πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Blind Eagle Targets Colombian Insurance Sector with Customized Quasar RAT πŸ–‹οΈ

The Colombian insurance sector is the target of a threat actor tracked as Blind Eagle with the end goal of delivering a customized version of a known commodity remote access trojan RAT known as Quasar RAT since June 2024. "Attacks have originated with phishing emails impersonating the Colombian tax authority," Zscaler ThreatLabz researcher Gaetano Pellegrino said in a new analysis published.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese Hackers Exploit Visual Studio Code in Southeast Asian Cyberattacks πŸ–‹οΈ

The Chinalinked advanced persistent threat APT group known as Mustang Panda has been observed weaponizing Visual Studio Code software as part of espionage operations targeting government entities in Southeast Asia. "This threat actor used Visual Studio Code's embedded reverse shell feature to gain a foothold in target networks," Palo Alto Networks Unit 42 researcher Tom Fakterman said in a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ How to Establish & Enhance Endpoint Security πŸ•΅οΈβ€β™‚οΈ

Endpoint security has been around for decades, but changes in device use and the quick evolution of new attacks have triggered the development of new security techniques.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Cyber-Attack on Payment Gateway Exposes 1.7 Million Credit Card Details πŸ“”

A cyberattack on Slim CD, which handles electronic payments for US and Canadianbased merchants, has potentially exposed the credit card details of 1.7 million people.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Stegano 0.11.4 πŸ› 

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit LSB technique. It is possible to use a more advanced LSB method based on integers sets. The sets Sieve of Eratosthenes, Fermat, Carmichael numbers, etc. are used to select the pixels used to hide the information.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ›  Packet Fence 14.0.0 πŸ› 

PacketFence is a network access control NAC system. It is actively maintained and has been deployed in numerous largescale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NACoriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registrationbased and scheduled vulnerability scans.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” DDoS Attacks Double With Governments Most Targeted πŸ“”

Distributed denial of service attacks continue to increase, with government the most targeted vertical.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Technology Causes β€œDigital Entropy” as Firms Struggle With Governance πŸ“”

Increasingly complex regulations are stretching governance and compliance in organizations, warns the IAPP.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Junior Accountant 🌊

The post Junior Accountant appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Product Manager 🌊

The post Product Manager appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks πŸ–‹οΈ

A novel sidechannel attack has been found to leverage radio signals emanated by a device's random access memory RAM as a data exfiltration mechanism, posing a threat to airgapped networks. The technique has been codenamed RAMBO by Dr. Mordechai Guri, the head of the Offensive Cyber Research Lab in the Department of Software and Information Systems Engineering at the Ben Gurion University of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 10 Writing Tips for Cybersecurity Professionals πŸ•΅οΈβ€β™‚οΈ

It takes more than technical knowledge to write about cybersecurity in a way people want to read. It takes creativity, discipline, and other key skills.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Akira Ransomware Actors Exploit SonicWall Bug for RCE πŸ•΅οΈβ€β™‚οΈ

CISA has added CE202440766 to its Known Exploited Vulnerabilities catalog.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 300K Victims' Data Compromised in Avis Car Rental Breach πŸ•΅οΈβ€β™‚οΈ

Though the company reports that data was exfiltrated in the breach, it has been remained tightlipped regarding the kind of data that was exposed.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Most Common Cybersecurity Threats to Avoid! 🦿

From phishing scams to ransomware attacks, discover what these threats look like and how you can protect yourself and your business.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Senior Python Developer 🌊

The post Senior Python Developer appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Why you should always be wary of insider threats: A disgruntled employee at a US industrial firm deleted backups and locked IT admins out of workstations in a failed data extortion attempt πŸ“’

Daniel Rhyne tried to extort his former employee for 750,000 before being tracked down by law enforcement.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Cloud security fears, rising costs, privacy concerns? πŸ“’

Here's why businesses are turning back to onprem servers.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Mustang Panda Feeds Worm-Driven USB Attack Strategy πŸ•΅οΈβ€β™‚οΈ

A fresh wave of attacks on APAC government entities involves both selfpropagating malware spreading via removable drives and a spearphishing campaign.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Platform Engineering Is Security Engineering πŸ•΅οΈβ€β™‚οΈ

For modern applications built on Kubernetes and microservices, platform engineering is not just about building functional systems but also about embedding security into the fabric of those systems.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dark Reading Confidential: Pen Test Arrests, Five Years Later πŸ•΅οΈβ€β™‚οΈ

Episode 3 On September 11, 2019, two cybersecurity professionals were arrested in Dallas County, Iowa and forced to spend the night in jail just for doing their jobs. Gary De Mercurio and Justin Wynn. Despite the criminal charges against them eventually being dropped, the saga that night five years ago continues to haunt De Mercurio and Wynn personally and professionally. In this episode, the pair and Coalfire's CEO Tom McAndrew share how the arrest and fallout has shaped their lives and careers as well as how it has transformed physical penetration tests for the cybersecurity industry as a whole.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity