πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β™ŸοΈ Patch Tuesday, October 2024 Edition β™ŸοΈ

Microsoft today released security updates to fix at least 117 security holes in Windows computers and other software, including two vulnerabilities that are already seeing active attacks. Also, Adobe plugged 52 security holes across a range of products, and Apple has addressed a bug in its new macOS 15 "Sequoia" update that broke many cybersecurity tools.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Zero-Day Alert: Three Critical Ivanti CSA Vulnerabilities Actively Exploited πŸ–‹οΈ

Ivanti has warned that three new security vulnerabilities impacting its Cloud Service Appliance CSA have come under active exploitation in the wild. The zeroday flaws are being weaponized in conjunction with another flaw in CSA that the company patched last month, the Utahbased software services provider said. Successful exploitation of these vulnerabilities could allow an authenticated.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines πŸ–‹οΈ

Users searching for game cheats are being tricked into downloading a Luabased malware that is capable of establishing persistence on infected systems and delivering additional payloads. "These attacks capitalize on the popularity of Lua gaming engine supplements within the student gamer community," Morphisec researcher Shmuel Uzan said in a new report published today, adding "this malware.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” American Water Hit by Cyber-Attack, Billing Systems Disrupted πŸ“”

American Water, the largest water utility in the US, discovered a cyberattack impacting internal systems on October 3.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cloud Security Risks Surge as 38% of Firms Face Exposures πŸ“”

Tenables latest report reveals 38 of organizations face risks from a toxic cloud triad of security gaps.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Apple Issues Urgent Security Advisory for iOS and iPadOS Vulnerabilities πŸ¦…

Overview Apple has released a new security advisory highlighting the issues affecting Apples iOS and iPadOS platforms. As detailed in the advisory, two vulnerabilities have been identified, both of which affect Apple iOS and iPadOS up to version 18.0. The vendor is Apple, and patches are available for these vulnerabilities.  The first vulnerability, CVE202444204, relates to information disclosure and has been assigned a CVSSv3.1 score of 5.5, indicating a medium severity level. This vulnerability allows saved passwords to be read aloud by the VoiceOver feature, posing a significant privacy risk for users on affected iOS and iPadOS versions. A patch is available for this vulnerability. The second vulnerability, CVE202444207, also relates to information disclosure, with a CVSSv3...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… MisterioLNK: The Open-Source Builder Behind Malicious Loaders πŸ¦…

Cyble Research and Intelligence Labs CRIL has uncovered a new, previously undetected loader builder known as "MisterioLNK." This discovery follows our earlier analysis of Quantum Software, another LNK filebased builder that has been gaining traction in the cyber landscape. MisterioLNK, available on GitHub, presents a significant challenge to security defenses, as files generated by this tool currently exhibit minimal or zero detection rates by conventional security systems. As described on GitHub, MisterioLNK is an opensource loader builder that leverages Windows script engines to execute malicious payloads while employing obfuscation as well. It is crafted to operate discreetly, downloading files into temporary directories before launching them, thereby enhancing its evasive capabi...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Detects Growing Use of File Hosting Services in Business Email Compromise Attacks πŸ–‹οΈ

Microsoft is warning of cyber attack campaigns that abuse legitimate file hosting services such as SharePoint, OneDrive, and Dropbox that are widely used in enterprise environments as a defense evasion tactic. The end goal of the campaigns are broad and varied, allowing threat actors to compromise identities and devices and conduct business email compromise BEC attacks, which ultimately result.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Microsoft Issues Security Update Fixing 118 Flaws, Two Actively Exploited in the Wild πŸ–‹οΈ

Microsoft has released security updates to fix a total of 118 vulnerabilities across its software portfolio, two of which have come under active exploitation in the wild. Of the 118 flaws, three are rated Critical, 113 are rated Important, and two are rated Moderate in severity. The Patch Tuesday update doesn't include the 25 additional flaws that the tech giant addressed in its Chromiumbased.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Fixes Five Zero-Days in October Patch Tuesday πŸ“”

Octobers Patch Tuesday saw Microsoft patch over 100 CVEs including five zeroday vulnerabilities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How to Safeguard Enterprises from Exploitation of AI Applications 🦿

Artificial intelligence may be about to transform the world. But there are security risks that need to be understood and several areas that can be exploited. Find out what these are and how to protect the enterprise in this TechRepublic Premium feature by Drew Robb. Featured text from the download LLM SECURITY WEAKNESSES Research by ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Australia Introduces First Standalone Cybersecurity Law πŸ“”

The Australian governments Cyber Security Bill 2024 will mandate cybersecurity standards for smart devices and introduce ransomware reporting requirements.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New EU Body to Centralize Complaints Against Facebook, TikTok, YouTube πŸ“”

The Appeals Centre Europe is supported by Metas Oversight Board Trust and certified by Ireland's media regulator.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ivanti: Three CSA Zero-Days Are Being Exploited in Attacks πŸ“”

Ivantis Cloud Services Appliance is being targeted by threat actors exploiting three zeroday bugs.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Security Updates for Adobe FrameMaker: Addressing Critical Vulnerabilities πŸ¦…

Overview Adobe has released new updates across several of its products, including Adobe FrameMaker, Adobe Substance 3D Printer, Adobe Commerce and Magento Open Source, Adobe Dimension, Adobe Animate, Adobe Lightroom, Adobe InCopy, Adobe InDesign, and Adobe Substance 3D Stager. The primary reason for these updates is the swarm of vulnerabilities across Adobe products, as covered by the Cybersecurity and Infrastructure Security Agency CISA, as these updates address critical vulnerabilities that could allow malicious actors to execute arbitrary codes on affected systems. Although Adobe has stated that it is not aware of any exploits in the wild targeting these vulnerabilities, the potential risks necessitate immediate action from users to secure their installations. The vulnerabili...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Amazon Aurora deep dive πŸ“’

Deploy servers with a secure approach.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Fortify your future: How HPE ProLiant Servers deliver top-tier cyber security, management, and performance πŸ“’

Deploy servers with a secure approach.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Three secrets to success for the MSSP πŸ“’

MSSPs can capitalize on growing demand to outsource security workloads amid ongoing economic hurdles and skills shortages here's how.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ AI-Augmented Email Analysis Spots Latest Scams, Bad Content πŸ•΅οΈβ€β™‚οΈ

Multimodal AI systems can help enterprise defenders weed out fraudulent emails, even if the system has not seen that type of message before.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Building Cyber Resilience in SMBs ​With ​Limited Resources πŸ•΅οΈβ€β™‚οΈ

With careful planning, ongoing evaluation, and a commitment to treat cybersecurity as a core business function, SMBs can transform their vulnerabilities into strengths.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft: Creative Abuse of Cloud Files Bolsters BEC Attacks πŸ•΅οΈβ€β™‚οΈ

Since April, attackers have increased their use of Dropbox, OneDrive, and SharePoint to steal the credentials of business users and conduct further malicious activity.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity