πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Building Cyber Resilience in SMBs ​With ​Limited Resources πŸ•΅οΈβ€β™‚οΈ

With careful planning, ongoing evaluation, and a commitment to treat cybersecurity as a core business function, SMBs can transform their vulnerabilities into strengths.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft: Creative Abuse of Cloud Files Bolsters BEC Attacks πŸ•΅οΈβ€β™‚οΈ

Since April, attackers have increased their use of Dropbox, OneDrive, and SharePoint to steal the credentials of business users and conduct further malicious activity.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Despite Prevalence of Online Threats, Users Aren't Changing Behavior πŸ•΅οΈβ€β™‚οΈ

Consumers are victims of online scams and data theft, yet they are lagging on adopting security tools to protect themselves.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 20% of Generative AI β€˜Jailbreak’ Attacks Succeed, With 90% Exposing Sensitive Data 🦿

On average, it takes adversaries just 42 seconds and five interactions to execute a GenAI jailbreak, according to Pillar Security.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Falco 0.39.1 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Cybersecurity Awareness Month: Horror stories 🧠

When it comes to cybersecurity, the question is when, not if, an organization will suffer a cyber incident. Even the most sophisticated security tools cant withstand the biggest threat human behavior. October is Cybersecurity Awareness Month, the time of year when we celebrate all things scary. So it seemed appropriate to ask cybersecurity professionals to The post Cybersecurity Awareness Month Horror stories appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries πŸ–‹οΈ

Details have emerged about multiple security vulnerabilities in two implementations of the Manufacturing Message Specification MMS protocol that, if successfully exploited, could have severe impacts in industrial environments. "The vulnerabilities could allow an attacker to crash an industrial device or in some cases, enable remote code execution," Claroty researchers Mashav Sapir and Vera.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware πŸ–‹οΈ

Threat actors with ties to North Korea have been observed targeting job seekers in the tech industry to deliver updated versions of known malware families tracked as BeaverTail and InvisibleFerret. The activity cluster, tracked as CLSTA0240, is part of a campaign dubbed Contagious Interview that Palo Alto Networks Unit 42 first disclosed in November 2023. "The threat actor behind CLSTA0240.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Social Media Accounts: The Weak Link in Organizational SaaS Security πŸ–‹οΈ

Social media accounts help shape a brands identity and reputation. These public forums engage directly with customers as they are a hub to connect, share content and answer questions. However, despite the high profile role these accounts have, many organizations overlook social media account security. Many lack the safeguards to prevent unauthorized access a situation no organization wants as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Apple’s iPhone Mirroring Flaw Exposes Employee Privacy Risks πŸ“”

The privacy flaw in Apples iPhone mirroring feature enables personal apps on an iPhone to be listed in a companys software inventory when the feature is used on work computers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New BeaverTail Malware Targets Job Seekers via Fake Recruiters πŸ“”

New BeaverTail malware targets tech job seekers via fake recruiters on LinkedIn and X.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Generation of Malicious QR Codes Uncovered by Researchers πŸ“”

Barracuda researchers have identified a new wave of QR code phishing attacks that evade traditional security measures and pose a significant threat to email security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” UK Launches New Competition to Spur Cybersecurity Careers πŸ“”

The UK governments Cyber Team Competition offer applicants the chance to receive advanced training, mentorship and networking opportunities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… OEMs Are Urged to Address Vulnerabilities in Device Communication πŸ¦…

Overview Qualcomm has shared its October 2024 Security Bulletin, highlighting multiple vulnerabilities. Google's Threat Analysis Group has also denoted the exploitation of a critical vulnerability, CVE202443047, in targeted attacks. The vulnerability revolves around the FASTRPC driver, which plays an important role in device communication processes. Exploitation of this vulnerability can lead to severe security breaches, potentially allowing unauthorized access to sensitive data. Considering this, original equipment manufacturers OEMs have received patches designed to rectify this flaw, and they are strongly encouraged to implement these updates without delay. Users concerned about the implications of this vulnerability should contact their device manufacturers for specific patc...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Lamborghini Carjackers Lured by $243M Cyberheist β™ŸοΈ

The parents of a 19yearold Connecticut honors student accused of taking part in a 243 million cryptocurrency heist in August were carjacked a week later, while out househunting in a brand new Lamborghini. Prosecutors say the couple was beaten and briefly kidnapped by six young men who traveled from Florida as part of a botched plan to hold the parents for ransom.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale πŸ–‹οΈ

Google on Wednesday announced a new partnership with the Global AntiScam Alliance GASA and DNS Research Federation DNS RF to combat online scams. The initiative, which has been codenamed the Global Signal Exchange GSE, is designed to create realtime insights into scams, fraud, and other forms of cybercrime pooling together threat signals from different data sources in order to create.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hackers Hide Remcos RAT in GitHub Repository Comments πŸ•΅οΈβ€β™‚οΈ

The tack highlights bad actors' interest in trusted development and collaboration platforms and their users.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Australia Intros Its First National Cyber Legislation πŸ•΅οΈβ€β™‚οΈ

The bill is broken up into several pieces, including ransomware reporting and securing smart devices, among other objectives.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Mamba 2FA Cybercrime Kit Targets Microsoft 365 Users πŸ•΅οΈβ€β™‚οΈ

A stealthy new underground offering uses sophisticated adversaryinthemiddle AitM techniques to convincingly serve up "Microsoft" login pages of various kinds, with dynamic enterprise branding.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 3 More Ivanti Cloud Vulns Exploited in the Wild πŸ•΅οΈβ€β™‚οΈ

The security bugs were found susceptible to exploitation in connection to the previously disclosed, critical CVE20248963 vulnerability in the security vendor's Cloud Services Appliance CSA.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cloud, AI Talent Gaps Plague Cybersecurity Teams πŸ•΅οΈβ€β™‚οΈ

Cyber pros are scrambling to stay uptodate as the businesses they work for quickly roll out AI tools and keep expanding their cloud initiatives.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity