πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Bitwarden vs 1Password (2024): Which One Should You Choose? 🦿

Bitwarden and 1Password are two of the top password managers. Find out which password manager is the best for you using this comprehensive comparison.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ AI-Powered Cybercrime Cartels on the Rise in Asia πŸ•΅οΈβ€β™‚οΈ

All across the AsiaPacific region, large and diverse marketplaces for AI cybercrime tools have developed, with deepfakes proving most popular.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Modern payment systems: An effective way to reduce your attack surface πŸ“’

Embracing modern payment methods can eliminate many of the vulnerabilities associated with the last 20 years of online payments.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms πŸ–‹οΈ

Cybersecurity researchers have shed light on a new digital skimmer campaign that leverages Unicode obfuscation techniques to conceal a skimmer dubbed Mongolian Skimmer. "At first glance, the thing that stood out was the script's obfuscation, which seemed a bit bizarre because of all the accented characters," Jscrambler researchers said in an analysis. "The heavy use of Unicode characters, many.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Wednesday added a critical security flaw impacting Fortinet products to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE202423113 CVSS score 9.8, relates to cases of remote code execution that affects FortiOS, FortiPAM, FortiProxy, and FortiWeb. "A.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Firefox Zero-Day Under Attack: Update Your Browser Immediately πŸ–‹οΈ

Mozilla has revealed that a critical security flaw impacting Firefox and Firefox Extended Support Release ESR has come under active exploitation in the wild. The vulnerability, tracked as CVE20249680, has been described as a useafterfree bug in the Animation timeline component. "An attacker was able to achieve code execution in the content process by exploiting a useafterfree in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Former RAC Employees Get Suspended Sentence for Data Theft πŸ“”

Two former RAC employees have been handed suspended prison sentences for trading in personal data.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 240 Million US Breach Victims Recorded in Q3 πŸ“”

Supply chain victim numbers surge as more than 240 million US residents are impacted by data breaches in Q3 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CISA Issues Urgent Advisory on Critical Vulnerabilities in Ivanti Products πŸ¦…

Overview The Cybersecurity and Infrastructure Security Agency CISA has issued a critical advisory report on vulnerabilities disclosed in multiple Ivanti products. These products include Ivanti Endpoint Manager Mobile EPMM, Ivanti Cloud Service Application CSA, Ivanti Velocity License Server, Ivanti Connect Secure, Policy Secure, and Ivanti Avalanche. The official advisory from Ivanti specifically addresses various vulnerabilities affecting the Ivanti Cloud Service Application CSA. It highlights that a limited number of customers using CSA versions 4.6 patches 518 and earlier have been exploited when certain vulnerabilitiesCVE20249379, CVE20249380, or CVE20249381are chained with CVE20248963. The recent advisory from Ivanti has indicated a range of vulnerabilities across their p...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Vulnerability Prioritization & the Magic 8 Ball πŸ•΅οΈβ€β™‚οΈ

Vulnerability prioritization has evolved over the years. Several frameworks exist to help organizations make the right decisions when it comes to deciding which patches to apply and when. But are these better than a Magic 8 Ball?.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft: BYOD, QR Codes Lead Rampant Education Attacks πŸ•΅οΈβ€β™‚οΈ

The average higher education institution is getting hit once a week now, and as one University of Oregon attack shows, the sector often lacks the resources to keep pace.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Patch Tuesday: Internet Explorer Vulnerabilities Still Pose a Problem 🦿

Patch Tuesday brings patches for hundreds of vulnerabilities. Plus, Apple makes sure Sequoia plays nice with thirdparty security tools.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Internet Archive Breached, 31 Million Records Exposed πŸ“”

The nonprofit digital library was also hit by at least two DDoS attacks in two days.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🀯1
πŸ“’ Cyber expert suggests American Water cyber incident was a ransomware attack πŸ“’

The attack left 14 million customers without access to a service portal, disrupting billing processes, though the firm said it does not believe its water facilities were impacted.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ 6 Simple Steps to Eliminate SOC Analyst Burnout πŸ–‹οΈ

The current SOC model relies on a scarce resource human analysts. These professionals are expensive, in high demand, and increasingly difficult to retain. Their work is not only highly technical and highrisk, but also soulcrushingly repetitive, dealing with a constant flood of alerts and incidents. As a result, SOC analysts often leave in search of better pay, the opportunity to move beyond.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Cyble Urges ICS Vulnerability Fixes for TEM, Mitsubishi, and Delta Electronics πŸ¦…

Key Takeaways Cyble researchers investigated vulnerabilities in five ICSOT products this week and identified Mitsubishi Electric, TEM, and Delta Electronics products as top priorities for security teams. TEM has been unresponsive to reports of vulnerabilities in Opera Plus FM Family Transmitters, version 35.45, so users are urged to take mitigation steps. Mitsubishi Electric has no plans to fix vulnerabilities in MELSEC iQF FX5OPC communication units and instead recommended mitigation steps. Overview Cyble researchers have identified vulnerabilities in three products used in critical infrastructure environments that merit highpriority attention from security teams. Cybles weekly industrial control systemoperational technology ICSOT vulnerability report for Oct. 17 ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Experts Warn of Critical Unpatched Vulnerability in Linear eMerge E3 Systems πŸ–‹οΈ

Cybersecurity security researchers are warning about an unpatched vulnerability in Nice Linear eMerge E3 access controller systems that could allow for the execution of arbitrary operating system OS commands. The flaw, assigned the CVE identifier CVE20249441, carries a CVSS score of 9.8 out of a maximum of 10.0, according to VulnCheck. "A vulnerability in the Nortek Linear eMerge E3 allows.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Walking the Tightrope Between Innovation & Risk πŸ•΅οΈβ€β™‚οΈ

When employees and leaders engage with CISOs early in innovation projects, security concerns are addressed proactively, building trust and ensuring innovation and security coexist.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Deloitte: Why Only a Quarter of Cybersecurity Professionals are Women 🦿

Despite a huge talent shortage in the cybersecurity industry, women still feel discouraged from joining it due to concerns over their knowledge, its inclusivity, and the pay.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Wireshark Analyzer 4.4.1 πŸ› 

Wireshark is a GTKbased network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercialquality analyzer for Unix and Win32 and to give Wireshark features that are missing from closedsource sniffers. This is the source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  I2P 2.7.0 πŸ› 

I2P is an anonymizing network, offering a simple layer that identitysensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity