πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Google: Big Sleep AI Agent Puts SQLite Software Bug to Bed πŸ•΅οΈβ€β™‚οΈ

A research tool by the company found a vulnerability in the SQLite open source database, demonstrating the "defensive potential" for using LLMs to find vulnerabilities in applications before they're publicly released.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Name That Edge Toon: Aerialist's Choice πŸ•΅οΈβ€β™‚οΈ

Feeling creative? Submit your caption and our panel of experts will reward the winner with a 25 Amazon gift card.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Can Automatic Updates for Critical Infrastructure Be Trusted? πŸ•΅οΈβ€β™‚οΈ

The true measure of our cybersecurity prowess lies in our capacity to endure.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How AI Is Changing the Cloud Security and Risk Equation 🦿

Discover how AI amplifies cloud security risks and how to mitigate them, with insights from Tenables Liat Hayun on managing data sensitivity, misconfigurations, and overprivileged access.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  TOR Virtual Network Tunneling Tool 0.4.8.13 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with builtin privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers ISPs. This is the source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning πŸ–‹οΈ

Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence AI framework that could be exploited by a malicious actor to perform various actions, including denialofservice, model poisoning, and model theft. "Collectively, the vulnerabilities could allow an attacker to carry out a widerange of malicious actions with a single HTTP request, including.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Columbus Ransomware Attack Exposes Data of 500,000 Residents πŸ“”

The City of Columbus, Ohio, informed the Maine Attorney Generals Office that approximately 55 of its residents were affected by the breach.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Cybercriminals Exploit DocuSign APIs to Send Fake Invoices πŸ“”

Cybercriminals are exploiting DocuSign APIs to send fake invoices, bypassing security filters and mimicking wellknown brands.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Nigerian Handed 26-Year Sentence for Real Estate Phishing Scam πŸ“”

A US district court sentenced a Nigerian man for an elaborate maninthemiddle phishing campaign, which resulted in 12m in losses from realestate transactions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Researchers Claim First Vulnerability Found Using AI πŸ“”

The flaw, an exploitable stack buffer underflow in SQLite, was found by Googles Big Sleep team using a large language model LLM.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Says Russia Behind Fake Haitian Voters Video πŸ“”

US government agencies said the video, widely shared on social media, is part of Russias broader strategy of undermining the integrity of the Presidential Election.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… ICS Vulnerability Intelligence Report: Key Insights and Recommendations πŸ¦…

Overview Cyble Research Intelligence Labs CRIL has investigated key ICS vulnerabilities this week, providing critical insights issued by the Cybersecurity and Infrastructure Security Agency CISA, focusing on multiple flaws in several ICS products. During this reporting period, CISA issued four security advisories targeting vulnerabilities across various Industrial Control Systems, including those from ICONICS, Mitsubishi Electric, VIMESA, iniNet Solutions, and Deep Sea Electronics. These advisories pinpoint ICS vulnerabilities that security teams should prioritize for immediate patching to mitigate potential risks. The recent vulnerability assessment has revealed a highseverity path traversal vulnerability in SpiderControl SCADA. The Deep Sea Electronics DSE855 has also been ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Okta Fixes Auth Bypass Bug After 3-Month Lull πŸ•΅οΈβ€β™‚οΈ

The bug affected accounts with 52character user names, and had several preconditions that needed to be met in order to be exploited.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OWASP Beefs Up GenAI Security Guidance Amid Growing Deepfakes πŸ•΅οΈβ€β™‚οΈ

As businesses worry over deepfake scams and other AI attacks, organizations are adding guidance for cybersecurity teams on how to detect, and respond to, nextgeneration threats. That includes Exabeam, which was recently targeted by a deepfaked job candidate.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Software Makers Encouraged to Stop Using C/C++ by 2026 🦿

The Cybersecurity and Infrastructure Security Agency and Federal Bureau of Investigation assert that C, C, and other memoryunsafe languages contribute to potential security breaches.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ APT36 Refines Tools in Attacks on Indian Targets πŸ•΅οΈβ€β™‚οΈ

The Pakistanbased advanced persistent threat actor has been carrying on a cyberespionage campaign targeting organizations on the subcontinent for more than a decade, and it's now using a new and improved "ElizaRAT" malware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Iranian APT Group Targets IP Cameras, Extends Attacks Beyond Israel πŸ•΅οΈβ€β™‚οΈ

The Iranlinked group Emennet Pasargad aims to undermine public confidence in Israeli and Western nations by using hackandleak campaigns and disrupting government services, including elections.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages πŸ–‹οΈ

An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running crossplatform malware. The attack is notable for utilizing Ethereum smart contracts for commandandcontrol C2 server address distribution, according to independent findings from Checkmarx, Phylum, and Socket published over the past few.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Canadian Suspect Arrested Over Snowflake Data Breach and Extortion Attacks πŸ–‹οΈ

Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year. The individual in question, Alexander "Connor" Moucka aka Judische and Waifu, was apprehended on October 30, 2024, on the basis of a provisional arrest warrant, following a request by the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System πŸ–‹οΈ

Google has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild. The vulnerability, tracked as CVE202443093, has been described as a privilege escalation flaw in the Android Framework component that could result in unauthorized access to "Androiddata," "Androidobb," and "Androidsandbox" directories and its subdirectories,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Hackers Strike at Heart of Italian Government πŸ‘½

In a scenario reminiscent of a modernday Italian Job, hackers have allegedly breached Italys national security, exposing confidential data of some of the countrys most prominent political figures. At the heart of the controversy is Nunzio Samuele Calamucci, a 44yearold IT consultant operating from a modest office near Milans iconic.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2