πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Cyberattack Group 'Awaken Likho' Targets Russian Government with Advanced Tools πŸ–‹οΈ

Russian government agencies and industrial entities are the target of an ongoing activity cluster dubbed Awaken Likho. "The attackers now prefer using the agent for the legitimate MeshCentral platform instead of the UltraVNC module, which they had previously used to gain remote access to systems," Kaspersky said, detailing a new campaign that began in June 2024 and continued at least until.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Case Study: The Evil Twin Checkout Page πŸ–‹οΈ

Is your store at risk? Discover how an innovative web security solution saved one global online retailer and its unsuspecting customers from an evil twin disaster. Read the full reallife case study here. The Invisible Threat in Online Shopping When is a checkout page, not a checkout page? When it's an evil twin! Malicious redirects can send unsuspecting shoppers to these perfectlooking.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ GoldenJackal Target Embassies and Air-Gapped Systems Using Malware Toolsets πŸ–‹οΈ

A littleknown threat actor tracked as GoldenJackal has been linked to a series of cyber attacks targeting embassies and governmental organizations with an aim to infiltrate airgapped systems using two disparate bespoke toolsets. Victims included a South Asian embassy in Belarus and a European Union government E.U. organization, Slovak cybersecurity company ESET said. "The ultimate goal of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Value of AI-Powered Identity πŸ–‹οΈ

Introduction Artificial intelligence AI deepfakes and misinformation may cause worry in the world of technology and investment, but this powerful, foundational technology has the potential to benefit organizations of all kinds when harnessed appropriately. In the world of cybersecurity, one of the most important areas of application of AI is augmenting and enhancing identity management.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Cyble Honeypot Sensors Detect D-Link, Cisco, QNAP and Linux Attacks πŸ¦…

Key Takeaways Threat actors continue to exploit several recent vulnerabilities that users have been slow to mitigate. Cyble honeypot sensors detected attacks on vulnerabilities in Cisco ASA, QNAP QTS, DLink, PHP, Progress Telerik, and other targets. Linux malware remains a persistent threat, as threat actors find new ways to infect the supply chain and other vectors. Cyble sensors also discovered new spam email campaigns and thousands of bruteforce attempts. Overview Cybles Vulnerability Intelligence unit last week detected numerous exploit attempts, malware intrusions, phishing campaigns, and bruteforce attacks via its network of Honeypot sensors. In the week of Sept. 25Oct. 1, Cyble researchers identified several recent active exploits, including new attacks ag...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Warns of Foreign Interference in Congressional Races Ahead of Election πŸ“”

Iran is targeting the US presidential race, China the congressional races, and Russia both.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Rubrik and Pure Storage collaborate on multi layered data resilience architecture πŸ“’

Threelayered framework aims to help customers strengthen their defense against evolving security threats.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Can a VPN Be Hacked? 🦿

Learn about the potential vulnerabilities of VPNs and the measures you can take to enhance your VPN security.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Is AI saving jobs… or taking them? 🧠

Artificial intelligence AI is coming to take your cybersecurity job. Or, AI will save your job. Well, which is it? As with all things securityrelated, AIrelated and employmentrelated, its complicated. How AI creates jobs A major reason its complicated is that AI is helping to increase the demand for cybersecurity professionals in two broad ways. The post Is AI saving jobs or taking them? appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” 31 New Ransomware Groups Join the Ecosystem in 12 Months πŸ“”

Secureworks reports a 30 increase in active ransomware groups despite law enforcement efforts, with 31 new groups emerging in the past year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ“’ Do more with less: Optimizing servers with HPE to maximize VMware licensing πŸ“’

Your trusted guide through the changes in the virtualization market.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ex-Uber CISO Requests a New, 'Fair' Trial πŸ•΅οΈβ€β™‚οΈ

Attorneys for Joseph Sullivan argue the jury didn't hear essential facts of the case during the original trial and that his conviction must be overturned.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 5 CVEs in Microsoft's October Update to Patch Immediately πŸ•΅οΈβ€β™‚οΈ

Threat actors are actively exploiting two of the vulnerabilities, while three others are publicly known and ripe for attack.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Healthcare's Grim Cyber Prognosis Requires Security Booster πŸ•΅οΈβ€β™‚οΈ

As healthcare organizations struggle against operational issues, twothirds of the industry suffered ransomware attacks in the past year, and an increasing number are caving to extortion and paying up.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How Major Companies Are Honoring Cybersecurity Awareness Month πŸ•΅οΈβ€β™‚οΈ

The annual event reinforces best practices while finding new ways to build a culture where employees understand how their daily decisions affect company security. Find out how AWS, IBM, Intuit, SentinelOne, and Gallo are spreading the word.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Perils of Ignoring Cybersecurity Basics πŸ•΅οΈβ€β™‚οΈ

The massive outage involving a faulty Falcon update is an excellent illustration of what happens when organizations neglect security fundamentals.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Your IT Systems Are Being Attacked. Are You Prepared? πŸ•΅οΈβ€β™‚οΈ

Company leadership needs to ensure technology teams are managing continuous monitoring, automated testing, and alignment with business needs across their enterprise.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ American Water Suffers Network Disruptions After Cyberattack πŸ•΅οΈβ€β™‚οΈ

The largest publicly traded water utility in the US was forced to disconnect some of its online systems, and its website and telecommunications system remained unavailable as of Tuesday morning, Oct. 8.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  NIELD (Network Interface Events Logging Daemon) 0.6.2 πŸ› 

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the netlink socket and generates logs related to link state, neighbor cache ARP,NDP, IP address IPv4,IPv6, route, FIB rules, and traffic control.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Patch Tuesday, October 2024 Edition β™ŸοΈ

Microsoft today released security updates to fix at least 117 security holes in Windows computers and other software, including two vulnerabilities that are already seeing active attacks. Also, Adobe plugged 52 security holes across a range of products, and Apple has addressed a bug in its new macOS 15 "Sequoia" update that broke many cybersecurity tools.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Zero-Day Alert: Three Critical Ivanti CSA Vulnerabilities Actively Exploited πŸ–‹οΈ

Ivanti has warned that three new security vulnerabilities impacting its Cloud Service Appliance CSA have come under active exploitation in the wild. The zeroday flaws are being weaponized in conjunction with another flaw in CSA that the company patched last month, the Utahbased software services provider said. Successful exploitation of these vulnerabilities could allow an authenticated.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity