πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack πŸ–‹οΈ

An advanced persistent threat APT actor with suspected ties to India has sprung forth with a flurry of attacks against highprofile entities and strategic infrastructures in the Middle East and Africa. The activity has been attributed to a group tracked as SideWinder, which is also known as APTC17, Baby Elephant, Hardcore Nationalist, Leafperforator, Rattlesnake, Razor Tiger, and TAPT04. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cicada3301 Ransomware Targets Critical Sectors in US and UK πŸ“”

Cicada3301 ransomware has targeted critical sectors in USUK, leaking data from 30 firms in three months.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Charges Anonymous Sudan Members in DDoS Cybercrime Case πŸ“”

US authorities have charged two Sudanese linked to DDoS cybercrime group, Anonymous Sudan, which caused 10m in damages.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Iranian Hackers Target Critical Infrastructure with Brute Force Attacks πŸ“”

The ongoing campaign targets multiple critical infrastructure sectors, including healthcare, government, information technology, engineering, and energy.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” North Korea Escalates Fake IT Worker Schemes to Extort Employers πŸ“”

Secureworks said it had observed a case where a fake North Korean IT contractor exfiltrated proprietary data before issuing a ransom demand to their former employer.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… SolarWinds Releases Patches for High-Severity Vulnerabilities πŸ¦…

Overview SolarWinds has issued an important security update advisory outlining the latest vulnerability patches released for its products. This advisory provides insights into recently disclosed vulnerabilities affecting the SolarWinds range and emphasizes the need for organizations to take immediate action to protect their IT infrastructure. The advisory details various vulnerabilities and their associated risk scores, categorized by severity levels. High vulnerabilities, classified with a CVSS base score of 7.0 to 10.0, include three identified issues, specifically CVE202445714, CVE202445711, CVE202445710, and CVE202445715. These vulnerabilities carry a highrisk score and are marked with a Green TLP rating. In addition, there is one medium vulnerability, which falls within a...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… GitHub Releases Security Advisory on Critical Vulnerability in Self-Hosted Environments πŸ¦…

Overview GitHub has issued a security advisory regarding critical vulnerabilities that require immediate attention from users of the GitHub Enterprise Server GHES. This advisory highlights a specific vulnerability that could severely compromise organizations' security relying on this selfhosted version of GitHub, which is tailored for those needing to manage their infrastructure, security, and compliance. GitHub Enterprise Server is a platform that enables organizations to host their repositories while maintaining control over security protocols. However, vulnerabilities identified under the Common Vulnerabilities and Exposures CVE system and classified by the Common Vulnerability Scoring System CVSS indicate potential risks that must be addressed promptly. CVE20249487 is a ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Internet Archive Slowly Revives After DDoS Barrage πŸ•΅οΈβ€β™‚οΈ

Days after facing a major breach, the site is still struggling to get fully back on its feet.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hong Kong Crime Ring Swindles Victims Out of $46M πŸ•΅οΈβ€β™‚οΈ

The scammers used realtime deepfakes in online dating video calls to convince the victims of their legitimacy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Microsoft: Ransomware Attacks Growing More Dangerous, Complex 🦿

Attackers launched 600 million cybercriminal and nationstate threats on Microsoft customers daily, including ransomware attacks, in the last year, according to the tech giant.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024 πŸͺ–

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, QA style blogs will be published featuring some of our unique staff members who have interesting backgrounds, stories to tell, and projects in the world of cybersecurity. This years Cybersecurity Awareness Month theme is Secure our World. How does this theme resonate with you, as someone working in cybersecurity? Everyone has the power to protect information. Like safety where everyones responsibility is to.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser πŸ–‹οΈ

Microsoft has disclosed details about a nowpatched security flaw in Apple's Transparency, Consent, and Control TCC framework in macOS that has likely come under exploitation to get around a user's privacy preferences and access data. The shortcoming, codenamed HM Surf by the tech giant, is tracked as CVE202444133. It was addressed by Apple as part of macOS Sequoia 15 by removing the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Feeling safe with that complicated password? Think again, security experts say – complexity affects memorability and fosters unsafe practices πŸ“’

Password complexity affects user memorability and can inadvertently foster complacency and unsafe practices.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Top 18 Sophos Competitors & Alternatives in 2025 🌊

If youre familiar with Sophos, you know its a big name in the cybersecurity world, offering everything from endpoint to network and cloud security. But, like any product, its not always the perfect fit for everyone. Thankfully, some strong alternatives might suit your needs even better, depending on your specific security requirements. Let me walk The post Top 18 Sophos Competitors Alternatives in 2025 appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… IT Vulnerability Weekly Report: Cyble Urges Fixes for Fortinet, Palo Alto & More πŸ¦…

Overview Cyble Research and Intelligence Labs CRIL investigated 27 vulnerabilities during the week of October 915 and identified 11 as highpriority fixes for security teams. Cyble researchers also observed 14 vulnerability exploits discussed on dark web and cybercrime forums, raising the likelihood that those vulnerabilities will be exploited more frequently. Of the vulnerabilities highlighted by Cyble threat researchers, two are being actively exploited by statesponsored threat actors, and five could be chained together to hijack Palo Alto Networks firewalls. Among the vulnerabilities investigated by Cyble researchers this week, Cybles Odin vulnerability exposure search tool detected 427,000 vulnerable Fortinet devices exposed to the internet after CVE202423113, a 9.8severi...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Vietnamese Threat Actor’s Multi-Layered Strategy on Digital Marketing Professionals πŸ¦…

Key takeaways Cyble Research and Intelligence Labs CRIL uncovered a sophisticated multistage malware attack originating from an archive file that contains a malicious LNK file. The lure document observed in the campaign indicates that the Threat Actor TA is targeting job seekers and digital marketing professionals, especially those involved with Meta Ads. The malware employs several techniques to detect virtual machine environments, evading detection and analysis in sandboxed or emulated environments. The malware uses multiple antidebugging techniques to detect if it is being debugged, making analysis or reverse engineering more challenging. The malware employs defense evasion techniques, including disabling event tracing and altering inmemory functions, to evade detection ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ NIS2 is now in force around the EU – can business keep up with new compliance obligations? πŸ“’

The EUs flagship cyber resilience framework NIS2 is finally here, but research indicates businesses are not ready, with compliance officers facing a herculean task.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Fortify your future: How HPE ProLiant Servers deliver top-tier cyber security, management, and performance πŸ“’

Deploy servers with a secure approach.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Beware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign πŸ–‹οΈ

Threat actors are leveraging fake Google Meet web pages as part of an ongoing malware campaign dubbed ClickFix to deliver infostealers targeting Windows and macOS systems. "This tactic involves displaying fake error messages in web browsers to deceive users into copying and executing a given malicious PowerShell code, finally infecting their systems," French cybersecurity company Sekoia said in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Instagram Rolls Out New Sextortion Protection Measures πŸ“”

Instagram has announced new security features to protect users from sextortion scams, including hiding follower lists, preventing screenshots, and launching an awareness campaign.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Named Most Imitated Brand in Phishing Attacks πŸ“”

The Redmondbased firm was the most impersonated brand in the third quarter of 2024, while Alibaba entered the Top 10 for the first time.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity