πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ 'Hadooken' Malware Targets Oracle's WebLogic Servers πŸ•΅οΈβ€β™‚οΈ

An attacker is using the tool to deploy a cryptominer and the Tsunami DDoS bot on compromised systems.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Socially Savvy Scattered Spider Traps Cloud Admins in Web πŸ•΅οΈβ€β™‚οΈ

The dangerous ransomware group is targeting financial and insurance sectors using smishing and vishing against IT service desk administrators, cybersecurity teams, and other employees with toplevel privileges.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Singapore Arrests 6 Suspected Members of African Cybercrime Group πŸ•΅οΈβ€β™‚οΈ

Law enforcement seized electronics containing special hacking tools and software as well as a substantial amount of cash in the raids.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google Cloud Strengthens Backup Service With Untouchable Vaults 🦿

The backup and data recovery service adds an extra layer of protection in case a business encounters an attack or another major problem with Google Cloud storage.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Android Malware 'Ajina.Banker' Steals Financial Data and Bypasses 2FA via Telegram πŸ–‹οΈ

Bank customers in the Central Asia region have been targeted by a new strain of Android malware codenamed Ajina.Banker since at least November 2024 with the goal of harvesting financial information and intercepting twofactor authentication 2FA messages. Singaporeheadquartered GroupIB, which discovered the threat in May 2024, said the malware is propagated via a network of Telegram channels.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Urgent: GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job Execution πŸ–‹οΈ

GitLab on Wednesday released security updates to address 17 security vulnerabilities, including a critical flaw that allows an attacker to run pipeline jobs as an arbitrary user. The issue, tracked as CVE20246678, carries a CVSS score of 9.9 out of a maximum of 10.0 "An issue was discovered in GitLab CEEE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Irish Data Protection Regulator to Investigate Google AI πŸ“”

Irelands Data Protection Commission launches inquiry into whether Google followed GDPR rules over AI model training.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Schools Face Million-Dollar Bills as Ransomware Rises πŸ“”

Ransomware gangs are targeting schools and higher education, with victims facing soaring ransom and recovery costs.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ UK's data protection watchdog deepens cooperation with National Crime Agency πŸ“’

The two bodies want to improve the support given to organizations experiencing cyber attacks and ransomware recovery.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft VS Code Undermined in Asian Spy Attack πŸ•΅οΈβ€β™‚οΈ

A technique to abuse Microsoft's builtin source code editor has finally made it into the wild, thanks to China's Mustang Panda APT.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency πŸ–‹οΈ

Cybersecurity researchers have uncovered a new malware campaign targeting Linux environments to conduct illicit cryptocurrency mining. The activity, which specifically singles out the Oracle Weblogic server, is designed to deliver malware dubbed Hadooken, according to cloud security firm Aqua. "When Hadooken is executed, it drops a Tsunami malware and deploys a crypto miner," security researcher.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Everything you need to know about the Fortinet data breach πŸ“’

Fortinet claims there is no evidence of malicious activity targeting customers in the wake of the breach.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ β€œBy this time next year, Oracle employees won't be using passwords” β€” Larry Ellison wants a biometric future in cybersecurity πŸ“’

The Oracle CTO hit out at passwords, calling them insecure and easy to steal.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Vows to Prevent Future CrowdStrike-Like Outages πŸ“”

Microsoft will introduce new security capabilities for solution providers outside of kernel mode, preventing events like the CrowdStrike global outage.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Stealthy Fileless Attack Targets Attendees of Upcoming US-Taiwan Defense Industry Event πŸ¦…

Key Takeaways Cyble Research and Intelligence Labs CRIL identified a campaign targeting individuals connected to the upcoming USTaiwan Defense Industry Conference, as indicated by the lure document uncovered during the investigation. The campaign involves a ZIP archive containing an LNK file that mimics a legitimate PDF registration form for deception. When the LNK file is opened, it executes commands to drop a lure PDF and an executable in the startup folder, establishing persistence. Upon system reboot, the executable downloads additional content and executes it directly in memory, effectively evading detection by the security products. The firststage loader triggers a secondstage loader, which downloads, decodes, and compiles C code in memory, avoiding the creation of tr...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ransomware series: Exploring the tools & solutions that comprise a comprehensive ransomware strategy πŸ“’

Learn about the latest trends in attack techniques and leadingedge defensive countermeasures.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cracking open insider threats πŸ“’

Leaders need to perform strict identity measures on wouldbe hires and ensure employees who leave have access promptly removed.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Proofpoint and CyberArk expand strategic partnership πŸ“’

The collaboration includes a new ZenWeb browser extension to protect employees from malicious URLs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hardware Supply Chain Threats Can Undermine Endpoint Infrastructure πŸ•΅οΈβ€β™‚οΈ

To prevent this, organizations should focus on developing secure hardware and firmware foundations, enabling them to manage, monitor, and remediate hardware and firmware security.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ The Dark Nexus Between Harm Groups and β€˜The Com’ β™ŸοΈ

A cyberattack that shut down some of the top casinos in Las Vegas last year quickly became one of the most riveting security stories of 2023 It was the first known case of native Englishspeaking hackers in the United States and Britain teaming up with ransomware gangs based in Russia. But that madeforHollywood narrative has eclipsed a far more hideous trend Many of these young, Western cybercriminals are also members of fastgrowing online groups that exist solely to bully, stalk, harass and extort vulnerable teens into physically harming themselves and others.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 What can businesses learn from the rise of cyber espionage? 🧠

Its not just government organizations that need to worry about cyber espionage campaigns the entire business world is also a target. Multipolarity has been a defining trend in geopolitics in recent years. Rivalries between the worlds great powers continue to test the limits of globalism, resulting in growing disruption to international supply chains and The post What can businesses learn from the rise of cyber espionage? appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1