🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🦿 How to Use Call Detail Records to Detect Fraud 🦿

Learn how data from call detail records can help you find fraud calls made by your phone system and prevent them from happening again.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
🛠 GNUnet P2P Framework 0.22.1 🛠

GNUnet is a peertopeer framework with focus on providing security. All peertopeer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP IPv4 and IPv6, TCP IPv4 and IPv6, HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

📖 Read more.

🔗 Via "Packet Storm - Tools"

----------
👁️ Seen on @cibsecurity
🖋️ Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity 🖋️

Threat actors are attempting to abuse the opensource EDRSilencer tool as part of efforts to tamper endpoint detection and response EDR solutions and hide malicious activity. Trend Micro said it detected "threat actors attempting to integrate EDRSilencer in their attacks, repurposing it as a means of evading detection." EDRSilencer, inspired by the NightHawk FireBlock tool from MDSec, is.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms 🖋️

The FIDO Alliance said it's working to make passkeys and other credentials more easier to export across different providers and improve credential provider interoperability, as more than 12 billion online accounts become accessible with the passwordless signin method. To that end, the alliance said it has published a draft for a new set of specifications for secure credential exchange,.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 CISA Urges Improvements in US Software Supply Chain Transparency 📔

CISA released the third edition of SBOM guidelines to enhance software component transparency.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Ethical Hackers Embrace AI Tools Amid Rising Cyber Threats 📔

A new Bugcrowd study shows 71 of ethical hackers now see AI boosting hacking value, up from 21 in 2023.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Coffee Lovers Warned of New Starbucks Phishing Scam 📔

Phishing emails claiming to be from Starbucks are offering recipients a "free Coffee Lovers Box" in an attempt to steal personal or install malware on devices.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🦅 Critical Vulnerability in Veeam Products Exploited by Ransomware Gangs 🦅

Key Takeaways A critical vulnerability, CVE202440711, was discovered in Veeam Backup Replication, allowing unauthenticated remote code execution. CVE202440711 has a CVSS score of 9.8, indicating an urgent need for remediation due to its severity.  Threat actors are actively exploiting this vulnerability to deploy Akira and Fog ransomware. Veeam issued security updates to address these vulnerabilities in early September 2024. Multiple Veeam products were also affected by different vulnerabilities, including Veeam Backup Replication, Veeam ONE, and Veeam Agent for Linux, among others. Organizations are urged to implement regular update protocols, enhance monitoring, and develop incident response plans to mitigate risks. Overview Threat actors have exploited a re...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Cyber Gangs Aren't Afraid of Prosecution 🕵️‍♂️

Challenges with cybercrime prosecution are making it easier for attackers to act with impunity. Law enforcement needs to catch up.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🦿 Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024 🦿

A new report reveals a 2024 surge in mobile, IoT, and OT cyberattacks, highlighting key trends and the need for zerotrust security.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
🦿 7 Security and Compliance Tips From ISC2 Security Congress 🦿

An IT and security compliance analyst distilled seven ways to forge effective synergies between IT and broader business goals.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Hybrid Work Exposes New Vulnerabilities in Print Security 🕵️‍♂️

The shift to a distributed work model has exposed organizations to new threats, and a low but continuing stream of printerrelated vulnerabilities isn't helping.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Bad Actors Manipulate Red-Team Tools to Evade Detection 🕵️‍♂️

By using EDRSilencer, threat actors are able to prevent security alerts and reports getting generated.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Chinese Researchers Tap Quantum to Break Encryption 🕵️‍♂️

But the time when quantum computers pose a tangible threat to modern encryption is likely still several years away.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Iran's APT34 Abuses MS Exchange to Spy on Gulf Gov'ts 🕵️‍♂️

A MOISaligned threat group has been using Microsoft Exchange servers to exfiltrate sensitive data from Gulfstate government agencies.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🖋️ Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk 🖋️

A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be abused to gain root access under certain circumstances. The vulnerability, tracked as CVE20249486 CVSS score 9.8, has been addressed in version 0.1.38. The project maintainers acknowledged Nicolai Rybnikar for discovering and reporting the vulnerability. "A security issue.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 NIS2 Confusion: Concerns Over Readiness as Deadline Reached 📔

NIS2 will be enforced as of October 17, yet many organizations and even EU member states appear completely unprepared for implementation.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 CISA Seeks Feedback on Upcoming Product Security Flaws Guidance 📔

CISA is asking for feedback on future guidance outlining bad security practices in product development as part of its Secure by Design initiative.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📢 96% of SMBs are missing critical cybersecurity skills – here's why 📢

The skills shortage hits SMBs worse as they often suffer from a lack of budget and resources.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🖋️ U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks 🖋️

Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denialofservice DDoS botnet for hire that conducted a record 35,000 DDoS attacks in a single year, including those that targeted Microsoft's services in June 2023. The attacks, which were facilitated by Anonymous Sudan's "powerful DDoS tool," singled out critical infrastructure, corporate networks,.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 RansomHub Overtakes LockBit as Most Prolific Ransomware Group 📔

Symantec data reveals RansomHub claimed more attacks than any other group in Q3 2024.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity