πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸš€ Google Voice scams: What are they and how do I avoid them? πŸš€

Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Severe Flaws Discovered in Major E2EE Cloud Storage Services πŸ“”

The cryptographic vulnerabilities were found in Sync, pCloud, Icedrive and Seafile by ETH Zurich.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Monday added a critical security flaw impacting ScienceLogic SL1 to its Known Exploited Vulnerabilities KEV catalog, following reports of active exploitation as a zeroday. The vulnerability in question, tracked as CVE20249537 CVSS v4 score 9.3, refers to a bug involving an unspecified thirdparty component that could.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ VMware Releases vCenter Server Update to Fix Critical RCE Vulnerability πŸ–‹οΈ

VMware has released software updates to address an already patched security flaw in vCenter Server that could pave the way for remote code execution. The vulnerability, tracked as CVE202438812 CVSS score 9.8, concerns a case of heapoverflow vulnerability in the implementation of the DCERPC protocol. "A malicious actor with network access to vCenter Server may trigger this vulnerability by.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ The Phantom Menace of Social Engineering πŸ‘½

Clickjacking Clickfix, also known as a UI redress attack, is a malicious technique where an attacker tricks a user into clicking on something different from what they perceive they are clicking on. This is often achieved by layering invisible or disguised elements over legitimate website content. For example, an attacker.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ The Dark Web’s Information Bazaar: How Threat Actors Share Vulnerability Data πŸ‘½

Recently, we published an intel about data leakage from some U.S. local authorities. It was about two different local authorities in U.S. and was showing us how threat actors share information between them. To put it very briefly, a threat actor claimed they have data of these authorities and they.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI-Powered Attacks Flood Retail Websites πŸ“”

AI tools are being used to launch over half a million cyberattacks daily on retailers, according to a new report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cisco confirms attackers stole data, shuts down access to compromised DevHub environment πŸ“’

The tech giant insists that no sensitive customer information has been compromised.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ethical hackers are flocking to AI tools, but the technology may be causing more problems than it solves πŸ“’

A survey of security researchers points to an escalating AI arms race along with a growing threat from hardware hacking.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Name That Toon: The Big Jump πŸ•΅οΈβ€β™‚οΈ

Feeling creative? Submit your caption and our panel of experts will reward the winner with a 25 Amazon gift card.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Can Security Experts Leverage Generative AI Without Prompt Engineering Skills? 🦿

A study at Rensselaer Polytechnic Institute presented at ISC2 Security Congress compared ChatGPTwritten training prompted by security experts and prompt engineers.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 NordVPN Review (2024): Is NordVPN Worth the Cost? 🦿

Is NordVPN worth it? How much does it cost and is it safe to use? Read our NordVPN review to learn about pricing, features, security, and more.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Best practices on securing your AI deployment 🧠

As organizations embrace generative AI, there are a host of benefits that they are expecting from these projectsfrom efficiency and productivity gains to improved speed of business to more innovation in products and services. However, one factor that forms a critical part of this AI innovation is trust. Trustworthy AI relies on understanding how the The post Best practices on securing your AI deployment appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ A Comprehensive Guide to Finding Service Accounts in Active Directory πŸ–‹οΈ

Service accounts are vital in any enterprise, running automated processes like managing applications or scripts. However, without proper monitoring, they can pose a significant security risk due to their elevated privileges. This guide will walk you through how to locate and secure these accounts within Active Directory AD, and explore how Silverforts solutions can help enhance your.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies πŸ–‹οΈ

Two malware families that suffered setbacks in the aftermath of a coordinated law enforcement operation called Endgame have resurfaced as part of new phishing campaigns. Bumblebee and Latrodectus, which are both malware loaders, are designed to steal personal data, along with downloading and executing additional payloads onto compromised hosts. Tracked under the names BlackWidow, IceNova, Lotus,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious npm Packages Target Developers' Ethereum Wallets with SSH Backdoor πŸ–‹οΈ

Cybersecurity researchers have discovered a number of suspicious packages published to the npm registry that are designed to harvest Ethereum private keys and gain remote access to the machine via the secure shell SSH protocol. The packages attempt to "gain SSH access to the victim's machine by writing the attackers SSH public key in the root users authorizedkeys file," software supply.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Phishing Attack Impacts Over 92,000 Transak Users πŸ“”

A phishing attack targeting Transak employees led to a data breach, compromising the information of 92,554 users.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Meta to Fight Celeb-Bait Scams with Facial Recognition πŸ“”

Meta is testing facial recognition technology to tackle celebbait ad scams and enable the recovery of compromised accounts.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Think Tanks Urge Action to Curb Misuse of Spyware and Hack-for-Hire πŸ“”

RUSI and Chatham House recommended global standards to combat commercial cyber tool abuse.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Bitdefender Total Security Vulnerabilities: Recent Patches and Recommendations πŸ¦…

Overview Bitdefender has issued a security advisory detailing critical vulnerabilities within its flagship products, Bitdefender Total Security and SafePay. These vulnerabilities pose significant risks to users and require urgent patching.  Bitdefender Total Security serves as a cybersecurity solution designed to protect devices across various platforms against malware, ransomware, and numerous other cyber threats. Its key features include realtime threat detection, privacy safeguards, and performance enhancements. A standout feature, SafePay, is a secure browser that isolates users online activitiessuch as banking and shoppingencrypts transactions to prevent unauthorized access and ensure safe financial interactions. The vulnerability classification is based on the Common V...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Cyble Sensors Detect Attacks on Java Framework, IoT Devices πŸ¦…

Overview Cybles weekly sensor intelligence report detailed more than 30 active attack campaigns against known vulnerabilities. New attacks were observed against a vulnerability in the Spring Java framework, and more than 400,000 attacks were observed exploiting a known IoT vulnerability. Cybles Vulnerability Intelligence unit also observed thousands of bruteforce attacks and hundreds of phishing campaigns. Here are some highlights from Cybles October 17 sensor report sent to clients. CVE202438816 Spring Java Framework Exploit CVE202438816 is a highseverity Path Traversal vulnerability in the popular Spring Java framework that is still undergoing NVD assessment. Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vul...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity