πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ¦… Cyble Sensors Detect New Attacks on CMS; IoT Exploits Continue πŸ¦…

Overview Cybles weekly sensor intelligence report detailed dozens of active attack campaigns against known vulnerabilities. New to the list are attacks on a vulnerability in the SPIP opensource content management CMS and publishing system, while previously reported campaigns targeting vulnerabilities in PHP, Linux systems, Java and Python frameworks, and more have continued unabated. Older vulnerabilities in IoT devices and embedded systems continue to be exploited at alarming rates. New to the report this week are exploits of vulnerabilities that may still be present in some Siemens products and network devices. As these vulnerabilities likely exist within some critical infrastructure environments, organizations with internetfacing IoT devices and embedded systems are advised t...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ LinkedIn Hit With $335M Fine for Data Privacy Violations πŸ•΅οΈβ€β™‚οΈ

The networking company found liable for illegally gathering user data for targeted advertising by the Irish Data Protection Commission.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Russia's APT29 Mimics AWS to Steal Windows Credentials πŸ•΅οΈβ€β™‚οΈ

Kremlin intelligence carried out a widescale phishing campaign in contrast to its usual, more targeted operations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ SEC Fines Companies Millions for Downplaying SolarWinds Breach πŸ•΅οΈβ€β™‚οΈ

Four companies Avaya, Check Point, Mimecast, and Unisys have been charged by the SEC for misleading disclosures in the aftermath of the 2020 SolarWinds compromise.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ UnitedHealth Reveals 100M Compromised in Change Healthcare Breach πŸ•΅οΈβ€β™‚οΈ

Eight months after the breach occurred, Change Healthcare has finally sent out millions of notices of compromised data to affected individuals.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Change Healthcare Cyberattack Exposed Data of Over 100 Million People 🦿

Nearly onethird of Americans may have been affected by the ransomware attack, which has been attributed to the BlackCat gang.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024 πŸͺ–

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, QA style blogs will be published featuring some of our unique staff members who have interesting backgrounds, stories to tell, and projects in the world of cybersecurity. This years Cybersecurity Awareness Month theme is Secure our World. How does this theme resonate with you, as someone working in cybersecurity? The theme 'Secure our World' resonates deeply with me, as it emphasizes our collective.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities πŸ–‹οΈ

The Computer Emergency Response Team of Ukraine CERTUA has detailed a new malicious email campaign targeting government agencies, enterprises, and military entities. "The messages exploit the appeal of integrating popular services like Amazon or Microsoft and implementing a zerotrust architecture," CERTUA said. "These emails contain attachments in the form of Remote Desktop Protocol '.rdp'.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining πŸ–‹οΈ

The infamous cryptojacking group known as TeamTNT appears to be readying for a new largescale campaign targeting cloudnative environments for mining cryptocurrencies and renting out breached servers to thirdparties. "The group is currently targeting exposed Docker daemons to deploy Sliver malware, a cyber worm, and cryptominers, using compromised servers and Docker Hub as the infrastructure.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ–‹οΈ Four REvil Ransomware Members Sentenced in Rare Russian Cybercrime Convictions πŸ–‹οΈ

Four members of the nowdefunct REvil ransomware operation have been sentenced to several years in prison in Russia, marking one of the rare instances where cybercriminals from the country have been convicted of hacking and money laundering charges. Russian news publication Kommersant reported that a court in St. Petersburg found Artem Zaets, Alexei Malozemov, Daniil Puzyrevsky, and Ruslan.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘4
πŸ‘½ U.S. Citizens’ Data Allegedly on Sale πŸ‘½

A threat actor claimed that they have and are selling 280 million U.S. citizens personal data on dark web. According to the post of the threat actor, the data includes FirstNameLastName AddressCityStateZIP IndDateOfBirthYearIndAge HomeValueCodeHomeMedianValueCodeMedianIncomeCode EmailPhone They are also claiming that they can provide sample data to the prospects. Meanwhile, they.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘5❀1
πŸ–‹οΈ Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel πŸ–‹οΈ

A new attack technique could be used to bypass Microsoft's Driver Signature Enforcement DSE on fully patched Windows systems, leading to operating system OS downgrade attacks. "This bypass allows loading unsigned kernel drivers, enabling attackers to deploy custom rootkits that can neutralize security controls, hide processes and network activity, maintain stealth, and much more," SafeBreach.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The National Public Data breach exposed nearly three billion users – now the company has filed for bankruptcy πŸ“’

National Public Datas decline after a devastating cyber attack took roughly six months, as it failed to stay afloat amid mounting recovery costs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ LinkedIn fined €310 million for GDPR breaches πŸ“’

The social networking platform has accepted the ruling and will implement changes to its ad tracking processes.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Is Firefox Password Manager Secure? 🦿

Like other password managers, there are risks and drawbacks to consider before trusting Firefox Password Manager with your credentials.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Hiring Kit: Computer Forensic Analyst 🦿

The increasing emphasis on securing sensitive data by regulatory agencies and governments worldwide has opened job opportunities beyond criminal justice for capable individuals with proficient technical skills, inquisitive analytical mindsets, and the tenacious drive to solve seemingly intractable problems. This customizable hiring kit, written by Mark W. Kaelin for TechRepublic Premium, provides a framework you ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 - Oct 27) πŸ–‹οΈ

Cybersecurity news can sometimes feel like a neverending horror movie, can't it? Just when you think the villains are locked up, a new threat emerges from the shadows. This week is no exception, with tales of exploited flaws, international espionage, and AI shenanigans that could make your head spin. But don't worry, we're here to break it all down in plain English and arm you with the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials πŸ–‹οΈ

Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat actors continue to abuse legitimate services like Cloudflare and Microsoft Sway to their advantage. "The campaigns target sensitive information from different crypto wallets, including Coinbase, MetaMask, Phantom, Trezor, and Bitbuy, as well as login credentials for.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Sailing the Seven Seas Securely from Port to Port – OT Access Security for Ships and Cranes πŸ–‹οΈ

Operational Technology OT security has affected marine vessel and port operators, since both ships and industrial cranes are being digitalized and automated at a rapid pace, ushering in new types of security challenges. Ships come to shore every six months on average. Container cranes are mostly automated. Diagnostics, maintenance, upgrade and adjustments to these critical systems are done.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Researchers Discover Over 70 Zero-Day Bugs at Pwn2Own Ireland πŸ“”

Trend Micros Zero Day Initiative hands out over 1m in awards for Pwn2Own competitors, who found more than 70 zeroday flaws.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI-Powered BEC Scams Zero in on Manufacturers πŸ“”

Vipre research reveals that 10 of emails targeting the manufacturing sector are BEC attempts.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity