πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” US Border Agency Under Fire for App's Handling of Personal Data πŸ“”

Access Now announced that the US Customs and Border Protection agency released records on its app following the NGOs lawsuit.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Sonatype Reports 156% Increase in OSS Malicious Packages πŸ“”

A new Sonatype report reveals a 156 surge in open source malware, with over 704,102 malicious packages identified since 2019, as OSS adoption continues to skyrocket.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russia's SVR Targets Zimbra, TeamCity Servers for Cyber Espionage πŸ“”

Russianbacked APT29 has been spying on US and European organizations since at least 2021, a USUK joint advisory said.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ SOC Teams: Threat Detection Tools Are Stifling Us πŸ•΅οΈβ€β™‚οΈ

Threat detection tools yield too many false positives, security pros say, leading to burnout and resentment.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ AI Hype Drives Demand For ML SecOps Skills πŸ•΅οΈβ€β™‚οΈ

Companies are putting "AI" in just about all of their products, which opens up new security holes. LLM SecOps and ML SecOps are becoming musthave skills.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Data Breach and DDoS Attacks Take Archive.org and Open Library Offline πŸ¦…

Key Takeaways The massive 57petabyte Internet Archive has been hit by a data breach, website defacement, exfiltration and DDoS attacks in recent days. The breach and DDoS attacks so far appear unconnected. A copy of a user authentication database containing the email addresses and credentials of 31 million users has been provided to Have I Been Pwned. The attackers have faced criticism for attacking a nonprofit whose goal is to preserve knowledge. Questions have been raised about Archives handling of JavaScript, which appears central to the breach. As of now, Archive.org and Open Library are offline, and recovery efforts are expected to take days, not weeks. Overview The Internet Archive has taken its Archive.org and OpenLibrary.org sites offline in response to a dat...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation πŸ–‹οΈ

The U.S. Department of Justice DoJ has announced arrests and charges against several individuals and entities in connection with allegedly manipulating digital asset markets as part of a widespread fraud operation. The law enforcement action codenamed Operation Token Mirrors is the result of the U.S. Federal Bureau of Investigation FBI taking the "unprecedented step" of creating its own.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸš€ GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe πŸš€

ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise airgapped systems belonging to governmental and diplomatic entities.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf πŸ–‹οΈ

The Iranian threat actor known as OilRig has been observed exploiting a nowpatched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E. and the broader Gulf region. "The group utilizes sophisticated tactics that include deploying a backdoor that leverages Microsoft Exchange servers for credentials theft, and exploiting vulnerabilities.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Cyble Sensors Detect Attacks on SAML, D-Link, Python Framework πŸ¦…

Key Takeaways Cyble honeypot sensors detected several new cyberattacks in recent days, targeting vulnerabilities in the Ruby SAML library, DLink NAS devices, the aiohttp clientserver framework, a WordPress plugin, and more. Cybles Vulnerability Intelligence unit also discovered new phishing campaigns and bruteforce attacks. Clients are urged to address the vulnerabilities identified in the report and apply best practices. Overview The Cyble Vulnerability Intelligence unit identified several new cyberattacks during the week of Oct. 28. Among the targets are the Ruby SAML library, several DLink NAS devices, the aiohttp clientserver framework used for asyncio and Python, and a popular WordPress plugin used by restaurants and other businesses. Cyble sensors also uncove...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Skills Shortages Now a Top-Two Security Risk for SMBs πŸ“”

Sophos claims that a lack of cybersecurity talent is considered a major risk by SMBs.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware πŸ–‹οΈ

Threat actors are actively attempting to exploit a nowpatched security flaw in Veeam Backup Replication to deploy Akira and Fog ransomware. Cybersecurity vendor Sophos said it has been tracking a series of attacks in the past month leveraging compromised VPN credentials and CVE202440711 to create a local account and deploy the ransomware. CVE202440711, rated 9.8 out of 10.0 on the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration πŸ–‹οΈ

A suspected nationstate adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance CSA a zeroday to perform a series of malicious actions. That's according to findings from Fortinet FortiGuard Labs, which said the vulnerabilities were abused to gain unauthenticated access to the CSA, enumerate users configured in the appliance, and attempt to access the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 5 Steps to Boost Detection and Response in a Multi-Layered Cloud πŸ–‹οΈ

The link between detection and response DR practices and cloud security has historically been weak. As global organizations increasingly adopt cloud environments, security strategies have largely focused on "shiftleft" practicessecuring code, ensuring proper cloud posture, and fixing misconfigurations. However, this approach has led to an overreliance on a multitude of DR tools spanning.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems πŸ–‹οΈ

Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and Rust Crates to stage software supply chain attacks. "Attackers can leverage these entry points to execute malicious code when specific commands are run, posing a widespread risk in the opensource landscape," Checkmarx researchers Yehuda.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7 - Oct 13) πŸ–‹οΈ

Hey there, it's your weekly dose of "what the heck is going on in cybersecurity land" and trust me, you NEED to be in the loop this time. We've got everything from zeroday exploits and AI gone rogue to the FBI playing crypto kingpin it's full of stuff they don't want you to know. So let's jump in before we get FOMO. Threat of the Week GoldenJackal Hacks AirGapped Systems Meet.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” US DoD Tightens Cybersecurity Standards for Defense Contractors πŸ“”

The US DoD has finalized the Cybersecurity Maturity Model Certification CMMC Program, which defense contractors must pass to bid for government contracts.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” PokΓ©mon Developer Game Freak Suffers Data Breach πŸ“”

Personal data of over 2600 employees has been exposed and insider information about the Switch 2 and future Pokmon games leaked.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Casio Confirms Ransomware Outage and Data Breach πŸ“”

Japanese electronics firm Casio has reported a ransomware attack and data breach.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Hidden in Plain Sight: ErrorFather’s Deadly Deployment of Cerberus πŸ¦…

Key Takeaways Cyble Research and Intelligence Labs CRIL identified a campaign called ErrorFather that utilized an undetected Cerberus Android Banking Trojan payload. ErrorFather employs a sophisticated infection chain involving multiple stages sessionbased droppers, native libraries, and encrypted payloads, complicating detection and removal efforts. The campaign ramped up in activity in September and October 2024, with more samples and ongoing campaigns suggesting active targeting and scaling by the Threat Actors TAs behind the ErrorFather campaign. The final payload employs keylogging, overlay attacks, VNC, and Domain Generation Algorithm DGA to perform malicious activities. ErrorFather's incorporation of a Domain Generation Algorithm DGA ensures resilience by enabling ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Phishing tactics: The top attacks trends in 2024 πŸ“’

Phishing is evolving beyond email as advances such as AI drive targeted attacks leaders must keep up with the latest tactics to mount an effective defense.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity