πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Microsoft Fixes Four Actively Exploited Zero-Days πŸ“”

Septembers Patch Tuesday fixlist features scores of CVEs including four zeroday vulnerabilities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Gallup: Pollster Acts to Close Down Security Threat πŸ“”

As the US presidential election draws near, polling company Gallup acts to block XSS vulnerability.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Supporting scalability πŸ“’

Supporting scalability.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Maximizing your AWS cost savings πŸ“’

Maximizing your AWS cost savings.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Unlocking AWS success with DoiT πŸ“’

Unlocking AWS success with DoiT.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Technology to optimize your cloud πŸ“’

An intelligent system admin who's always on the job.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Quad7 Botnet Expands to Target SOHO Routers and VPN Appliances πŸ–‹οΈ

The operators of the mysterious Quad7 botnet are actively evolving by compromising several brands of SOHO routers and VPN appliances by leveraging a combination of both known and unknown security flaws. Targets include devices from TPLINK, Zyxel, Asus, Axentra, DLink, and NETGEAR, according to a new report by French cybersecurity company Sekoia. "The Quad7 botnet operators appear to be.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and Europe πŸ–‹οΈ

A "simplified Chinesespeaking actor" has been linked to a new campaign that has targeted multiple countries in Asia and Europe with the end goal of performing search engine optimization SEO rank manipulation. The black hat SEO cluster has been codenamed DragonRank by Cisco Talos, with victimology footprint scattered across Thailand, India, Korea, Belgium, the Netherlands, and China. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Operational Technology Leaves Itself Open to Cyber-Attack πŸ“”

Excessive use of remote access tools is leaving operational technology devices vulnerable, with even basic security features missing.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Major ICS Security Flaws Disclosed in LOYTEC, Hughes, and Baxter Products πŸ¦…

Key Takeaways Three major advisories from CISA address 17 vulnerabilities across products from LOYTEC Electronics GmbH, Hughes Network Systems, and Baxter. Multiple products are affected by vulnerabilities allowing for the cleartext transmission of sensitive data, such as passwords, which could be exploited through ManintheMiddle MitM attacks. Despite being reported in 2021, these vulnerabilities are now publicly disclosed due to the vendor's lack of response. With 629 internetexposed instances, primarily in Italy and France, the likelihood of exploitation is high. Proof of Concepts PoCs for these vulnerabilities is publicly available. Other notable vulnerabilities include insufficiently protected credentials and SQL injection, affecting critical infrastructure systems. ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Cybersecurity Hiring: How to Overcome Talent Shortages and Skills Gaps 🦿

According to the ISC2, 90 of organizations face cybersecurity skills shortages. Plus, the gap between roles to fill and available talent widened.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Amateurish 'CosmicBeetle' Ransomware Stings SMBs in Turkey πŸ•΅οΈβ€β™‚οΈ

With an immature codebase and a "rather chaotic encryption scheme" prone to failure, the group targets small businesses with custom malware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dark Reading Expands Its Coverage to the Asia-Pacific Region πŸ•΅οΈβ€β™‚οΈ

The latest step in a journey to serve cybersecurity professionals in other regions of the world.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ WordPress Mandates Two-Factor Authentication for Plugin and Theme Developers πŸ–‹οΈ

WordPress.org has announced a new account security measure that will require accounts with capabilities to update plugins and themes to activate twofactor authentication 2FA mandatorily. The enforcement is expected to come into effect starting October 1, 2024. "Accounts with commit access can push updates and changes to plugins and themes used by millions of WordPress sites worldwide," the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
πŸ“” Open Source Updates Have 75% Chance of Breaking Apps πŸ“”

Endor Labs claims security patches can break underlying open source software 75 of the time.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Business Email Compromise Costs $55bn Over a Decade πŸ“”

New FBI data reveals BEC scams have cost businesses more than 55bn since 2013.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hackers Proxyjack & Cryptomine Selenium Grid Servers πŸ•΅οΈβ€β™‚οΈ

A vendor honeypot caught two attacks intended to leverage the tens of thousands of exposed Selenium Grid Web app testing servers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 6 Best Penetration Testing Companies for 2024 🦿

Discover the top six penetration testing companies for businesses of all sizes. Learn the pros and cons of pentesting providers like Astra, BreachLock, and Acunetix.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Top 3 Threat Report Insights for Q2 2024 πŸ–‹οΈ

Cato CTRL Cyber Threats Research Lab has released its Q2 2024 Cato CTRL SASE Threat Report. The report highlights critical findings based on the analysis of a staggering 1.38 trillion network flows from more than 2,500 of Catos global customers, between April and June 2024. Key Insights from the Q2 2024 Cato CTRL SASE Threat Report The report is packed with unique insights that are based on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Iranian Cyber Group OilRig Targets Iraqi Government in Sophisticated Malware Attack πŸ–‹οΈ

Iraqi government networks have emerged as the target of an "elaborate" cyber attack campaign orchestrated by an Iran statesponsored threat actor called OilRig. The attacks singled out Iraqi organizations such as the Prime Minister's Office and the Ministry of Foreign Affairs, cybersecurity company Check Point said in a new analysis. OilRig, also called APT34, Crambus, Cobalt Gypsy, GreenBug,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ireland's Watchdog Launches Inquiry into Google's AI Data Practices in Europe πŸ–‹οΈ

The Irish Data Protection Commission DPC has announced that it has commenced a "CrossBorder statutory inquiry" into Google's foundational artificial intelligence AI model to determine whether the tech giant has adhered to data protection regulations in the region when processing the personal data of European users. "The statutory inquiry concerns the question of whether Google has complied.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity