πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Researchers Uncover Python Package Targeting Crypto Wallets with Malicious Code πŸ–‹οΈ

Cybersecurity researchers have discovered a new malicious Python package that masquerades as a cryptocurrency trading tool but harbors functionality designed to steal sensitive data and drain assets from victims' crypto wallets. The package, named "CryptoAITools," is said to have been distributed via both Python Package Index PyPI and bogus GitHub repositories. It was downloaded over 1,300.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Embarking on a Compliance Journey? Here’s How Intruder Can Help πŸ–‹οΈ

Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be daunting. Luckily, Intruder simplifies the process by helping you address the key vulnerability management criteria these frameworks demand, making your compliance journey much smoother. Read on to understand how to meet the requirements of each framework to keep your customer data safe. How Intruder.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Trump and Vance Phones Among Alleged Targets of Chinese Hackers πŸ‘½

In a shocking cyber revelation, Chinese hackers are suspected of targeting cellphones belonging to former President Donald Trump and his 2024 running mate, Senator JD Vance. According to informed sources, the TrumpVance campaign was alerted that both Trump and Vance may be among several individuals whose phone numbers were allegedly.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over Half of US County Websites β€œCould Be Spoofed” πŸ“”

Comparitech warns that voters could be misled as most local government sites are failing on basic security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Midnight Blizzard Spearphishing Campaign Targets Thousands with RDP Files πŸ“”

Microsoft has spotted a major spearphishing campaign from the Russian APT29 group using RDP for compromise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Strela Stealer targets Central and Southwestern Europe through Stealthy Execution via WebDAV πŸ¦…

Key Takeaways The recent Strela Stealer phishing campaign, uncovered by Cyble Research and Intelligence Labs CRIL, poses as an invoice notification to trick users into engaging with it. This campaign predominantly targets users in Central and Southwestern European regions, adjusting its focus based on locale settings to maximize its reach within specific demographics. Phishing emails carry ZIP file attachments containing heavily obfuscated JavaScript .js files, which are designed to evade detection by security tools. The JavaScript file conceals a base64encoded PowerShell command that, when executed, launches a malicious payload directly from the WebDAV server without saving the file to disk. The payload, Strela Stealer, is embedded within an obfuscated DLL file, specifical...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information πŸ–‹οΈ

A nowpatched security flaw in the Opera web browser could have enabled a malicious extension to gain unauthorized, full access to private APIs. The attack, codenamed CrossBarking, could have made it possible to conduct actions such as capturing screenshots, modifying browser settings, and account hijacking, Guardio Labs said. To demonstrate the issue, the company said it managed to publish a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malvertising Campaign Hijacks Facebook Accounts to Spread SYS01stealer Malware πŸ–‹οΈ

Cybersecurity researchers have uncovered an ongoing malvertising campaign that abuses Meta's advertising platform and hijacked Facebook accounts to distribute information known as SYS01stealer. "The hackers behind the campaign use trusted brands to expand their reach," Bitdefender Labs said in a report shared with The Hacker News. "The malvertising campaign leverages nearly a hundred malicious.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Launches First International Cybersecurity Plan πŸ“”

CISAs 20252026 International Strategic Plan aims to strengthen external partnerships to reduce risks to critical infrastructure relied on in the US.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ When Cybersecurity Tools Backfire πŸ•΅οΈβ€β™‚οΈ

Outages are inevitable. Our focus should be on minimizing their scope, addressing underlying causes, and understanding that protecting systems is about keeping bad actors out while maintaining stability and reliability.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The role of multi-cloud in improving security πŸ“’

The benefits of a multicloud approach can only be fully enjoyed with proper oversight of ones data and a clear plan for disaster recovery.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity Training Resources Often Limited to Developers πŸ•΅οΈβ€β™‚οΈ

With a lack of cybersecurity awareness training resources for all employees, organizations are more susceptible to being breached or falling short when it comes to preventing threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Vishing, Mishing Go Next-Level With FakeCall Android Malware πŸ•΅οΈβ€β™‚οΈ

A new variant of the sophisticated attacker tool gives cybercriminals even more control over victim devices to conduct various malicious activities, including fraud and cyber espionage.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Operation Magnus: Joint Law Enforcement Operation Targets Major Infostealer Networks 🦿

Read more about a joint operation between several law enforcement agencies in the U.S., Australia, Belgium, Portugal, The Netherlands, and the U.K. to tackle RedLine Stealer and META malware.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  GNUnet P2P Framework 0.22.2 πŸ› 

GNUnet is a peertopeer framework with focus on providing security. All peertopeer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP IPv4 and IPv6, TCP IPv4 and IPv6, HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack πŸ–‹οΈ

Threat actors in North Korea have been implicated in a recent incident that deployed a known ransomware family called Play, underscoring their financial motivations. The activity, observed between May and September 2024, has been attributed to a threat actor tracked as Jumpy Pisces, which is also known as Andariel, APT45, DarkSeoul, Nickel Hyatt, Onyx Sleet formerly Plutonium, Operation Troy,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ“” LiteSpeed Cache Plugin Vulnerability Poses Admin Access Risk πŸ“”

The LiteSpeed Cache vulnerability allows administratorlevel access, risking security for over 6 million WordPress sites.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Updated FakeCall Malware Targets Mobile Devices with Vishing πŸ“”

The new FakeCall variant uses advanced vishing tactics, featuring Bluetooth for device monitoring.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Apple Rolls Out Major Security Update to Patch macOS and iOS Vulnerabilities πŸ“”

In a major security update, Apple has fixed dozens of bugs and vulnerabilities across its operating systems and services.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Cybersecurity and Infrastructure Security Agency (CISA) Reports Urgent Security Updates for Apple Products πŸ¦…

Overview The Cybersecurity and Infrastructure Security Agency CISA has recently alerted users to multiple vulnerabilities in Apple products following the release of vital security updates on October 28, 2024. These Apple vulnerabilities could potentially allow cyber threat actors to exploit weaknesses in the software, emphasizing the importance of timely updates for safeguarding systems. Apple product users and administrators are urged to review the advisories and promptly apply the necessary updates. These updates address vulnerabilities that could potentially expose users to several risks, ranging from unauthorized access to sensitive data to the possibility of complete system control. The products affected by these updates encompass a wide range of operating systems and devic...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ•΅οΈβ€β™‚οΈ MIND Launches "Intelligent" DLP Platform πŸ•΅οΈβ€β™‚οΈ

The company's data loss prevention platform helps customers identify and classify data across SaaS and GenAI applications, endpoints, and emails.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1