πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Most US Political Campaigns Lack DMARC Email Protection πŸ•΅οΈβ€β™‚οΈ

Without DMARC, campaigns remain highly susceptible to phishing, domain spoofing, and impersonation.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are stepping up β€˜qishing’ attacks by hiding malicious QR codes in PDF email attachments πŸ“’

Malicious QR codes hidden in email attachments may be missed by traditional email security scanners, with over 500,000 qishing attacks launched in the last three months.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Reveal 'Deceptive Delight' Method to Jailbreak AI Models πŸ–‹οΈ

Cybersecurity researchers have shed light on a new adversarial technique that could be used to jailbreak large language models LLMs during the course of an interactive conversation by sneaking in an undesirable instruction between benign ones. The approach has been codenamed Deceptive Delight by Palo Alto Networks Unit 42, which described it as both simple and effective, achieving an average.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Think You’re Secure? 49% of Enterprises Underestimate SaaS Risks πŸ–‹οΈ

It may come as a surprise to learn that 34 of security practitioners are in the dark about how many SaaS applications are deployed in their organizations. And its no wonderthe recent AppOmni 2024 State of SaaS Security Report reveals that only 15 of organizations centralize SaaS security within their cybersecurity teams. These statistics not only highlight a critical security blind spot,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ransomware Gangs Use LockBit's Fame to Intimidate Victims in Latest Attacks πŸ–‹οΈ

Threat actors have been observed abusing Amazon S3 Simple Storage Service Transfer Acceleration feature as part of ransomware attacks designed to exfiltrate victim data and upload them to S3 buckets under their control. "Attempts were made to disguise the Golang ransomware as the notorious LockBit ransomware," Trend Micro researchers Jaromir Horejsi and Nitesh Surana said. "However, such is.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ French ISP Data for Sale πŸ‘½

Yesterday 22 Oct. a threat actor advertised data of the Frenchbased ISP Free SAS free.fr, in a dark web forum. According to the post, the data is affecting 19.2 million customers and contains over 5.11 million IBAN numbers. It affects all Free Mobile and Freebox customers, and includes the IBANs of all 5.11 million.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Internet Archive Secures Zendesk Account, Works Toward Full-Service Restoration πŸ“”

While Internet Archives services slowly resume, the data breach reveals the nonprofits security failures.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Government Pledges to Cyber Threat Sharing Via TLP Protocol πŸ“”

The US government has issued guidance for federal agencies on the use of Traffic Light Protocol, designed to boost intelligence sharing with the cybersecurity community.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Government Weighs Review of Computer Misuse Act to Combat Cybercrime πŸ“”

The British Minister for Security Dan Jarvis said at Recorded Futures Predict 2024 that the new government was considering reforming the 1990 legislation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Energy Sector Vulnerable to Supply Chain Attacks πŸ“”

45 of security breaches in the energy sector in the past year were thirdparty related, according to a report by Security Scorecard and KPMG.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ The Global Surveillance Free-for-All in Mobile Ad Data β™ŸοΈ

Not long ago, the ability to remotely track someones daily movements just by knowing their home address, employer, or place of worship was considered a powerful surveillance tool that should only be in the purview of nation states. But a new lawsuit in a likely constitutional battle over a New Jersey privacy law shows that anyone can now access this capability, thanks to a proliferation of commercial services that hoover up the digital exhaust emitted by widelyused mobile apps and websites.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CISA Warns About New Microsoft SharePoint Vulnerability CVE-2024-38094: High Risks and Immediate Patching Needed πŸ¦…

Overview The Cybersecurity and Infrastructure Security Agency CISA has issued a critical advisory regarding newly discovered vulnerabilities in Microsoft SharePoint, specifically addressing a deserialization vulnerability now included in CISAs Known Exploited Vulnerability KEV catalog.  The vulnerability in question, identified as CVE202438094, has a CVSSv3.1 score of 7.2, which indicates a highseverity risk. It affects several SharePoint products, including Microsoft SharePoint Server Subscription Edition, Microsoft SharePoint Server 2019, and Microsoft SharePoint Enterprise Server 2016. An authenticated attacker with Site Owner permissions could exploit this vulnerability to inject and execute arbitrary code within the SharePoint environment. The risk of such exploitation ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Exploitation of Docker remote API servers has reached a β€œcritical level” πŸ“’

Hackers are targeting Dockers remote access API as it allows them to pivot from a single container to the host and deploy malware with ease.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Multi-layered security is the key to keeping data safe – here’s why πŸ“’

A robust cyber resilience strategy requires multiple layers of defense to safeguard businesscritical data against an increasingly sophisticated threat landscape.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Bumblebee Malware Is Buzzing Back to Life πŸ•΅οΈβ€β™‚οΈ

Despite a law enforcement sweep last May, the sophisticated downloader malware is reemerging.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 AI hallucinations can pose a risk to your cybersecurity 🧠

In early 2023, Googles Bard made headlines for a pretty big mistake, which we now call an AI hallucination. During a demo, the chatbot was asked, What new discoveries from the James Webb Space Telescope can I tell my 9yearold about? Bard answered that JWST, which launched in December 2021, took the very first pictures The post AI hallucinations can pose a risk to your cybersecurity appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Permiso State of Identity Security 2024: A Shake-up in Identity Security Is Looming Large πŸ–‹οΈ

Identity security is front, and center given all the recent breaches that include Microsoft, Okta, Cloudflare and Snowflake to name a few. Organizations are starting to realize that a shakeup is needed in terms of the way we approach identity security both from a strategic but also a technology vantage point.  Identity security is more than just provisioning access  The conventional view.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094) πŸ–‹οΈ

A highseverity flaw impacting Microsoft SharePoint has been added to the Known Exploited Vulnerabilities KEV catalog by the U.S. Cybersecurity and Infrastructure Security Agency CISA on Tuesday, citing evidence of active exploitation. The vulnerability, tracked as CVE202438094 CVSS score 7.2, has been described as a deserialization vulnerability impacting SharePoint that could result.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 70% of Leaders See Cyber Knowledge Gap in Employees πŸ“”

70 of leaders see cyber knowledge gap AI attacks are harder to detect, 60 expect more victims.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CISA Adds ScienceLogic SL1 Vulnerability to Known Exploited Vulnerabilities (KEV) Catalog πŸ¦…

Overview The Cybersecurity and Infrastructure Security Agency CISA recently added a vulnerability related to ScienceLogic SL1, previously known as EM7, to its Known Exploited Vulnerabilities KEV catalog.   The specific vulnerability in question, designated as CVE20249537, has been classified as critical. It relates to a thirdparty utility included with the ScienceLogic SL1 package. Notably, the name of this utility has not been disclosed to prevent providing insights to potential threat actors. The newly identified vulnerability, designated CVE20249537, has a critical CVSS score of 9.3. It involves a remote code execution issue linked to a thirdparty component within ScienceLogic SL1. This specific vulnerability has attracted many users and cybersecurity professionals, par...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Former British PM Cameron Calls for Tech Engagement with China Despite Cyber Threats πŸ“”

Former UK PM David Cameron called for stronger defenses against Chinese cyber espionage while advocating collaboration with Beijing, coinciding with the BRICS Summit.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity