πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Regulators Combat Deepfakes With Anti-Fraud Rules πŸ•΅οΈβ€β™‚οΈ

Despite the absence of laws specifically covering AIbased attacks, regulators can use existing rules around fraud and deceptive business practices.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 80% of US Small Businesses Have Been Breached πŸ“”

ITRC data finds 81 of US small businesses have suffered a data or security breach over the past year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Scaling AI from pilot to production: Maximize AI impact with HPE & Intel πŸ“’

Transform AI proofofconcepts into fullscale implementations.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Enterprise Identity Threat Report 2024: Unveiling Hidden Threats to Corporate Identities πŸ–‹οΈ

In the modern, browsercentric workplace, the corporate identity acts as the frontline defense for organizations. Often referred to as the new perimeter, the identity stands between safe data management and potential breaches. However, a new report reveals how enterprises are often unaware of how their identities are being used across various platforms. This leaves them vulnerable to data.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ–‹οΈ LiteSpeed Cache Plugin Vulnerability Poses Significant Risk to WordPress Websites πŸ–‹οΈ

A highseverity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could allow an unauthenticated threat actor to elevate their privileges and perform malicious actions. The vulnerability, tracked as CVE202450550 CVSS score 8.1, has been addressed in version 6.5.2 of the plugin. "The plugin suffers from an unauthenticated privilege escalation vulnerability.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Government Sector Suffers 236% Surge in Malware Attacks πŸ“”

Malwarerelated attacks against global government organizations increased 236 yearonyear in Q1 2024, according to SonicWall.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Two notorious infostealer malware operations were just knocked offline πŸ“’

Infrastructure linked to two major infostealer malware strains has been seized in a joint law enforcement operation.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ North Korea's Andariel Pivots to 'Play' Ransomware Games πŸ•΅οΈβ€β™‚οΈ

The prominent statesponsored advanced persistent threat APT, aka Jumpy Pisces, appears to be moving away from its primary cyberespionage motives and toward wreaking widespread disruption and damage.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Noma Launches With Plans to Secure Data, AI Life Cycle πŸ•΅οΈβ€β™‚οΈ

Application security teams from Fortune 500 companies are already using Noma's life cycle platform, which offers organizations data and AI supply chain security, AI security posture management, and AI threat detection and response.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Case Against Abandoning CrowdStrike Post-Outage πŸ•΅οΈβ€β™‚οΈ

Kneejerk reactions to major vendor outages could do more harm than good.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ China Says Seabed Sentinels Are Spying, After Trump Taps πŸ•΅οΈβ€β™‚οΈ

On the heels of a Chinese APT eavesdropping on phone calls made by Trump and Harris campaign staffers, Beijing says foreign nations have mounted an extensive seafaring espionage effort.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 What is a Passkey? Definition, How It Works and More 🦿

A passkey is a security measure used to grant access to a protected system. This guide explains how it works, and provides more information on its uses and benefits.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Quishing: A growing threat hiding in plain sight 🧠

Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quickresponse QR codes are a good example of this in The post Quishing A growing threat hiding in plain sight appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New LightSpy Spyware Version Targets iPhones with Increased Surveillance Tactics πŸ–‹οΈ

Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that not only expands on its functionality, but also incorporates destructive capabilities to prevent the compromised device from booting up. "While the iOS implant delivery method closely mirrors that of the macOS version, the postexploitation and privilege escalation stages differ.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ LottieFiles Issues Warning About Compromised "lottie-player" npm Package πŸ–‹οΈ

LottieFiles has revealed that its npm package "lottieplayer" was compromised as part of a supply chain attack, prompting it to release an updated version of the library. "On October 30th 620 PM UTC LottieFiles were notified that our popular open source npm package for the web player lottiefileslottieplayer had unauthorized new versions pushed with malicious code," the company said in a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Canadian Government Data Stolen By Chinese Hackers πŸ“”

A report by the Canadian Centre for Cyber Security described China as the most sophisticated cyber threat to Canada, also identified India as an emerging threat.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” North Korean Hackers Collaborate with Play Ransomware πŸ“”

Palo Alto Networks Unit 42 has observed the firstever collaboration between North Koreanbacked Jumpy Pisces and Play ransomware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Misconfigured Git Configurations Targeted in EMERALDWHALE Attack πŸ“”

EMERALDWHALE breach allowed access to over 10,000 repositories and resulted in the theft of more than 15,000 cloud service credentials.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
😱1
πŸ“” New Xiu Gou Phishing Kit Targets US, Other Countries with Mascot πŸ“”

New phishing kit Xiu Gou, featuring a unique doggo mascot, targets users in US, UK, Spain, Australia and Japan with 2000 scam websites.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Cyble Sensors Detect New Attacks on LightSpeed, GutenKit WordPress Plugins πŸ¦…

Overview Cybles weekly sensor intelligence report for clients detailed new attacks on popular WordPress plugins, and IoT exploits continue to occur at very high rates. Two 9.8severity vulnerabilities in LightSpeed Cache and GutenKit are under attack, as WordPress and other CMS and publishing systems remain attractive targets for threat actors. Vulnerabilities in IoT devices and embedded systems continue to be targeted at alarming rates. In addition to older exploits, this week Cyble Vulnerability Intelligence researchers highlighted an older RDP vulnerability that may still be present in some OT networks. Given the difficulty of patching these systems, vulnerabilities may persist and require additional mitigations. Vulnerabilities in PHP, Linux systems, and Java and Python fra...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Facebook Businesses Targeted in Infostealer Phishing Campaign πŸ•΅οΈβ€β™‚οΈ

The threat actors deceive their victims by impersonating the legal teams of companies, wellknown Web stores, and manufacturers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity