πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Embargo Ransomware Gang Deploys Customized Defense Evasion Tools πŸ“”

The recently discovered Embargo ransomware group is using Rustbased custom tools to overcome victims security defenses, ESET researchers have observed.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Lazarus Group Exploits Chrome Zero-Day in Latest Campaign πŸ•΅οΈβ€β™‚οΈ

The North Korean actor is going after cryptocurrency investors worldwide leveraging a genuinelooking game site and AIgenerated content and images.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Russian Trolls Pose as Reputable Media to Sow US Election Chaos πŸ•΅οΈβ€β™‚οΈ

Operation Overload pushes dressed up Russian state propaganda with the aim of flooding the US with election disinformation.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft SharePoint Vuln Is Under Active Exploit πŸ•΅οΈβ€β™‚οΈ

The risk of exploitation is heightened, thanks to a proofofconcept that's been made publicly available.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detection πŸ–‹οΈ

New variants of a banking malware called Grandoreiro have been found to adopt new tactics in an effort to bypass antifraud measures, indicating that the malicious software is continuing to be actively developed despite law enforcement efforts to crack down on the operation. "Only part of this gang was arrested the remaining operators behind Grandoreiro continue attacking users all over the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Is Your Child Safe Online? CIS Guide Helps πŸ‘½

Protecting your childs online activity is crucial for their safety and wellbeing. Children are especially vulnerable to online risks because they may not have the maturity or experience to recognize and avoid danger. By taking steps to protect your childs online activity, you can help them stay safe from harm.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ 'Prometei' Botnet Spreads Its Cryptojacker Worldwide πŸ•΅οΈβ€β™‚οΈ

The Russianlanguage malware primarily enlists computers to mine Monero, but theoretically it can do worse.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Energy firms need to up their game to protect against supply chain risks πŸ“’

A new report highlights the risks to the sector from software and IT vendors.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Government Urges Organizations to Get Cyber Essentials Certified πŸ“”

On the 10th anniversary since Cyber Essentials was introduced, the UK government has highlighted the impact the scheme has had in preventing attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ–‹οΈ Fortinet Warns of Critical Vulnerability in FortiManager Under Active Exploitation πŸ–‹οΈ

Fortinet has confirmed details of a critical security flaw impacting FortiManager that has come under active exploitation in the wild. Tracked as CVE202447575 CVSS score 9.8, the vulnerability is also known as FortiJump and is rooted in the FortiGate to FortiManager FGFM protocol. "A missing authentication for critical function vulnerability CWE306 in FortiManager fgfmd daemon may.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The University of Manchester avoided disaster in last year’s cyber attack – now it wants to set an industry example πŸ“’

While the cyber attack on the university was a damaging incident, it couldve been a lot worse.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ This new AI jailbreaking technique lets hackers crack models in just three interactions πŸ“’

A new jailbreaking technique could be used by threat actors to gradually bypass safety guardrails in popular LLMs to draw them into generating harmful content.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ These tech firms downplayed the impact of the SolarWinds hack – now they’ve been fined by the SEC πŸ“’

Unisys, Avaya Holdings, Check Point Software, and Mimecast haven't admitted any wrongdoing, but have agreed to pay hefty penalties.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why Cybersecurity Acumen Matters in the C-Suite πŸ•΅οΈβ€β™‚οΈ

Until CEOs and boards prioritize learning more about mitigating threats, organizations are leaving themselves and their businesses open to the potential for disaster.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 What Is PCI Compliance? A Simple Guide for Businesses 🦿

Safeguard your customers card data using these industrystandard security protocols.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Get Advanced Ad Blocking and Superior Data Privacy Tools for Just $11 🦿

Block popups, banners and video ads while also protecting yourself from activity trackers, phishing attempts, fraudulent websites and other types of malware with AdGuard.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 3 proven use cases for AI in preventative cybersecurity 🧠

IBMs Cost of a Data Breach Report 2024 highlights a groundbreaking finding The application of AIpowered automation in prevention has saved organizations an average of 2.2 million. Enterprises have been using AI for years in detection, investigation and response. However, as attack surfaces expand, security leaders must adopt a more proactive stance. Here are three The post 3 proven use cases for AI in preventative cybersecurity appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AWS Cloud Development Kit Vulnerability Exposes Users to Potential Account Takeover Risks πŸ–‹οΈ

Cybersecurity researchers have disclosed a security flaw impacting Amazon Web Services AWS Cloud Development Kit CDK that could have resulted in an account takeover under specific circumstances. "The impact of this issue could, in certain scenarios, allow an attacker to gain administrative access to a target AWS account, resulting in a full account takeover," Aqua said in a report shared.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability Under Active Attack πŸ–‹οΈ

Cisco on Wednesday said it has released updates to address an actively exploited security flaw in its Adaptive Security Appliance ASA that could lead to a denialofservice DoS condition. The vulnerability, tracked as CVE202420481 CVSS score 5.8, affects the Remote Access VPN RAVPN service of Cisco ASA and Cisco Firepower Threat Defense FTD Software. Arising due to resource.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA πŸ–‹οΈ

Sometimes, it turns out that the answers we struggled so hard to find were sitting right in front of us for so long that we somehow overlooked them. When the Department of Homeland Security, through the Cybersecurity and Infrastructure Security Agency CISA, in coordination with the FBI, issues a cybersecurity warning and prescribes specific action, its a pretty good idea to at least read the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices πŸ–‹οΈ

The North Korean threat actor known as Lazarus Group has been attributed to the zeroday exploitation of a nowpatched security flaw in Google Chrome to seize control of infected devices. Cybersecurity vendor Kaspersky said it discovered a novel attack chain in May 2024 that targeted the personal computer of an unnamed Russian national with the Manuscrypt backdoor. This entails triggering the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity