πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Telekopye Scammers Target Booking.com and Airbnb Users πŸ“”

Online scammers are targeting Booking.com and Airbnb users with Telekopye, a Telegrambased toolkit.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Urges Encryption of Cookies in F5 BIG-IP Systems πŸ“”

CISA urged organizations to tackle security risks from unencrypted cookies in F5 BIGIP LTM systems.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Southeast Asian Cybercrime Profits Fuel Shadow Economy πŸ•΅οΈβ€β™‚οΈ

With cybercriminal gangs raking in at least 18 billion regionally and much more globally law enforcement and policymakers are struggling to keep up as the syndicates innovate and entrench themselves in national economies.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Serious Adversaries Circle Ivanti CSA Zero-Day Flaws πŸ•΅οΈβ€β™‚οΈ

Suspected nationstate actors are spotted stringing together three different zerodays in the Ivanti Cloud Services Application to gain persistent access to a targeted system.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites πŸ–‹οΈ

The maintainers of the Jetpack WordPress plugin have released a security update to remediate a critical vulnerability that could allow loggedin users to access forms submitted by others on a site. Jetpack, owned by WordPress maker Automattic, is an allinone plugin that offers a comprehensive suite of tools to improve site safety, performance, and traffic growth. It's used on 27 million.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates πŸ–‹οΈ

Cybersecurity researchers have disclosed a new malware campaign that delivers Hijack Loader artifacts that are signed with legitimate codesigning certificates. French cybersecurity company HarfangLab, which detected the activity at the start of the month, said the attack chains aim to deploy an information stealer known as Lumma. Hijack Loader, also known as DOILoader, IDAT Loader, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Microsoft logs 600 million identity attacks per day as threat actors collaborate more πŸ“’

A shift to passwordless authentication and greater reliance on AI could help stem the flow of attacks as threat actors arm themselves with better techniques and tools.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ LLMs Are a New Type of Insider Adversary πŸ•΅οΈβ€β™‚οΈ

The inherent intelligence of large language models gives them unprecedented capabilities like no other enterprise tool before.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ WP Engine Accuses WordPress of 'Forcibly' Taking Over Its Plug-in πŸ•΅οΈβ€β™‚οΈ

WordPress moves could have security implications for sites using Advanced Custom Fields plugin.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISOs' Privacy Responsibilities Keep Growing πŸ•΅οΈβ€β™‚οΈ

A heated regulatory landscape, uncertainty over AI use, and how it all ties back to cybersecurity means CISOs have to add privacy to their portfolios.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Even Orgs With SSO Are Vulnerable to Identity-Based Attacks πŸ•΅οΈβ€β™‚οΈ

Use SSO, don't use SSO. Have MFA, don't have MFA. An analysis of a snapshot of organizations using Push Security's platform finds that 99 of accounts susceptible to phishing attacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 SentinelOne CISO Identifies β€˜Most Pressing Concern’ for Cyber Professionals 🦿

SentinelOnes Alex Stamos sees a future where defenders have the advantage when it comes to generative AI. At least until it can write exploit code.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 99% of UK Businesses Faced Cyber Attacks in the Last Year 🦿

Nearly half of respondents blamed remote work for these incidents.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Are Password Managers Safe to Use? (Benefits, Risks & Best Practices) 🦿

Are password managers safe to use? Find out if they are really secure and discover the benefits and risks of using password managers.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short πŸ–‹οΈ

In recent years, the number and sophistication of zeroday vulnerabilities have surged, posing a critical threat to organizations of all sizes. A zeroday vulnerability is a security flaw in software that is unknown to the vendor and remains unpatched at the time of discovery. Attackers exploit these flaws before any defensive measures can be implemented, making zerodays a potent weapon for.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns πŸ–‹οΈ

China's National Computer Virus Emergency Response Center CVERC has doubled down on claims that the threat actor known as the Volt Typhoon is a fabrication of the U.S. and its allies. The agency, in collaboration with the National Engineering Laboratory for Computer Virus Prevention Technology, went on to accuse the U.S. federal government, intelligence agencies, and Five Eyes countries of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK: NCSC Offers Education Organizations Free Cyber Services πŸ“”

The service, developed in collaboration with Cloudflare and Accenture, is available for UK schools and most education service providers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Most Organizations Unprepared for Post-Quantum Threat πŸ“”

Most organizations are not prepared for the postquantum threat, despite the recent publication of NIST's first three finalized postquantum encryption standards.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft: Nation-States Team Up with Cybercriminals for Attacks πŸ“”

Microsoft has observed nation states ramping up cooperation with cybercriminals to conduct operations in the past year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cerberus Android Banking Trojan Deployed in New Multi-Stage Malicious Campaign πŸ“”

The sophisticate campaign, ErrorFather, employs keylogging, virtual networks and a domain generation algorithm to target Android users.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Insurer Aims to β€œClawback” BEC Losses After Β£1.4m Success πŸ“”

Coalitions new service aims to mitigate the impact of growing UK corporate fraud losses.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity