πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Get Advanced Ad Blocking and Superior Data Privacy Tools for Just $11 🦿

Block popups, banners and video ads while also protecting yourself from activity trackers, phishing attempts, fraudulent websites and other types of malware with AdGuard.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 3 proven use cases for AI in preventative cybersecurity 🧠

IBMs Cost of a Data Breach Report 2024 highlights a groundbreaking finding The application of AIpowered automation in prevention has saved organizations an average of 2.2 million. Enterprises have been using AI for years in detection, investigation and response. However, as attack surfaces expand, security leaders must adopt a more proactive stance. Here are three The post 3 proven use cases for AI in preventative cybersecurity appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AWS Cloud Development Kit Vulnerability Exposes Users to Potential Account Takeover Risks πŸ–‹οΈ

Cybersecurity researchers have disclosed a security flaw impacting Amazon Web Services AWS Cloud Development Kit CDK that could have resulted in an account takeover under specific circumstances. "The impact of this issue could, in certain scenarios, allow an attacker to gain administrative access to a target AWS account, resulting in a full account takeover," Aqua said in a report shared.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability Under Active Attack πŸ–‹οΈ

Cisco on Wednesday said it has released updates to address an actively exploited security flaw in its Adaptive Security Appliance ASA that could lead to a denialofservice DoS condition. The vulnerability, tracked as CVE202420481 CVSS score 5.8, affects the Remote Access VPN RAVPN service of Cisco ASA and Cisco Firepower Threat Defense FTD Software. Arising due to resource.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA πŸ–‹οΈ

Sometimes, it turns out that the answers we struggled so hard to find were sitting right in front of us for so long that we somehow overlooked them. When the Department of Homeland Security, through the Cybersecurity and Infrastructure Security Agency CISA, in coordination with the FBI, issues a cybersecurity warning and prescribes specific action, its a pretty good idea to at least read the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices πŸ–‹οΈ

The North Korean threat actor known as Lazarus Group has been attributed to the zeroday exploitation of a nowpatched security flaw in Google Chrome to seize control of infected devices. Cybersecurity vendor Kaspersky said it discovered a novel attack chain in May 2024 that targeted the personal computer of an unnamed Russian national with the Manuscrypt backdoor. This entails triggering the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Latrodectus: When Phishing Turns Deadly πŸ‘½

Latrodectus is a Windows malware downloader first detected in October 2023 that functions as a backdoor. The malware downloads executable and DLL payloads. Latrodectus can also execute commands. Threat actors are increasingly using Latrodectus malware to target businesses in the financial, automotive, and healthcare sectors. Latrodectus primarily spreads through phishing.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Penn State Settles for $1.25M Over Cybersecurity Violations πŸ“”

Penn State will pay 1.25m for failing federal cybersecurity standards in DoD and NASA contracts.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” White House Issues AI National Security Memo πŸ“”

The National Security Memorandum on AI sets out actions for the federal government to ensure the safe, secure and trustworthy development of AI.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fortinet Confirms Exploitation of Critical FortiManager Zero-Day Vulnerability πŸ“”

This highseverity flaw, dubbed FortiJump by security researcher Kevin Beaumont, has been added to CISAs KEV catalog.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Government Introduces New Data Governance Legislation πŸ“”

The Data Use and Access Bill governs digital verification services and the use of personal data in public services, and will revamp the Information Commissioners Office.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybersecurity Teams Largely Ignored in AI Policy Development πŸ“”

A new ISACA study has revealed that cybersecurity professionals are often overlooked in the development of AI policies.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CISA Flags Critical Vulnerability (CVE-2024-47575) in Fortinet’s FortiManager πŸ¦…

Overview  The Cybersecurity and Infrastructure Security Agency CISA has added Fortinets FortiManager to its known Exploited Vulnerabilities KEV catalog, indicating a pressing need for organizations to address the associated risks.  The critical vulnerability identified as CVE202447575 has been assigned a CVSS score of 9.8. This vulnerability affects various versions of FortiManager, including FortiManager 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.7, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, and 6.2.0 through 6.2.12, as well as multiple iterations of FortiManager Cloud.   The vulnerability stems from a missing authentication issue within the critical functions of the FortiManager fgfmd daemon, allowing remote, unauthenticated attackers to execute arbitrary commands or code ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Weekly Industrial Control System (ICS) Vulnerability Intelligence Report: New Flaws Affecting Siemens, Schneider Electric, and More πŸ¦…

Overview  Cyble Research Intelligence Labs CRIL has shared new details about weekly industrial control systems ICS vulnerabilities. These vulnerabilities were issued by the Cybersecurity and Infrastructure Security Agency CISA from October 15 to October 21, 2024. The report outlines critical security concerns affecting various vendors and highlights the urgency for organizations to address these vulnerabilities promptly.   During the reporting period, CISA released seven security advisories targeting ICS, which collectively identified 13 distinct vulnerabilities across several companies, including Siemens, Schneider Electric, Elvaco, Mitsubishi Electric, HMS Networks, KiebackPeter, and LCDS Leo Consultoria e Desenvolvimento de Sistemas Ltda ME. Notably, Elvaco disclosed four vul...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ•΅οΈβ€β™‚οΈ AI Chatbots Ditch Guardrails After 'Deceptive Delight' Cocktail πŸ•΅οΈβ€β™‚οΈ

The latest GenAI jailbreak technique tricks chatbots into returning restricted content by blending different prompt topics together.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cisco ASA, FTD Software Under Active VPN Exploitation πŸ•΅οΈβ€β™‚οΈ

Unauthenticated threat actors can remotely cause a denialofservice DoS cyberattack within the Remote Access VPN software in Cisco's ASA and Firepower software.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Lazarus Group Exploits Google Chrome Flaw in New Campaign πŸ“”

Lazarus Group exploited Google Chrome zeroday, infecting systems with Manuscrypt malware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics πŸ–‹οΈ

Cybersecurity researchers have discovered an advanced version of the Qilin ransomware sporting increased sophistication and tactics to evade detection. The new variant is being tracked by cybersecurity firm Halcyon under the moniker Qilin.B. "Notably, Qilin.B now supports AES256CTR encryption for systems with AESNI capabilities, while still retaining Chacha20 for systems that lack this support.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical Bug Exploited in Fortinet's Management Console πŸ•΅οΈβ€β™‚οΈ

An attacker compromised one of Fortinet's most sensitive products and mopped up all kinds of reconnaissance data helpful for future mass device attacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
😱1
πŸ•΅οΈβ€β™‚οΈ AWS's Predictable Bucket Names Make Accounts Easier to Crack πŸ•΅οΈβ€β™‚οΈ

Amazon's open source Cloud Development Kit generates dangerously predictable naming patterns that could lead to an account takeover.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft: Healthcare Sees 300% Surge in Ransomware Attacks πŸ•΅οΈβ€β™‚οΈ

Even after the ransom is paid, such attacks lead to spikes in strokes and heart attacks and increased wait times for patients.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity