πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ‘½ Access to any Cisco Device? πŸ‘½

A threat actor called IntelBroker posted an advertisement on a dark web forum for the sale of information stolen from Cisco. The actor claimed that the data from this breach contains sensitive information such as GitHub projects, source code, credentials, certificates, access to cloud storage buckets, and more. On October.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ‘½ Pakistani PII Data Leakage πŸ‘½

A threat actor advertised 3.4 million pieces of PII data of Pakistani government website Benazir Income Support Program Government of Pakistan bisp.gov.pk. The advertisement shared in a Telegram group. It was claimed that the data included information such as full address, fathers name, mobile number, gender, as can be seen below.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials πŸ–‹οΈ

Unknown threat actors have been observed attempting to exploit a nowpatched security flaw in the opensource Roundcube webmail software as part of a phishing attack designed to steal user credentials. Russian cybersecurity company Positive Technologies said it discovered last month that an email was sent to an unspecified governmental organization located in one of the Commonwealth of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data πŸ–‹οΈ

North Korean information technology IT workers who obtain employment under false identities in Western companies are not only stealing intellectual property, but are also stepping up by demanding ransoms in order to not leak it, marking a new twist to their financially motivated attacks. "In some instances, fraudulent workers demanded ransom payments from their former employers after gaining.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ DPRK Uses Microsoft Zero-Day in No-Click Toast Attacks πŸ•΅οΈβ€β™‚οΈ

The "CodeonToast" supply chain cyberattacks by APT37 delivered datastealing malware to users in South Korea who had enabled Toast popup ads.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers πŸ–‹οΈ

Cybersecurity researchers have discovered severe cryptographic issues in various endtoend encrypted E2EE cloud storage platforms that could be exploited to leak sensitive data. "The vulnerabilities range in severity in many cases a malicious server can inject files, tamper with file data, and even gain direct access to plaintext," ETH Zurich researchers Jonas Hofmann and Kien Tuong Truong.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber criminal underground β€œthriving” as weekly attacks surge by 75% in Q3 2024 πŸ“’

Cyber attacks reached another alltime high this quarter as digital crime continues to be a highly profitable industry for threat actors.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Enterprises are struggling to fill senior cybersecurity roles β€” and it's causing staff burnout to skyrocket πŸ“’

Many senior roles take months to fill, creating cumbersome workloads for midlevel staff and increased burnout.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Why choosing the right business cybersecurity and networking partner is key to your future safety and success πŸ“’

Cloud architectures such as SASE can greatly improve organizational security but leaders should lean on trusted partners to deliver them.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why I'm Excited About the Future of Application Security πŸ•΅οΈβ€β™‚οΈ

The future of application security is no longer about reacting to the inevitable it's about anticipating and preventing attacks before they can cause damage.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Australia’s New Scam Prevention Laws: What You Need to Know 🦿

Australia's Scam Prevention Framework aims to protect consumers by holding tech, banking, and telecom sectors accountable, with fines up to 50 million.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 6 Best Antivirus Software Providers for Mac in 2024 🦿

Macs may need additional antivirus protection in a business environment or highrisk use case. Bitdefender is the best overall Mac antivirus provider when it comes to protection, usability, and performance.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Helper 0.1 πŸ› 

Helper is an enumerator written in PHP that helps identify directories on webservers that could be targets for things like cross site scripting, local file inclusion, remote shell upload, and remote SQL injection vulnerabilities.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain πŸ–‹οΈ

The prolific Chinese nationstate actor known as APT41 aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti has been attributed to a sophisticated cyber attack targeting the gambling and gaming industry. "Over a period of at least six months, the attackers stealthily gathered valuable information from the targeted company including, but not limited to, network configurations, user passwords,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Guide:  The Ultimate Pentest Checklist for Full-Stack Security πŸ–‹οΈ

Pentest Checklists Are More Important Than Ever Given the expanding attack surface coupled with the increasing sophistication of attacker tactics and techniques, penetration testing checklists have become essential for ensuring thorough assessments across an organizations attack surface, both internal and external. By providing a structured approach, these checklists help testers systematically.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 - Oct 20) πŸ–‹οΈ

Hi there! Heres your quick update on the latest in cybersecurity. Hackers are using new tricks to break into systems we thought were securelike finding hidden doors in locked houses. But the good news? Security experts are fighting back with smarter tools to keep data safe. Some big companies were hit with attacks, while others fixed their vulnerabilities just in time. It's a constant battle.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Netskope Reports Possible Bumblebee Loader Resurgence πŸ“”

The malware loader taken down by Europol in May 2024 could be back with a vengeance.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Australia's Privacy Watchdog Publishes Guidance on Commercial AI Products πŸ“”

Businesses in Australia must update their privacy policies with clear and transparent information about their use of AI, said the regulator.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Half of Organizations Have Unmanaged Long-Lived Cloud Credentials πŸ“”

Longlived credentials in the cloud put organizations at high risk of breaches, a report from Datadog has found.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Splunk’s Latest Advisory: Addressing Multiple Vulnerabilities in Splunk Enterprise πŸ¦…

Overview Splunk has recently issued an advisory detailing multiple vulnerabilities discovered in its Splunk Enterprise software. The advisory categorize vulnerabilities into three primary classifications based on their CVSS base scores. In total, there are two vulnerabilities classified as High, with a risk score deemed Critical. The Medium category includes eight vulnerabilities, while there is one vulnerability classified as Low. The advisory identifies several CVE IDs associated with these vulnerabilities, specifically CVE202445731, CVE202445732, CVE202445733, CVE202445734, CVE202445735, CVE202445736, CVE202445737, CVE202445738, CVE202445739, CVE202445740, and CVE202445741. Importantly, Splunk has confirmed that patches are available for all identified vulnerabilities, urgi...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Weekly Industrial Control System (ICS) Intelligence Report: 54 New Vulnerabilities in Siemens, Rockwell Automation, and Delta Products πŸ¦…

Overview Cyble Research Intelligence Labs CRIL has released its latest Weekly Industrial Control System ICS Vulnerability Intelligence Report, sharing multiple vulnerabilities observed by the Cybersecurity and Infrastructure Security Agency CISA between October 8 and October 14, 2024. This weeks analysis focuses on security advisories and vulnerabilities that affect critical industrial infrastructure. The Cybersecurity and Infrastructure Security Agency CISA has published 21 security advisories specifically targeting Industrial Control Systems ICS. These advisories encompass a total of 54 distinct vulnerabilities affecting major vendors, including Siemens, Rockwell Automation, Schneider Electric, and Delta Electronics. Among these, Siemens has reported the highest number of ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity