πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  Mandos Encrypted File System Unattended Reboot Utility 1.8.17 πŸ› 

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability πŸ–‹οΈ

Ivanti has revealed that a newly patched security flaw in its Cloud Service Appliance CSA has come under active exploitation in the wild. The highseverity vulnerability in question is CVE20248190 CVSS score 7.2, which allows remote code execution under certain circumstances. "An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and before allows.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe πŸš€

ESET research also finds that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks πŸ–‹οΈ

Cybersecurity researchers have warned of ongoing phishing campaigns that abuse refresh entries in HTTP headers to deliver spoofed email login pages that are designed to harvest users' credentials. "Unlike other phishing webpage distribution behavior through HTML content, these attacks use the response header sent by a server, which occurs before the processing of the HTML content," Palo Alto.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ“” UK Hosts International Cyber Skills Conference πŸ“”

Nations participating in the event include the US, Canada, EU countries, India, Japan, Singapore, Ghana and Oman.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… GitLab Community and Enterprise Editions Receive New Updates to Mitigate Severe Security Risks πŸ¦…

GitLab has rolled out essential patch updates for both its Community Edition CE and Enterprise Edition EE, targeting multiple security vulnerabilities and system bugs. These critical updates are crucial for addressing highseverity issues that could jeopardize the security and functionality of GitLab environments.   The new releasesversions 17.3.2, 17.2.5, and 17.1.7introduce a range of fixes and improvements designed to counteract various vulnerabilities. Users operating on the affected versions are urged to promptly upgrade their GitLab instances to protect against these vulnerabilities.   Cybles latest security advisory provides an indepth examination of recent critical patches released by various vendors, with a particular focus on vulnerabilities addressed in GitLab. As a comp...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure πŸ–‹οΈ

Apple has filed a motion to "voluntarily" dismiss its lawsuit against commercial spyware vendor NSO Group, citing a shifting risk landscape that could lead to exposure of critical "threat intelligence" information. The development was first reported by The Washington Post on Friday. The iPhone maker said its efforts, coupled with those of others in the industry and national governments to tackle.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 23andMe Agrees to $30m Data Breach Settlement πŸ“”

Underfire DNA testing firm 23andMe will pay 30m to settle class action lawsuit.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Meta Goes Ahead With Controversial AI Training in UK πŸ“”

Meta has unpaused a project to train AI on Facebook and Instagram posts, despite privacy concerns.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Cloud Access Security Broker Policy 🦿

The rise in cloud adoption has made it imperative for more businesses to rely on cloud providers to store, access, and manage their data and applications. While running applications and services in the cloud offers muchneeded flexibility and scalability, it also introduces new security challenges. The purpose of this Cloud Access Security Broker Policy, created ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ UK convenes international talks on cyber security πŸ“’

Discussions will focus on the cyber security skills gap and international professional standards within the industry.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ T-Mobile’s VM logs allegedly leaked in 20 GB Capgemini data breach πŸ“’

The attacker claims to have stolen databases, source code, credentials, private keys, as well as log files generated by virtual machines belonging to TMobile.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Meta will go ahead with plans to use UK data for AI training πŸ“’

The company says it's satisfied demands from the ICO, though the UK's regulator will continue to monitor the situation.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity & the 2024 US Elections πŸ•΅οΈβ€β™‚οΈ

While the 2024 election may see various cyber threats, existing security measures and coordination across all levels of government aim to minimize their impact.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Fixes GCP Composer Flaw That Could've Led to Remote Code Execution πŸ–‹οΈ

A nowpatched critical security flaw impacting Google Cloud Platform GCP Composer could have been exploited to achieve remote code execution on cloud servers by means of a supply chain attack technique called dependency confusion. The vulnerability has been codenamed CloudImposer by Tenable Research. "The vulnerability could have allowed an attacker to hijack an internal software dependency.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware πŸ–‹οΈ

Cybersecurity researchers are continuing to warn about North Korean threat actors' attempts to target prospective victims on LinkedIn to deliver malware called RustDoor. The latest advisory comes from Jamf Threat Labs, which said it spotted an attack attempt in which a user was contacted on the professional social network by claiming to be a recruiter for a legitimate decentralized.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook πŸ–‹οΈ

Imagine this... You arrive at work to a chaotic scene. Systems are down, panic is in the air. The culprit? Not a rogue virus, but a compromised identity. The attacker is inside your walls, masquerading as a trusted user. This isn't a horror movie, it's the new reality of cybercrime. The question is, are you prepared? Traditional incident response plans are like old maps in a new world. They.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Master Your PCI DSS v4 Compliance with Innovative Smart Approvals πŸ–‹οΈ

The PCI DSS landscape is evolving rapidly. With the Q1 2025 deadline looming ever larger, businesses are scrambling to meet the stringent new requirements of PCI DSS v4.0. Two sections in particular, 6.4.3 and 11.6.1, are troublesome as they demand that organizations rigorously monitor and manage payment page scripts and use a robust change detection mechanism. With the deadline fast approaching.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Advanced Phishing Attacks Put X Accounts at Risk πŸ“”

SIM swapping and adversaryinthemiddle can bypass security for accounts on X formerly Twitter.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Apple to Drop Spyware Lawsuit Over Security Concerns πŸ“”

Apple filed a motion to drop its lawsuit against NSO Group, fears key elements of its cyber defensive measures could be revealed to other spyware vendors.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CISA Adds Ivanti Cloud Services Appliance Vulnerability to Known Exploited Vulnerabilities Catalog (CVE-2024-8190) πŸ¦…

Overview  The Cybersecurity and Infrastructure Security Agency CISA has recently included a security flaw in Ivanti Cloud Services Appliance CSA in its Known Exploited Vulnerabilities KEV catalog. This newly cataloged vulnerability, identified as CVE20248190, involves an OS command injection that poses a serious risk to affected systems.   The vulnerability in question affects the Ivanti Cloud Services Appliance CSA version 4.6, specifically in all versions before Patch 519. It allows remote authenticated attackers with administrative privileges to execute arbitrary commands. This OS command injection flaw poses a risk as it can potentially lead to full system compromise.  The vulnerability was assigned a CVSS score of 7.2, indicating a high severity level. Users of Ivanti CSA 4...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity