πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Cracking open insider threats πŸ“’

Leaders need to perform strict identity measures on wouldbe hires and ensure employees who leave have access promptly removed.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Proofpoint and CyberArk expand strategic partnership πŸ“’

The collaboration includes a new ZenWeb browser extension to protect employees from malicious URLs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hardware Supply Chain Threats Can Undermine Endpoint Infrastructure πŸ•΅οΈβ€β™‚οΈ

To prevent this, organizations should focus on developing secure hardware and firmware foundations, enabling them to manage, monitor, and remediate hardware and firmware security.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ The Dark Nexus Between Harm Groups and β€˜The Com’ β™ŸοΈ

A cyberattack that shut down some of the top casinos in Las Vegas last year quickly became one of the most riveting security stories of 2023 It was the first known case of native Englishspeaking hackers in the United States and Britain teaming up with ransomware gangs based in Russia. But that madeforHollywood narrative has eclipsed a far more hideous trend Many of these young, Western cybercriminals are also members of fastgrowing online groups that exist solely to bully, stalk, harass and extort vulnerable teens into physically harming themselves and others.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 What can businesses learn from the rise of cyber espionage? 🧠

Its not just government organizations that need to worry about cyber espionage campaigns the entire business world is also a target. Multipolarity has been a defining trend in geopolitics in recent years. Rivalries between the worlds great powers continue to test the limits of globalism, resulting in growing disruption to international supply chains and The post What can businesses learn from the rise of cyber espionage? appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers πŸ–‹οΈ

Details have emerged about a nowpatched security flaw impacting Apple's Vision Pro mixed reality headset that, if successfully exploited, could allow malicious attackers to infer data entered on the device's virtual keyboard. The attack, dubbed GAZEploit, has been assigned the CVE identifier CVE202440865. "A novel attack that can infer eyerelated biometrics from the avatar image to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London πŸ–‹οΈ

British authorities on Thursday announced the arrest of a 17yearold male in connection with a cyber attack affecting Transport for London TfL. "The 17yearold male was detained on suspicion of Computer Misuse Act offenses in relation to the attack, which was launched on TfL on 1 September," the U.K. National Crime Agency NCA said. The teenager, who's from Walsall, is said to have been.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft πŸ–‹οΈ

Even as cyber threats become increasingly sophisticated, the number one attack vector for unauthorized access remains phished credentials Verizon DBIR, 2024. Solving this problem resolves over 80 of your corporate risk, and a solution is possible.  However, most tools available on the market today cannot offer a complete defense against this attack vector because they were architected to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud πŸ–‹οΈ

Cybersecurity researchers have uncovered a new variant of an Android banking trojan called TrickMo that comes packed with new capabilities to evade analysis and display fake login screens to capture victims' banking credentials. "The mechanisms include using malformed ZIP files in combination with JSONPacker," Cleafy security researchers Michele Roviello and Alessandro Strino said. "In addition,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw πŸ–‹οΈ

Malicious actors are likely leveraging publicly available proofofconcept PoC exploits for recently disclosed security flaws in Progress Software WhatsUp Gold to conduct opportunistic attacks. The activity is said to have commenced on August 30, 2024, a mere five hours after a PoC was released for CVE20246670 CVSS score 9.8 by security researcher Sina Kheirkhah of the Summoning Team, who.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malicious Actors Spreading False US Voter Registration Breach Claims πŸ“”

An FBI and CISA alert highlighted false claims of breaches of voter registration databases, designed to undermine confidence in US elections.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Record $65m Settlement for Hacked Patient Photos πŸ“”

Over 600 patients and employees of Lehigh Valley Health Network in Pennsylvania had their medical record photos hacked and posted on the internet.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Fortinet Confirms Customer Data Breach via Third Party πŸ•΅οΈβ€β™‚οΈ

The incident is a reminder why organizations need to pay attention to how they store and secure data in SaaS and cloud environments.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Compliance Automation Pays Off for a Growing Company πŸ•΅οΈβ€β™‚οΈ

In this case study, a CISO helps a B2B marketing automation company straighten out its manual compliance process by automating it.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Malicious Actors Sow Discord With False Election Compromise Claims πŸ•΅οΈβ€β™‚οΈ

The FBI and CISA are warning citizens of attempts to convince voters that US election infrastructure has been compromised. It hasn't been.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ NFL Teams Block & Tackle Cyberattacks in a Digital World πŸ•΅οΈβ€β™‚οΈ

As the 104th season of the National Football League kicks off, expect cyberattacks aimed at its customers, players, and arenas.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Mandos Encrypted File System Unattended Reboot Utility 1.8.17 πŸ› 

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability πŸ–‹οΈ

Ivanti has revealed that a newly patched security flaw in its Cloud Service Appliance CSA has come under active exploitation in the wild. The highseverity vulnerability in question is CVE20248190 CVSS score 7.2, which allows remote code execution under certain circumstances. "An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe πŸš€

ESET research also finds that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks πŸ–‹οΈ

Cybersecurity researchers have warned of ongoing phishing campaigns that abuse refresh entries in HTTP headers to deliver spoofed email login pages that are designed to harvest users' credentials. "Unlike other phishing webpage distribution behavior through HTML content, these attacks use the response header sent by a server, which occurs before the processing of the HTML content," Palo Alto.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ“” UK Hosts International Cyber Skills Conference πŸ“”

Nations participating in the event include the US, Canada, EU countries, India, Japan, Singapore, Ghana and Oman.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1