πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  Helper 0.1 πŸ› 

Helper is an enumerator written in PHP that helps identify directories on webservers that could be targets for things like cross site scripting, local file inclusion, remote shell upload, and remote SQL injection vulnerabilities.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain πŸ–‹οΈ

The prolific Chinese nationstate actor known as APT41 aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti has been attributed to a sophisticated cyber attack targeting the gambling and gaming industry. "Over a period of at least six months, the attackers stealthily gathered valuable information from the targeted company including, but not limited to, network configurations, user passwords,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Guide:  The Ultimate Pentest Checklist for Full-Stack Security πŸ–‹οΈ

Pentest Checklists Are More Important Than Ever Given the expanding attack surface coupled with the increasing sophistication of attacker tactics and techniques, penetration testing checklists have become essential for ensuring thorough assessments across an organizations attack surface, both internal and external. By providing a structured approach, these checklists help testers systematically.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 - Oct 20) πŸ–‹οΈ

Hi there! Heres your quick update on the latest in cybersecurity. Hackers are using new tricks to break into systems we thought were securelike finding hidden doors in locked houses. But the good news? Security experts are fighting back with smarter tools to keep data safe. Some big companies were hit with attacks, while others fixed their vulnerabilities just in time. It's a constant battle.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Netskope Reports Possible Bumblebee Loader Resurgence πŸ“”

The malware loader taken down by Europol in May 2024 could be back with a vengeance.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Australia's Privacy Watchdog Publishes Guidance on Commercial AI Products πŸ“”

Businesses in Australia must update their privacy policies with clear and transparent information about their use of AI, said the regulator.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Half of Organizations Have Unmanaged Long-Lived Cloud Credentials πŸ“”

Longlived credentials in the cloud put organizations at high risk of breaches, a report from Datadog has found.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Splunk’s Latest Advisory: Addressing Multiple Vulnerabilities in Splunk Enterprise πŸ¦…

Overview Splunk has recently issued an advisory detailing multiple vulnerabilities discovered in its Splunk Enterprise software. The advisory categorize vulnerabilities into three primary classifications based on their CVSS base scores. In total, there are two vulnerabilities classified as High, with a risk score deemed Critical. The Medium category includes eight vulnerabilities, while there is one vulnerability classified as Low. The advisory identifies several CVE IDs associated with these vulnerabilities, specifically CVE202445731, CVE202445732, CVE202445733, CVE202445734, CVE202445735, CVE202445736, CVE202445737, CVE202445738, CVE202445739, CVE202445740, and CVE202445741. Importantly, Splunk has confirmed that patches are available for all identified vulnerabilities, urgi...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Weekly Industrial Control System (ICS) Intelligence Report: 54 New Vulnerabilities in Siemens, Rockwell Automation, and Delta Products πŸ¦…

Overview Cyble Research Intelligence Labs CRIL has released its latest Weekly Industrial Control System ICS Vulnerability Intelligence Report, sharing multiple vulnerabilities observed by the Cybersecurity and Infrastructure Security Agency CISA between October 8 and October 14, 2024. This weeks analysis focuses on security advisories and vulnerabilities that affect critical industrial infrastructure. The Cybersecurity and Infrastructure Security Agency CISA has published 21 security advisories specifically targeting Industrial Control Systems ICS. These advisories encompass a total of 54 distinct vulnerabilities affecting major vendors, including Siemens, Rockwell Automation, Schneider Electric, and Delta Electronics. Among these, Siemens has reported the highest number of ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 50,000 Files Exposed in Nidec Ransomware Attack πŸ“”

The August ransomware attack stole 50,000 documents from Nidec, leaked after ransom refusal.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Anti-Bot Services Help Cybercrooks Bypass Google 'Red Page' πŸ•΅οΈβ€β™‚οΈ

The emergence of novel antidetection kits for sale on the Dark Web limit the effectiveness of a Chrome browser feature that warns users that they have reached a phishing page.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Get 9 Courses on Ethical Hacking for Just $50 🦿

Kickstart a lucrative career in pentesting and ethical hacking with this ninecourse bundle from IDUNOVA, now on sale for just 49.99 for a limited time.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ“” Stolen Access Tokens Lead to New Internet Archive Breach πŸ“”

A threat actor claimed to get hold of an exposed GitLab configuration file containing Zendesk API access tokens.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 ISC2 Security Congress 2024: The Landscape of Nation-State Cyber Attacks 🦿

CISA advisor Nicole Perlroth closed out ISC2 Security Congress keynotes with a wakeup call for security teams to watch for nationstatesponsored attacks.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Do U.S. Local Authorities Under Attack? πŸ‘½

A threat actor claimed they have and are selling data of two different U.S. local authorities in a dark web forum. The first one is U.S. local authority in Durango durangoco.gov. The threat actor has claimed that another threat actor breached via a vulnerability in the website of the local.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Unmanaged Cloud Credentials Pose Risk to Half of Orgs πŸ•΅οΈβ€β™‚οΈ

These types of "longlived" credentials pose a risk for users across all major cloud service providers, and must meet their very timely ends, researchers say.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cisco Disables DevHub Access After Security Breach πŸ•΅οΈβ€β™‚οΈ

The networking company confirms that cyberattackers illegally accessed data belonging to some of its customers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Internet Archive Gets Pummeled in Round 2 Breach πŸ•΅οΈβ€β™‚οΈ

This latest breach was through Zendesk, a customer service platform that the organization uses.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Russia-Linked Hackers Attack Japan's Govt, Ports πŸ•΅οΈβ€β™‚οΈ

Russialinked hackers have taken aim at Japan, following its ramping up of military exercises with regional allies and the increase of its defense budget.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ Google Voice scams: What are they and how do I avoid them? πŸš€

Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Severe Flaws Discovered in Major E2EE Cloud Storage Services πŸ“”

The cryptographic vulnerabilities were found in Sync, pCloud, Icedrive and Seafile by ETH Zurich.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity