🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🖋️ TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns 🖋️

New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a device's unlock pattern or PIN. "This new addition enables the threat actor to operate on the device even while it is locked," Zimperium security researcher Aazim Yaswant said in an analysis published last week. First spotted in the wild in 2019, TrickMo is so named for.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ North Korea Hackers Get Cash Fast in Linux Cyber Heists 🕵️‍♂️

The thieves modify transaction messages to initiate unauthorized withdrawals, even when there are insufficient funds.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ FHE Consortium Pushes for Quantum-Resilient Cryptography Standards 🕵️‍♂️

The FHE Technical Consortium for Hardware FHETCH brings together developers, hardware manufacturers and cloud providers to collaborate on technical standards necessary to develop commercial fully homomorphic encryption solutions and lower adoption barriers.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
👍1
🖋️ GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access 🖋️

GitHub has released security updates for Enterprise Server GHES to address multiple issues, including a critical bug that could allow unauthorized access to an instance. The vulnerability, tracked as CVE20249487, carries a CVS score of 9.5 out of a maximum of 10.0 "An attacker could bypass SAML single signon SSO authentication with the optional encrypted assertions feature, allowing.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability 🖋️

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk WHD software to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. Tracked as CVE202428987 CVSS score 9.1, the vulnerability relates to a case of hardcoded credentials that could be abused to gain.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📢 State-sponsored cyber crime is officially out of control 📢

North Korea is the most prolific attacker, but Russia and China account for the most disruptive and tightlytargeted campaigns.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🦿 Price Drop: This Complete Ethical Hacking Bundle is Now $40 🦿

Get a comprehensive, potentially lucrative ethical hacking education with 18 courses on today's top tools and tech. This bundle is just 39.97 for a limited time.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
🖋️ From Misuse to Abuse: AI Risks and Attacks 🖋️

AI from the attackers perspective See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and even other AI applications Cybercriminals and AI The Reality vs. Hype AI will not replace humans in the near future. But humans who know how to use AI are going to replace those humans who don't know how to use AI, says Etay Maor, Chief Security.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware 🖋️

The North Korean threat actor known as ScarCruft has been linked to the zeroday exploitation of a nowpatched security flaw in Windows to infect devices with malware known as RokRAT. The vulnerability in question is CVE202438178 CVSS score 7.5, a memory corruption bug in the Scripting Engine that could result in remote code execution when using the Edge browser in Internet Explorer Mode.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ 5 Techniques for Collecting Cyber Threat Intelligence 🖋️

To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly expanding your knowledge about new and ongoing threats. There are many techniques analysts can use to collect crucial cyber threat intelligence. Lets consider five that can greatly improve your threat investigations. Pivoting on 2 IP addresses to pinpoint malware.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack 🖋️

A new spearphishing campaign targeting Brazil has been found delivering a banking malware called Astaroth aka Guildma by making use of obfuscated JavaScript to slip past security guardrails. "The spearphishing campaign's impact has targeted various industries, with manufacturing companies, retail firms, and government agencies being the most affected," Trend Micro said in a new analysis. ".

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 Cyber Threats Escalating Beyond Ability to Defend, New NCSC Head Warns 📔

New NCSC CEO Dr Richard Horne warned in a speech that there is a widening gap between escalating threats and societys ability to defend against them.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 FIDO Alliance Proposes New Passkey Exchange Standard 📔

The new set of specifications could enable users to securely move passkeys and all other credentials across providers.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Experts Play Down Significance of Chinese Quantum “Hack” 📔

DigiCert says imminent crypto threat from quantum computing has been overhyped.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 UK Government Launches AI Safety Scheme to Tackle Deepfakes 📔

New government grants for AI safety research are designed to fund work into deepfakes and other cyber risks.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🦅 CISA Issues Urgent Advisory on Vulnerabilities Affecting Multiple Products 🦅

Overview The Cybersecurity and Infrastructure Security Agency CISA has released a critical advisory report highlighting vulnerabilities recently added to the Known Exploited Vulnerability KEV catalog. These vulnerabilities pose risks to organizations and require immediate attention. CISA categorizes vulnerabilities based on the Common Vulnerabilities and Exposures CVE naming standards and the Common Vulnerability Scoring System CVSS. This system classifies vulnerabilities into high, medium, and low categories. High vulnerabilities are assigned scores ranging from 7.0 to 10.0 medium vulnerabilities receive scores between 4.0 and 6.9, and low vulnerabilities score between 0.0 and 3.9. The advisory outlines specific vulnerabilities and the products they affect, including SolarWin...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
👍1
🧠 Navigating the ethics of AI in cybersecurity 🧠

Even if were not always consciously aware of it, artificial intelligence is now all around us. Were already used to personalized recommendation systems in ecommerce, customer service chatbots powered by conversational AI and a whole lot more. In the realm of information security, weve already been relying on AIpowered spam filters for years to protect The post Navigating the ethics of AI in cybersecurity appeared first on Security Intelligence.

📖 Read more.

🔗 Via "Security Intelligence"

----------
👁️ Seen on @cibsecurity
📢 New Loader Masquerades as Antivirus to Deliver SSLoad 📢

A new malware loader, PhantomLoader, disguises itself as an antivirus software module to deliver the evasive SSLoad malware, bypassing traditional security measures.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📢 Cisco confirms investigation amid data breach claims 📢

The networking giant says its probe is ongoing amid claims a threat actors accessed company data.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ What Cybersecurity Leaders Can Learn From the Game of Golf 🕵️‍♂️

As in golf, security requires collaboration across the entire organization, from individual contributors in each department to the executive level and the board.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Sidewinder Casts Wide Geographic Net in Latest Attack Spree 🕵️‍♂️

The longactive, Indiasponsored cyberthreat group targeted multiple entities across Asia, Africa, the Middle East, and even Europe in a recent attack wave that demonstrated the use of a previously unknown postexploit tool called StealerBot.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity