πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Progress Software Issues Patch for Vulnerability in LoadMaster and MT Hypervisor πŸ–‹οΈ

Progress Software has released security updates for a maximumseverity flaw in LoadMaster and MultiTenant MT hypervisor that could result in the execution of arbitrary operating system commands. Tracked as CVE20247591 CVSS score 10.0, the vulnerability has been described as an improper input validation bug that results in OS command injection. "It is possible for unauthenticated, remote.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Android SpyAgent Malware Uses OCR to Steal Crypto Wallet Recovery Keys πŸ–‹οΈ

Android device users in South Korea have emerged as a target of a new mobile malware campaign that delivers a new type of threat dubbed SpyAgent. The malware "targets mnemonic keys by scanning for images on your device that might contain them," McAfee Labs researcher SangRyol Ryu said in an analysis, adding the targeting footprint has broadened in scope to include the U.K. The campaign makes use.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ TIDRONE Espionage Group Targets Taiwan Drone Makers in Cyber Campaign πŸ–‹οΈ

A previously undocumented threat actor with likely ties to Chinesespeaking groups has predominantly singled out drone manufacturers in Taiwan as part of a cyber attack campaign that commenced in 2024. Trend Micro is tracking the adversary under the moniker TIDRONE, stating the activity is espionagedriven given the focus on militaryrelated industry chains. The exact initial access vector used.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Offers $10 Million for Info on Russian Cadet Blizzard Hackers Behind Major Attacks πŸ–‹οΈ

The U.S. government and a coalition of international partners have officially attributed a Russian hacking group tracked as Cadet Blizzard to the General Staff Main Intelligence Directorate GRU 161st Specialist Training Center Unit 29155. "These cyber actors are responsible for computer network operations against global targets for the purposes of espionage, sabotage, and reputational harm.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Car Giant Avis Reveals Breach Impacted 300,000 Customers πŸ“”

Rental hire company Avis has notified 300,000 customers of a data breach.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” TfL Admits Some Services Are Down Following Cyber-Attack πŸ“”

Transport for London has revealed several digital services are suspended after a cyberattack last week.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Reputational Hijacking with JamPlus: A Maneuver to Bypass Smart App Control (SAC) πŸ¦…

Key takeaways Cyble Research and Intelligence Labs CRIL has detected a phishing site masquerading as a CapCut download page. The site aims to trick users into downloading malicious software. Threat actors TAs have leveraged a reputationhijacking technique by embedding a legitimate CapCutsigned application within the malicious downloaded package, exploiting the trustworthiness of wellknown apps to bypass security systems. This campaign utilizes a recently demonstrated proofofconcept PoC that repurposes the JamPlus build utility to execute malicious scripts while evading detection. The cyber attack unfolds in multiple stages, employing a mix of legitimate tools, fileless methods, and reputed code repositories such as GitHub to seem legitimate and effect...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Webinar: How to Protect Your Company from GenAI Data Leakage Without Losing It’s Productivity Benefits πŸ–‹οΈ

GenAI has become a table stakes tool for employees, due to the productivity gains and innovative capabilities it offers. Developers use it to write code, finance teams use it to analyze reports, and sales teams create customer emails and assets. Yet, these capabilities are exactly the ones that introduce serious security risks. Register to our upcoming webinar to learn how to prevent GenAI data.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Surfshark vs. NordVPN: Which VPN Is Better in 2024? 🦿

Compare Surfshark and NordVPN to determine which one is better. Explore their features, performance and pricing to make an informed decision.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Man Charged in AI-Generated Music Fraud on Spotify and Apple Music πŸ“”

A North Carolina resident made over 10m in unlawful royalty payments by producing hundreds of thousands of fake songs listened to by bots using AI.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ One More Tool Will Do It? Reflecting on the CrowdStrike Fallout πŸ–‹οΈ

The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that by deploying a firewall, antivirus software, intrusion detection systems, identity threat detection and response, and other tools, they are adequately protected. However, this approach not only fails to address the fundamental issue of the attack surface but also introduces dangerous.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Blind Eagle Targets Colombian Insurance Sector with Customized Quasar RAT πŸ–‹οΈ

The Colombian insurance sector is the target of a threat actor tracked as Blind Eagle with the end goal of delivering a customized version of a known commodity remote access trojan RAT known as Quasar RAT since June 2024. "Attacks have originated with phishing emails impersonating the Colombian tax authority," Zscaler ThreatLabz researcher Gaetano Pellegrino said in a new analysis published.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese Hackers Exploit Visual Studio Code in Southeast Asian Cyberattacks πŸ–‹οΈ

The Chinalinked advanced persistent threat APT group known as Mustang Panda has been observed weaponizing Visual Studio Code software as part of espionage operations targeting government entities in Southeast Asia. "This threat actor used Visual Studio Code's embedded reverse shell feature to gain a foothold in target networks," Palo Alto Networks Unit 42 researcher Tom Fakterman said in a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ How to Establish & Enhance Endpoint Security πŸ•΅οΈβ€β™‚οΈ

Endpoint security has been around for decades, but changes in device use and the quick evolution of new attacks have triggered the development of new security techniques.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Cyber-Attack on Payment Gateway Exposes 1.7 Million Credit Card Details πŸ“”

A cyberattack on Slim CD, which handles electronic payments for US and Canadianbased merchants, has potentially exposed the credit card details of 1.7 million people.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Stegano 0.11.4 πŸ› 

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit LSB technique. It is possible to use a more advanced LSB method based on integers sets. The sets Sieve of Eratosthenes, Fermat, Carmichael numbers, etc. are used to select the pixels used to hide the information.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ›  Packet Fence 14.0.0 πŸ› 

PacketFence is a network access control NAC system. It is actively maintained and has been deployed in numerous largescale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NACoriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registrationbased and scheduled vulnerability scans.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” DDoS Attacks Double With Governments Most Targeted πŸ“”

Distributed denial of service attacks continue to increase, with government the most targeted vertical.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Technology Causes β€œDigital Entropy” as Firms Struggle With Governance πŸ“”

Increasingly complex regulations are stretching governance and compliance in organizations, warns the IAPP.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Junior Accountant 🌊

The post Junior Accountant appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Product Manager 🌊

The post Product Manager appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity