliated with North Korea have been observed leveraging LinkedIn as a way to target developers as part of a fake job recruiting operation. These attacks employ coding tests as a common initial infection vector, Googleowned Mandiant said in a new report about threats faced by the Web3 sector. "After an initial chat conversation, the attacker sent a ZIP file that contained.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ FBI Cracks Down on Dark Web Marketplace Managed by Russian and Kazakh Nationals πŸ–‹οΈ

Two men have been indicted in the U.S. for their alleged involvement in managing a dark web marketplace called WWH Club that specializes in the sale of sensitive personal and financial information. Alex Khodyrev, a 35yearold Kazakhstan national, and Pavel Kublitskii, a 37yearold Russian national, have been charged with conspiracy to commit access device fraud and conspiracy to commit wire.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3πŸ€”1
πŸ“’ Progress Software discloses maximum severity LoadMaster flaw – here’s what you need to know πŸ“’

The RCE flaw primarily affects Progress Softwares LoadMaster and LoadMaster MultiTenant hypervisor software.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ₯°1
πŸ•΅οΈβ€β™‚οΈ 'TIDrone' Cyberattackers Target Taiwan's Drone Manufacturers πŸ•΅οΈβ€β™‚οΈ

The Chinesespeaking group is launching sophisticated malware towards military and satellite targets globally.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Is Apple’s iCloud Keychain Safe to Use in 2024? 🦿

Learn about the benefits and downsides of Apple's iCloud Keychain and discover some alternative options.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 10 Things You Should Do to Securely Dispose of Computers 🦿

Even in the best of times, computers are rotated out of use and we have to figure out how we should dispose of them. TechRepublic Premium offers the following list of tips for secure equipment disposal. Featured text from the download 4 Be methodical Keep a checklist for the decommissioning process to make sure you ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity