πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” CISA Launches First International Cybersecurity Plan πŸ“”

CISAs 20252026 International Strategic Plan aims to strengthen external partnerships to reduce risks to critical infrastructure relied on in the US.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ When Cybersecurity Tools Backfire πŸ•΅οΈβ€β™‚οΈ

Outages are inevitable. Our focus should be on minimizing their scope, addressing underlying causes, and understanding that protecting systems is about keeping bad actors out while maintaining stability and reliability.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The role of multi-cloud in improving security πŸ“’

The benefits of a multicloud approach can only be fully enjoyed with proper oversight of ones data and a clear plan for disaster recovery.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity Training Resources Often Limited to Developers πŸ•΅οΈβ€β™‚οΈ

With a lack of cybersecurity awareness training resources for all employees, organizations are more susceptible to being breached or falling short when it comes to preventing threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Vishing, Mishing Go Next-Level With FakeCall Android Malware πŸ•΅οΈβ€β™‚οΈ

A new variant of the sophisticated attacker tool gives cybercriminals even more control over victim devices to conduct various malicious activities, including fraud and cyber espionage.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Operation Magnus: Joint Law Enforcement Operation Targets Major Infostealer Networks 🦿

Read more about a joint operation between several law enforcement agencies in the U.S., Australia, Belgium, Portugal, The Netherlands, and the U.K. to tackle RedLine Stealer and META malware.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  GNUnet P2P Framework 0.22.2 πŸ› 

GNUnet is a peertopeer framework with focus on providing security. All peertopeer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP IPv4 and IPv6, TCP IPv4 and IPv6, HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack πŸ–‹οΈ

Threat actors in North Korea have been implicated in a recent incident that deployed a known ransomware family called Play, underscoring their financial motivations. The activity, observed between May and September 2024, has been attributed to a threat actor tracked as Jumpy Pisces, which is also known as Andariel, APT45, DarkSeoul, Nickel Hyatt, Onyx Sleet formerly Plutonium, Operation Troy,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ“” LiteSpeed Cache Plugin Vulnerability Poses Admin Access Risk πŸ“”

The LiteSpeed Cache vulnerability allows administratorlevel access, risking security for over 6 million WordPress sites.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Updated FakeCall Malware Targets Mobile Devices with Vishing πŸ“”

The new FakeCall variant uses advanced vishing tactics, featuring Bluetooth for device monitoring.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Apple Rolls Out Major Security Update to Patch macOS and iOS Vulnerabilities πŸ“”

In a major security update, Apple has fixed dozens of bugs and vulnerabilities across its operating systems and services.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Cybersecurity and Infrastructure Security Agency (CISA) Reports Urgent Security Updates for Apple Products πŸ¦…

Overview The Cybersecurity and Infrastructure Security Agency CISA has recently alerted users to multiple vulnerabilities in Apple products following the release of vital security updates on October 28, 2024. These Apple vulnerabilities could potentially allow cyber threat actors to exploit weaknesses in the software, emphasizing the importance of timely updates for safeguarding systems. Apple product users and administrators are urged to review the advisories and promptly apply the necessary updates. These updates address vulnerabilities that could potentially expose users to several risks, ranging from unauthorized access to sensitive data to the possibility of complete system control. The products affected by these updates encompass a wide range of operating systems and devic...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ•΅οΈβ€β™‚οΈ MIND Launches "Intelligent" DLP Platform πŸ•΅οΈβ€β™‚οΈ

The company's data loss prevention platform helps customers identify and classify data across SaaS and GenAI applications, endpoints, and emails.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ White House Outlines AI's Role in National Security πŸ•΅οΈβ€β™‚οΈ

The National Security Memorandum on Artificial Intelligence tasks various federal agencies with securing the AI supply chain from potential cyberattacks and disseminating timely threat information about such attacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'Midnight Blizzard' Targets Networks With Signed RDP Files πŸ•΅οΈβ€β™‚οΈ

The Russianbacked group is using a novel access vector to harvest victim data and compromise devices in a largescale intelligencegathering operation.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ex-Disney Employee Charged With Hacking Menu Database πŸ•΅οΈβ€β™‚οΈ

In a vengeful move against the happiest place on Earth, the former employee allegedly used his old credentials to make potentially deadly changes.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Regulators Combat Deepfakes With Anti-Fraud Rules πŸ•΅οΈβ€β™‚οΈ

Despite the absence of laws specifically covering AIbased attacks, regulators can use existing rules around fraud and deceptive business practices.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 80% of US Small Businesses Have Been Breached πŸ“”

ITRC data finds 81 of US small businesses have suffered a data or security breach over the past year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Scaling AI from pilot to production: Maximize AI impact with HPE & Intel πŸ“’

Transform AI proofofconcepts into fullscale implementations.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Enterprise Identity Threat Report 2024: Unveiling Hidden Threats to Corporate Identities πŸ–‹οΈ

In the modern, browsercentric workplace, the corporate identity acts as the frontline defense for organizations. Often referred to as the new perimeter, the identity stands between safe data management and potential breaches. However, a new report reveals how enterprises are often unaware of how their identities are being used across various platforms. This leaves them vulnerable to data.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ–‹οΈ LiteSpeed Cache Plugin Vulnerability Poses Significant Risk to WordPress Websites πŸ–‹οΈ

A highseverity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could allow an unauthenticated threat actor to elevate their privileges and perform malicious actions. The vulnerability, tracked as CVE202450550 CVSS score 8.1, has been addressed in version 6.5.2 of the plugin. "The plugin suffers from an unauthenticated privilege escalation vulnerability.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity