πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Russian Malware Campaign Targets Ukrainian Recruits Via Telegram πŸ“”

Google researchers have observed Russian threat actor UNC5812 using a malware campaign via Telegram to access the devices of Ukrainian military recruits.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ¦… U.S. Agencies Investigate China-Linked Telecom Hacks Targeting High-Profile Politicians πŸ¦…

The FBI and the Cybersecurity and Infrastructure Security Agency CISA have launched an investigation into a series of cyber intrusions linked to hackers believed to be affiliated with the Chinese statelinked threat actors.  This investigation follows reports that the phone communications of prominent U.S. political figures, including former President Donald Trump, Vice President Kamala Harris campaign team, and vicepresidential candidate JD Vance, have been targeted in a sweeping cyberespionage effort. Allegations of Unauthorized Access by Chinese State Linked Threat Actors The FBI and CISA issued a statement confirming their investigation into unauthorized access to commercial telecommunications infrastructure perpetrated by actors associated with the Peoples Republic of Ch...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… New Vulnerabilities Identified in Philips Smart Lighting and Matrix Door Controller πŸ¦…

Overview The Indian Computer Emergency Response Team CERTIn has issued two critical vulnerability advisories related to Philips Smart Lighting products and the Matrix Door Controller. Both vulnerabilities are classified as high severity, signaling significant risks for users that cannot be ignored. If left unaddressed, these vulnerabilities could lead to serious repercussions, including unauthorized access to sensitive information and potential data breaches. The implications of these vulnerabilities extend beyond mere inconvenience they threaten the security and integrity of users' home networks and connected devices. Affected users must take immediate action to protect their systems and ensure they are not exposed to potential exploitation. By staying informed and implementi...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Sophos-SecureWorks Deal Focuses on Building Advanced MDR, XDR Platform πŸ•΅οΈβ€β™‚οΈ

Sophos CEO Joe Levy says 859 million deal to acquire SecureWorks from majority owner Dell Technologies will put the Taegis platform with network detection and response, vulnerability detection and response, and identity threat detection and response capabilities at the core.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Windows 'Downdate' Attack Reverts Patched PCs to a Vulnerable State πŸ•΅οΈβ€β™‚οΈ

Windows 11 machines remain open to downgrade attacks, where attackers can abuse the Windows Update process to revive a patched driver signature enforcement DSE bypass.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ China's Elite Cyber Corps Hone Skills on Virtual Battlefields πŸ•΅οΈβ€β™‚οΈ

The nation leads in the number of capturetheflag tournaments sponsored by government and industry  a strategy from which Western nations could learn.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Delta Launches $500M Lawsuit Against CrowdStrike πŸ•΅οΈβ€β™‚οΈ

Delta argues that it lost hundreds of million of dollars in downtime and other costs in the aftermath of the incident, while CrowdStrike says it isn't liable for more than 10 million.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Russia Kneecaps Ukraine Army Recruitment With Spoofed 'Civil Defense' App πŸ•΅οΈβ€β™‚οΈ

Posing as an application used to locate Ukrainian military recruiters, a Kremlinbacked hacking initiative delivers malware, along with disinformation designed to undermine signups for soldiers in the war against Russia.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Mozilla: ChatGPT Can Be Manipulated Using Hex Code πŸ•΅οΈβ€β™‚οΈ

LLMs tend to miss the forest for the trees, understanding specific instructions but not their broader context. Bad actors can take advantage of this myopia to get them to do malicious things, with a new promptinjection technique.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸš€ Tony Fadell: Innovating to save our planet | Starmus highlights πŸš€

As methane emissions come under heightened global scrutiny, learn how a stateoftheart satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸš€ CloudScout: Evasive Panda scouting cloud services πŸš€

ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024 πŸͺ–

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, QA style blogs will be published featuring some of our unique staff members who have interesting backgrounds, stories to tell, and projects in the world of cybersecurity. This years Cybersecurity Awareness Month theme is Secure our World. How does this theme resonate with you, as someone working in cybersecurity? This theme resonates strongly with me. I am very fortunate to have the role of leading and.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing πŸ–‹οΈ

The U.S. government USG has issued new guidance governing the use of the Traffic Light Protocol TLP to handle the threat intelligence information shared between the private sector, individual researchers, and Federal Departments and Agencies. "The USG follows TLP markings on cybersecurity information voluntarily shared by an individual, company, or other any organization, when not in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors πŸ–‹οΈ

More than six years after the Spectre security flaw impacting modern CPU processors came to light, new research has found that the latest AMD and Intel processors are still susceptible to speculative execution attacks. The attack, disclosed by ETH Zrich researchers Johannes Wikner and Kaveh Razavi, aims to undermine the Indirect Branch Predictor Barrier IBPB on x86 chips, a crucial mitigation.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Apple is offering rewards of up to $1 million to find critical flaws in its private AI cloud systems πŸ“’

Apple is offering big bug bounty rewards to boost security of its Private Cloud Compute.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Five Eyes Agencies Launch Startup Security Initiative πŸ“”

The UK has joined forces with its Five Eyes peers to offer cybersecurity guidance to startups.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ICO: 55% of UK Adults Have Had Data Lost or Stolen πŸ“”

The UKs information commissioner claims most adults in the country have had their personal data exposed or compromised.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hacker claims to have data linked to 19 million French mobile and internet customers πŸ“’

The secondlargest ISP and telephone operator in France confirmed it recently suffered a major breach, with the leaked data potentially including IBAN numbers, email addresses, and phone numbers.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation πŸ–‹οΈ

Sherlock Holmes is famous for his incredible ability to sort through mounds of information he removes the irrelevant and exposes the hidden truth. His philosophy is plain yet brilliant When you have eliminated the impossible, whatever remains, however improbable, must be the truth. Rather than following every lead, Holmes focuses on the details that are needed to move him to the solution. In.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus πŸ–‹οΈ

The Dutch National Police, along with international partners, have announced the disruption of the infrastructure powering two information stealers tracked as RedLine and MetaStealer. The takedown, which took place on October 28, 2024, is the result of an international law enforcement task force codenamed Operation Magnus that involved authorities from the U.S., the U.K., Belgium, Portugal, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Suspicious Social Media Accounts Deployed Ahead of COP29 πŸ“”

Global Witness uncovered a network of 71 suspicious accounts on X supporting the Azeri government.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity