🛡 Cybersecurity & Privacy 🛡 - News
26.1K subscribers
89.3K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕵️‍♂️ Russia Kneecaps Ukraine Army Recruitment With Spoofed 'Civil Defense' App 🕵️‍♂️

Posing as an application used to locate Ukrainian military recruiters, a Kremlinbacked hacking initiative delivers malware, along with disinformation designed to undermine signups for soldiers in the war against Russia.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Mozilla: ChatGPT Can Be Manipulated Using Hex Code 🕵️‍♂️

LLMs tend to miss the forest for the trees, understanding specific instructions but not their broader context. Bad actors can take advantage of this myopia to get them to do malicious things, with a new promptinjection technique.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
1
🚀 Tony Fadell: Innovating to save our planet | Starmus highlights 🚀

As methane emissions come under heightened global scrutiny, learn how a stateoftheart satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts.

📖 Read more.

🔗 Via "ESET - WeLiveSecurity"

----------
👁️ Seen on @cibsecurity
👍1
🚀 CloudScout: Evasive Panda scouting cloud services 🚀

ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services.

📖 Read more.

🔗 Via "ESET - WeLiveSecurity"

----------
👁️ Seen on @cibsecurity
🪖 Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024 🪖

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, QA style blogs will be published featuring some of our unique staff members who have interesting backgrounds, stories to tell, and projects in the world of cybersecurity. This years Cybersecurity Awareness Month theme is Secure our World. How does this theme resonate with you, as someone working in cybersecurity? This theme resonates strongly with me. I am very fortunate to have the role of leading and.

📖 Read more.

🔗 Via "NIST"

----------
👁️ Seen on @cibsecurity
🖋️ U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing 🖋️

The U.S. government USG has issued new guidance governing the use of the Traffic Light Protocol TLP to handle the threat intelligence information shared between the private sector, individual researchers, and Federal Departments and Agencies. "The USG follows TLP markings on cybersecurity information voluntarily shared by an individual, company, or other any organization, when not in.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors 🖋️

More than six years after the Spectre security flaw impacting modern CPU processors came to light, new research has found that the latest AMD and Intel processors are still susceptible to speculative execution attacks. The attack, disclosed by ETH Zrich researchers Johannes Wikner and Kaveh Razavi, aims to undermine the Indirect Branch Predictor Barrier IBPB on x86 chips, a crucial mitigation.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
👍1
📢 Apple is offering rewards of up to $1 million to find critical flaws in its private AI cloud systems 📢

Apple is offering big bug bounty rewards to boost security of its Private Cloud Compute.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
1
📔 Five Eyes Agencies Launch Startup Security Initiative 📔

The UK has joined forces with its Five Eyes peers to offer cybersecurity guidance to startups.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 ICO: 55% of UK Adults Have Had Data Lost or Stolen 📔

The UKs information commissioner claims most adults in the country have had their personal data exposed or compromised.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📢 Hacker claims to have data linked to 19 million French mobile and internet customers 📢

The secondlargest ISP and telephone operator in France confirmed it recently suffered a major breach, with the leaked data potentially including IBAN numbers, email addresses, and phone numbers.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🖋️ A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation 🖋️

Sherlock Holmes is famous for his incredible ability to sort through mounds of information he removes the irrelevant and exposes the hidden truth. His philosophy is plain yet brilliant When you have eliminated the impossible, whatever remains, however improbable, must be the truth. Rather than following every lead, Holmes focuses on the details that are needed to move him to the solution. In.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus 🖋️

The Dutch National Police, along with international partners, have announced the disruption of the infrastructure powering two information stealers tracked as RedLine and MetaStealer. The takedown, which took place on October 28, 2024, is the result of an international law enforcement task force codenamed Operation Magnus that involved authorities from the U.S., the U.K., Belgium, Portugal, and.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 Suspicious Social Media Accounts Deployed Ahead of COP29 📔

Global Witness uncovered a network of 71 suspicious accounts on X supporting the Azeri government.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🦅 Phishing Campaign Targeting Ukraine: UAC-0215 Threatens National Security 🦅

Overview CERTUA, the Cyber Emergency Response Team for Ukraine, uncovered a phishing campaign orchestrated by the threat actor UAC0215. This campaign specifically targeted public institutions, major industries, and military units across Ukraine.    The phishing emails were cleverly disguised to promote integration with popular platforms like Amazon and Microsoft, as well as advocating for Zero Trust Architecture ZTA. However, the emails contained malicious .rdp configuration files that, when opened, established a connection to an attackercontrolled server.    This connection provided unauthorized access to a variety of local resources, including disk drives, network assets, printers, audio devices, and even the clipboard. The sophistication of this campaign raises security con...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
📢 Five real-world cyberattacks and how to stop them 📢

Vol. 2 Technical attacks.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📢 Five real-world cyberattacks and how to stop them 📢

Vol. 1 Social engineering attacks.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ French ISP Confirms Cyberattack, Data Breach Affecting 19M 🕵️‍♂️

In the latest attack against ISPs, secondlargest French provider Free fell victim to unknown cyberattackers who attempted to sell the compromised data it stole from the company on an underground cybercrime forum.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ FBI, Partners Disrupt RedLine, Meta Stealer Operations 🕵️‍♂️

A collaboration with the FBI and lawenforcement agencies in Europe, the UK, and Australia, Operation Magnus has seized servers and source code related to the two malware families, which have stolen data from millions of victims worldwide.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ How to Find the Right CISO 🕵️‍♂️

Great CISOs are in short supply, so choose wisely. Here are five ways to make sure you've made the right pick.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🦿 The 8 Best Network Monitoring Tools for 2024 🦿

The best network monitoring tools include Zabbix, Datadog, and Cacti. Compare features, pricing, and supported platforms among our top picks.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity