πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Microsoft Delays Windows Copilot+ Recall Release Over Privacy Concerns πŸ–‹οΈ

Microsoft is further delaying the release of its controversial Recall feature for Windows Copilot PCs, stating it's taking the time to improve the experience. The development was first reported by The Verge. The artificial intelligencepowered tool was initially slated for a preview release starting in October. "We are committed to delivering a secure and trusted experience with Recall," the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US and Israel Warn of Iranian Threat Actor’s New Tradecraft πŸ“”

US and Israeli government agencies have warned that the Iranian statesponsored threat actor Cotton Sandstorm is deploying new tradecraft to expand its operations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Developer Velocity & Security: Can You Get Out of the Way in Time? πŸ•΅οΈβ€β™‚οΈ

When a CISO can articulate risk in context to the business as a whole, development teams can better prioritize their activities.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Overlooked Importance of Identifying Riskiest Users πŸ•΅οΈβ€β™‚οΈ

"See one, teach one, do one" takes a page out of the healthcare playbook to reduce human vulnerabilities where they matter most in cybersecurity.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 What’s behind unchecked CVE proliferation, and what to do about it 🧠

The volume of Common Vulnerabilities and Exposures CVEs has reached staggering levels, placing immense pressure on organizations cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid2024, nearly 27,500 had already been identified. Meanwhile, Coalitions 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit The post Whats behind unchecked CVE proliferation, and what to do about it appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Inside Iran’s Cyber Playbook: AI, Fake Hosting, and Psychological Warfare πŸ–‹οΈ

U.S. and Israeli cybersecurity agencies have published a new advisory attributing an Iranian cyber group to targeting the 2024 Summer Olympics and compromising a French commercial dynamic display provider to show messages denouncing Israel's participation in the sporting event. The activity has been pinned on an entity that's known as Emennet Pasargad, which the agencies said has been operating.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Massive Git Config Breach Exposes 15,000 Credentials; 10,000 Private Repos Cloned πŸ–‹οΈ

Cybersecurity researchers have flagged a "massive" campaign that targets exposed Git configurations to siphon credentials, clone private repositories, and even extract cloud credentials from the source code. The activity, codenamed EMERALDWHALE, is estimated to have collected over 10,000 private repositories and stored in an Amazon S3 storage bucket belonging to a prior victim. The bucket,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 5 SaaS Misconfigurations Leading to Major Fu*%@ Ups πŸ–‹οΈ

With so many SaaS applications, a range of configuration options, API capabilities, endless integrations, and apptoapp connections, the SaaS risk possibilities are endless. Critical organizational assets and data are at risk from malicious actors, data breaches, and insider threats, which pose many challenges for security teams. Misconfigurations are silent killers, leading to major.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Warns of Critical Software Vulnerabilities in Industrial Devices πŸ“”

Multiple vulnerabilities in Rockwell Automation and Mitsubishi products could allow ICS cyberattacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ¦… IT Vulnerability Report: Fortinet, SonicWall, Grafana Exposures Top 1 Million πŸ¦…

Overview Cyble Research and Intelligence Labs CRIL researchers investigated 17 vulnerabilities and nine dark web exploits during the period of Oct. 2329, and highlighted seven vulnerabilities that merit highpriority attention from security teams. This weeks IT vulnerability report affects an unusually high number of exposed devices and instances Vulnerabilities in Fortinet, SonicWall, and Grafana Labs can be found in more than 1 million webfacing assets, and a pair of 10.0severity vulnerabilities in CyberPanel have already been massexploited in ransomware attacks. Security teams should assess which of these vulnerabilities are present in their environments and the risks they pose and apply patches and mitigations promptly. The Weeks Top IT Vulnerabilities Here are the top IT...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese APTs Cash In on Years of Edge Device Attacks πŸ•΅οΈβ€β™‚οΈ

The sophisticated Chinese cyberattacks of today rest on important groundwork laid during the pandemic and before.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical Auth Bugs Expose Smart Factory Gear to Cyberattack πŸ•΅οΈβ€β™‚οΈ

Factory automation software from Mitsubishi Electric and Rockwell Automation could be subject to remote code execution RCE, denialofservice DoS, and more.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ IT Security Centralization Makes the Use of Industrial Spies More Profitable πŸ•΅οΈβ€β™‚οΈ

As organizations centralize IT security, the risk of espionage is silently becoming a more profitable threat.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top Tech Conferences & Events to Add to Your Calendar 🦿

A great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our tech events guide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Booking.com Phishers May Leave You With Reservations β™ŸοΈ

A number of cybercriminal innovations are making it easier for scammers to cash in on your upcoming travel plans. This story examines a recent spearphishing campaign that ensued when a California hotel had its booking.com credentials stolen. We'll also explore an array of cybercrime services aimed at phishers who target hotels that rely on the world's most visited travel website.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Sophos Warns Chinese Hackers Are Becoming Stealthier πŸ“”

Sophos provided details of changing tactics by Chinese APT groups over a fiveyear period, involving a shift towards stealthy, targeted attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ EmeraldWhale's Massive Git Breach Highlights Config Gaps πŸ•΅οΈβ€β™‚οΈ

The largescale operation took advantage of open repositories, hardcoded credentials in source code, and other cloud oversights.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Privacy Anxiety Pushes Microsoft Recall AI Release Again πŸ•΅οΈβ€β™‚οΈ

The Recall AI tool will be available to Copilot PC subscribers in December, and can be used to record images of every interaction on the device for review later. Critics say this introduces major privacy and security concerns along with useful functionality.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar πŸ–‹οΈ

Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? Its a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and IT.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls πŸ–‹οΈ

Cybersecurity researchers have discovered a new version of a wellknown Android malware family dubbed FakeCall that employs voice phishing aka vishing techniques to trick users into parting with their personal information. "FakeCall is an extremely sophisticated Vishing attack that leverages malware to take almost complete control of the mobile device, including the interception of incoming.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Hackers have been posing as IT support on Microsoft Teams πŸ“’

The social engineering campaign combines a traditional email spam campaign with Microsoft Teamsbased manipulation.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity