πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β™ŸοΈ Sudanese Brothers Arrested in β€˜AnonSudan’ Takedown β™ŸοΈ

The U.S. government on Wednesday announced the arrest and charging of two Sudanese brothers accused of running Anonymous Sudan a.k.a. AnonSudan, a cybercrime business known for launching powerful distributed denialofservice DDoS attacks against a range of targets, including dozens of hospitals, news websites and cloud providers. One of the brothers is facing life in prison for allegedly seeking to kill people with his attacks.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 The cybersecurity skills gap contributed to a $1.76 million increase in average breach costs 🧠

Understaffing in cybersecurity the skills gap is driving up the cost of data breaches in recent years, according to a decade of reports by IBM. The 2024 IBM Data Breach Report found that more than half of breached organizations experienced severe security staffing shortages, a 26.2 increase from the previous year. They found The post The cybersecurity skills gap contributed to a 1.76 million increase in average breach costs appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant πŸ–‹οΈ

The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks aimed at Ukrainian government agencies and unknown Polish entities since at least late 2023. The intrusions are characterized by the use of a variant of the RomCom RAT dubbed SingleCamper aka SnipBot or RomCom 5.0, said Cisco Talos, which is monitoring the activity cluster under the moniker UAT5647. "This.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program πŸ–‹οΈ

Cybersecurity researchers have gleaned additional insights into a nascent ransomwareasaservice RaaS called Cicada3301 after successfully gaining access to the group's affiliate panel on the dark web. Singaporeheadquartered GroupIB said it contacted the threat actor behind the Cicada3301 persona on the RAMP cybercrime forum via the Tox messaging service after the latter put out an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 5 Ways to Reduce SaaS Security Risks πŸ–‹οΈ

As technology adoption has shifted to be employeeled, just in time, and from any location or device, IT and security teams have found themselves contending with an eversprawling SaaS attack surface, much of which is often unknown or unmanaged. This greatly increases the risk of identitybased threats, and according to a recent report from CrowdStrike, 80 of breaches today use compromised.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack πŸ–‹οΈ

An advanced persistent threat APT actor with suspected ties to India has sprung forth with a flurry of attacks against highprofile entities and strategic infrastructures in the Middle East and Africa. The activity has been attributed to a group tracked as SideWinder, which is also known as APTC17, Baby Elephant, Hardcore Nationalist, Leafperforator, Rattlesnake, Razor Tiger, and TAPT04. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cicada3301 Ransomware Targets Critical Sectors in US and UK πŸ“”

Cicada3301 ransomware has targeted critical sectors in USUK, leaking data from 30 firms in three months.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Charges Anonymous Sudan Members in DDoS Cybercrime Case πŸ“”

US authorities have charged two Sudanese linked to DDoS cybercrime group, Anonymous Sudan, which caused 10m in damages.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Iranian Hackers Target Critical Infrastructure with Brute Force Attacks πŸ“”

The ongoing campaign targets multiple critical infrastructure sectors, including healthcare, government, information technology, engineering, and energy.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” North Korea Escalates Fake IT Worker Schemes to Extort Employers πŸ“”

Secureworks said it had observed a case where a fake North Korean IT contractor exfiltrated proprietary data before issuing a ransom demand to their former employer.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… SolarWinds Releases Patches for High-Severity Vulnerabilities πŸ¦…

Overview SolarWinds has issued an important security update advisory outlining the latest vulnerability patches released for its products. This advisory provides insights into recently disclosed vulnerabilities affecting the SolarWinds range and emphasizes the need for organizations to take immediate action to protect their IT infrastructure. The advisory details various vulnerabilities and their associated risk scores, categorized by severity levels. High vulnerabilities, classified with a CVSS base score of 7.0 to 10.0, include three identified issues, specifically CVE202445714, CVE202445711, CVE202445710, and CVE202445715. These vulnerabilities carry a highrisk score and are marked with a Green TLP rating. In addition, there is one medium vulnerability, which falls within a...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… GitHub Releases Security Advisory on Critical Vulnerability in Self-Hosted Environments πŸ¦…

Overview GitHub has issued a security advisory regarding critical vulnerabilities that require immediate attention from users of the GitHub Enterprise Server GHES. This advisory highlights a specific vulnerability that could severely compromise organizations' security relying on this selfhosted version of GitHub, which is tailored for those needing to manage their infrastructure, security, and compliance. GitHub Enterprise Server is a platform that enables organizations to host their repositories while maintaining control over security protocols. However, vulnerabilities identified under the Common Vulnerabilities and Exposures CVE system and classified by the Common Vulnerability Scoring System CVSS indicate potential risks that must be addressed promptly. CVE20249487 is a ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Internet Archive Slowly Revives After DDoS Barrage πŸ•΅οΈβ€β™‚οΈ

Days after facing a major breach, the site is still struggling to get fully back on its feet.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hong Kong Crime Ring Swindles Victims Out of $46M πŸ•΅οΈβ€β™‚οΈ

The scammers used realtime deepfakes in online dating video calls to convince the victims of their legitimacy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Microsoft: Ransomware Attacks Growing More Dangerous, Complex 🦿

Attackers launched 600 million cybercriminal and nationstate threats on Microsoft customers daily, including ransomware attacks, in the last year, according to the tech giant.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024 πŸͺ–

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, QA style blogs will be published featuring some of our unique staff members who have interesting backgrounds, stories to tell, and projects in the world of cybersecurity. This years Cybersecurity Awareness Month theme is Secure our World. How does this theme resonate with you, as someone working in cybersecurity? Everyone has the power to protect information. Like safety where everyones responsibility is to.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser πŸ–‹οΈ

Microsoft has disclosed details about a nowpatched security flaw in Apple's Transparency, Consent, and Control TCC framework in macOS that has likely come under exploitation to get around a user's privacy preferences and access data. The shortcoming, codenamed HM Surf by the tech giant, is tracked as CVE202444133. It was addressed by Apple as part of macOS Sequoia 15 by removing the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Feeling safe with that complicated password? Think again, security experts say – complexity affects memorability and fosters unsafe practices πŸ“’

Password complexity affects user memorability and can inadvertently foster complacency and unsafe practices.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Top 18 Sophos Competitors & Alternatives in 2025 🌊

If youre familiar with Sophos, you know its a big name in the cybersecurity world, offering everything from endpoint to network and cloud security. But, like any product, its not always the perfect fit for everyone. Thankfully, some strong alternatives might suit your needs even better, depending on your specific security requirements. Let me walk The post Top 18 Sophos Competitors Alternatives in 2025 appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… IT Vulnerability Weekly Report: Cyble Urges Fixes for Fortinet, Palo Alto & More πŸ¦…

Overview Cyble Research and Intelligence Labs CRIL investigated 27 vulnerabilities during the week of October 915 and identified 11 as highpriority fixes for security teams. Cyble researchers also observed 14 vulnerability exploits discussed on dark web and cybercrime forums, raising the likelihood that those vulnerabilities will be exploited more frequently. Of the vulnerabilities highlighted by Cyble threat researchers, two are being actively exploited by statesponsored threat actors, and five could be chained together to hijack Palo Alto Networks firewalls. Among the vulnerabilities investigated by Cyble researchers this week, Cybles Odin vulnerability exposure search tool detected 427,000 vulnerable Fortinet devices exposed to the internet after CVE202423113, a 9.8severi...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Vietnamese Threat Actor’s Multi-Layered Strategy on Digital Marketing Professionals πŸ¦…

Key takeaways Cyble Research and Intelligence Labs CRIL uncovered a sophisticated multistage malware attack originating from an archive file that contains a malicious LNK file. The lure document observed in the campaign indicates that the Threat Actor TA is targeting job seekers and digital marketing professionals, especially those involved with Meta Ads. The malware employs several techniques to detect virtual machine environments, evading detection and analysis in sandboxed or emulated environments. The malware uses multiple antidebugging techniques to detect if it is being debugged, making analysis or reverse engineering more challenging. The malware employs defense evasion techniques, including disabling event tracing and altering inmemory functions, to evade detection ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity