πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ CISOs: Throwing Cash at Tools Isn't Helping Detect Breaches πŸ•΅οΈβ€β™‚οΈ

A survey shows threequarters of CISOs are drowning in threat detections put out by a sprawling stack of tools, yet still lack the basic visibility necessary to identify breaches.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Can You Fax a Check? Yes. Follow These Steps to Do it Safely 🦿

Discover how to legally, securely, and quickly fax a check whether you're using a traditional fax machine or an online faxing service.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ–‹οΈ Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks πŸ–‹οΈ

A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting Russian businesses and government agencies with ransomware with the twin goals of disrupting business operations and financial gain. "The group under review has a toolkit that includes utilities such as Mimikatz, XenAllPasswordPro, PingCastle, Localtonet, resocks, AnyDesk, PsExec, and others,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Acronym Overdose – Navigating the Complex Data Security Landscape πŸ–‹οΈ

In the modern enterprise, data security is often discussed using a complex lexicon of acronymsDLP, DDR, DSPM, and many others. While these acronyms represent critical frameworks, architectures, and tools for protecting sensitive information, they can also overwhelm those trying to piece together an effective security strategy. This article aims to demystify some of the most important acronyms.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ‘½ Microsoft Loses Critical Security Logs, Raising Concerns Over Cloud Security πŸ‘½

Microsoft has admitted to a significant lapse in its cloud security logging, leaving customers vulnerable to undetected intrusions for over two weeks. A bug in the companys internal monitoring system resulted in the loss of critical security logs between September 2nd and 19th. This incident affects several key Microsoft cloud.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
😱2
πŸš€ Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe πŸš€

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 20182019 to just five days last year.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Access to any Cisco Device? πŸ‘½

A threat actor called IntelBroker posted an advertisement on a dark web forum for the sale of information stolen from Cisco. The actor claimed that the data from this breach contains sensitive information such as GitHub projects, source code, credentials, certificates, access to cloud storage buckets, and more. On October.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ‘½ Pakistani PII Data Leakage πŸ‘½

A threat actor advertised 3.4 million pieces of PII data of Pakistani government website Benazir Income Support Program Government of Pakistan bisp.gov.pk. The advertisement shared in a Telegram group. It was claimed that the data included information such as full address, fathers name, mobile number, gender, as can be seen below.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials πŸ–‹οΈ

Unknown threat actors have been observed attempting to exploit a nowpatched security flaw in the opensource Roundcube webmail software as part of a phishing attack designed to steal user credentials. Russian cybersecurity company Positive Technologies said it discovered last month that an email was sent to an unspecified governmental organization located in one of the Commonwealth of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data πŸ–‹οΈ

North Korean information technology IT workers who obtain employment under false identities in Western companies are not only stealing intellectual property, but are also stepping up by demanding ransoms in order to not leak it, marking a new twist to their financially motivated attacks. "In some instances, fraudulent workers demanded ransom payments from their former employers after gaining.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ DPRK Uses Microsoft Zero-Day in No-Click Toast Attacks πŸ•΅οΈβ€β™‚οΈ

The "CodeonToast" supply chain cyberattacks by APT37 delivered datastealing malware to users in South Korea who had enabled Toast popup ads.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers πŸ–‹οΈ

Cybersecurity researchers have discovered severe cryptographic issues in various endtoend encrypted E2EE cloud storage platforms that could be exploited to leak sensitive data. "The vulnerabilities range in severity in many cases a malicious server can inject files, tamper with file data, and even gain direct access to plaintext," ETH Zurich researchers Jonas Hofmann and Kien Tuong Truong.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber criminal underground β€œthriving” as weekly attacks surge by 75% in Q3 2024 πŸ“’

Cyber attacks reached another alltime high this quarter as digital crime continues to be a highly profitable industry for threat actors.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Enterprises are struggling to fill senior cybersecurity roles β€” and it's causing staff burnout to skyrocket πŸ“’

Many senior roles take months to fill, creating cumbersome workloads for midlevel staff and increased burnout.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Why choosing the right business cybersecurity and networking partner is key to your future safety and success πŸ“’

Cloud architectures such as SASE can greatly improve organizational security but leaders should lean on trusted partners to deliver them.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why I'm Excited About the Future of Application Security πŸ•΅οΈβ€β™‚οΈ

The future of application security is no longer about reacting to the inevitable it's about anticipating and preventing attacks before they can cause damage.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Australia’s New Scam Prevention Laws: What You Need to Know 🦿

Australia's Scam Prevention Framework aims to protect consumers by holding tech, banking, and telecom sectors accountable, with fines up to 50 million.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 6 Best Antivirus Software Providers for Mac in 2024 🦿

Macs may need additional antivirus protection in a business environment or highrisk use case. Bitdefender is the best overall Mac antivirus provider when it comes to protection, usability, and performance.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Helper 0.1 πŸ› 

Helper is an enumerator written in PHP that helps identify directories on webservers that could be targets for things like cross site scripting, local file inclusion, remote shell upload, and remote SQL injection vulnerabilities.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain πŸ–‹οΈ

The prolific Chinese nationstate actor known as APT41 aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti has been attributed to a sophisticated cyber attack targeting the gambling and gaming industry. "Over a period of at least six months, the attackers stealthily gathered valuable information from the targeted company including, but not limited to, network configurations, user passwords,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Guide:  The Ultimate Pentest Checklist for Full-Stack Security πŸ–‹οΈ

Pentest Checklists Are More Important Than Ever Given the expanding attack surface coupled with the increasing sophistication of attacker tactics and techniques, penetration testing checklists have become essential for ensuring thorough assessments across an organizations attack surface, both internal and external. By providing a structured approach, these checklists help testers systematically.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity