πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ IT Security Centralization Makes the Use of Industrial Spies More Profitable πŸ•΅οΈβ€β™‚οΈ

As organizations centralize IT security, the risk of espionage is silently becoming a more profitable threat.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top Tech Conferences & Events to Add to Your Calendar 🦿

A great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our tech events guide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Booking.com Phishers May Leave You With Reservations β™ŸοΈ

A number of cybercriminal innovations are making it easier for scammers to cash in on your upcoming travel plans. This story examines a recent spearphishing campaign that ensued when a California hotel had its booking.com credentials stolen. We'll also explore an array of cybercrime services aimed at phishers who target hotels that rely on the world's most visited travel website.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Sophos Warns Chinese Hackers Are Becoming Stealthier πŸ“”

Sophos provided details of changing tactics by Chinese APT groups over a fiveyear period, involving a shift towards stealthy, targeted attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ EmeraldWhale's Massive Git Breach Highlights Config Gaps πŸ•΅οΈβ€β™‚οΈ

The largescale operation took advantage of open repositories, hardcoded credentials in source code, and other cloud oversights.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Privacy Anxiety Pushes Microsoft Recall AI Release Again πŸ•΅οΈβ€β™‚οΈ

The Recall AI tool will be available to Copilot PC subscribers in December, and can be used to record images of every interaction on the device for review later. Critics say this introduces major privacy and security concerns along with useful functionality.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar πŸ–‹οΈ

Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? Its a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and IT.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls πŸ–‹οΈ

Cybersecurity researchers have discovered a new version of a wellknown Android malware family dubbed FakeCall that employs voice phishing aka vishing techniques to trick users into parting with their personal information. "FakeCall is an extremely sophisticated Vishing attack that leverages malware to take almost complete control of the mobile device, including the interception of incoming.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Hackers have been posing as IT support on Microsoft Teams πŸ“’

The social engineering campaign combines a traditional email spam campaign with Microsoft Teamsbased manipulation.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It) πŸ–‹οΈ

As the holiday season approaches, retail businesses are gearing up for their annual surge in online and instore traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit vulnerabilities for their gain.  Imperva, a Thales company, recently published its annual holiday shopping cybersecurity guide. Data from the Imperva Threat Research teams.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google’s AI Tool Big Sleep Finds Zero-Day Vulnerability in SQLite Database Engine πŸ–‹οΈ

Google said it discovered a zeroday vulnerability in the SQLite opensource database engine using its large language model LLM assisted framework called Big Sleep formerly Project Naptime. The tech giant described the development as the "first realworld vulnerability" uncovered using the artificial intelligence AI agent. "We believe this is the first public example of an AI agent finding.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Council Sites Recover Following Russian DDoS Blitz πŸ“”

Several UK council websites are back online after being disrupted by Russian hacktivist DDoS attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CISA Warns of Critical Vulnerabilities in Rockwell Automation’s FactoryTalk ThinManager πŸ¦…

Overview The Cybersecurity and Infrastructure Security Agency CISA has alerted about new vulnerabilities in Rockwell Automation FactoryTalk ThinManager. The alert, designated ICSA2430501, outlines serious security risks that could affect users of the software. With a CVSS v4 score of 9.3, these vulnerabilities demand immediate attention from security teams to safeguard industrial control systems. The vulnerabilities identified in Rockwell Automation's FactoryTalk ThinManager include "Missing Authentication for Critical Function" and "OutofBounds Read." These issues can allow remote attackers to manipulate databases or cause denialofservice conditions. The successful exploitation of these vulnerabilities poses a risk to users. Attackers could send specially crafted messages to ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested πŸ–‹οΈ

German law enforcement authorities have announced the disruption of a criminal service called dstat.cc that made it possible for other threat actors to easily mount distributed denialofservice DDoS attacks. "The platform made such DDoS attacks accessible to a wide range of users, even those without any indepth technical skills of their own," the Federal Criminal Police Office aka.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03) πŸ–‹οΈ

This week was a total digital dumpster fire! Hackers were like, "Let's cause some chaos!" and went after everything from our browsers to those fancy cameras that zoom and spin. You know, the ones they use in spy movies? We're talking passwordstealing bots, sneaky extensions that spy on you, and even cloudhacking ninjas! It's enough to make you want to chuck your phone in the ocean.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Supply Chain Attack Uses Smart Contracts for C2 Ops πŸ“”

Checkmarx has observed a novel npm supply chain attack using Ethereum smart contracts to manage commandandcontrol C2 operations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Warning issued after SharePoint flaw puts entire corporate networks at risk πŸ“’

A threat actor was able to remain undetected on a corporate network for over two weeks after exploiting a highseverity SharePoint vulnerability.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Google: Big Sleep AI Agent Puts SQLite Software Bug to Bed πŸ•΅οΈβ€β™‚οΈ

A research tool by the company found a vulnerability in the SQLite open source database, demonstrating the "defensive potential" for using LLMs to find vulnerabilities in applications before they're publicly released.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Name That Edge Toon: Aerialist's Choice πŸ•΅οΈβ€β™‚οΈ

Feeling creative? Submit your caption and our panel of experts will reward the winner with a 25 Amazon gift card.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Can Automatic Updates for Critical Infrastructure Be Trusted? πŸ•΅οΈβ€β™‚οΈ

The true measure of our cybersecurity prowess lies in our capacity to endure.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How AI Is Changing the Cloud Security and Risk Equation 🦿

Discover how AI amplifies cloud security risks and how to mitigate them, with insights from Tenables Liat Hayun on managing data sensitivity, misconfigurations, and overprivileged access.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity