πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.2K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🌊 HR Manager 🌊

The post HR Manager appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers πŸ–‹οΈ

Meta has been fined 21.62 billion won 15.67 million by South Korea's data privacy watchdog for illegally collecting sensitive personal information from Facebook users, including data about their political views and sexual orientation, and sharing it with advertisers without their consent. The country's Personal Information Protection Commission PIPC said Meta gathered information such as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users πŸ–‹οΈ

Google's cloud division has announced that it will enforce mandatory multifactor authentication MFA for all users by the end of 2025 as part of its efforts to improve account security. "We will be implementing mandatory MFA for Google Cloud in a phased approach that will roll out to all users worldwide during 2025," Mayank Upadhyay, vice president of engineering and distinguished engineer at.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Singtel Hack Highlights Rising Threat of Chinese Cyber Attacks on Global Telecoms πŸ‘½

In a stark warning for global telecommunications infrastructure, Singtel, Singapores largest mobile carrier, was reportedly targeted by Chinese statesponsored hackers this past summer. The breach, which involved a group known as Volt Typhoon, was detected in June and aligns with a broader pattern of Chinese attacks on telecommunications and critical.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Snowflake Hacking Suspect Arrested in Canada πŸ“”

A man suspected of breaching hundreds of Snowflake accounts has been arrested.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Global Operation Takes Down 22,000 Malicious IPs πŸ“”

Interpol claims an international policing operation has shuttered 22,000 IPs connected with cybercrime.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime πŸ–‹οΈ

INTERPOL on Tuesday said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from April 1 to August 31, 2024, targeting phishing, ransomware, and information stealer infrastructure. "Of the approximately 30,000 suspicious IP addresses identified, 76 per cent were taken down and 59.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Cloud to Mandate Multifactor Authentication by 2025 πŸ“”

Google wants to ensure a smooth transition towards required MFA across all Google Cloud accounts with a phased rollout running throughout 2025.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Google Cloud will make MFA mandatory by the end of 2025 – here’s what you need to know πŸ“’

Admins and federated users will be required to use MFA to sign in by the end of 2025 in a move Google Cloud says will bolster cyber resilience.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Attackers Breach IT-Based Networks Before Jumping to ICS/OT Systems πŸ•΅οΈβ€β™‚οΈ

SANS recently published its 2024 State of ICS.OT Cybersecurity report, highlighting the skills of cyber professionals working in critical infrastructure, budget estimates, and emerging technologies. The report also looked at the most common types of attack vectors used against ICTOT networks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How to Outsmart Stealthy E-Crime and Nation-State Threats πŸ•΅οΈβ€β™‚οΈ

In a time of increasingly sophisticated crossdomain attacks, relying solely on automated solutions isn't enough.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 What Is a VPN? Definition, How It Works, and More 🦿

A VPN virtual private network encrypts your internet traffic and protects your online privacy. Find out how it works and why you should use it.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 What Telegram’s recent policy shift means for cyber crime 🧠

Since its launch in August 2013, Telegram has become the goto messaging app for privacyfocused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain marketplace. In the case of the latter, Telegram cannot be linked to the users real The post What Telegrams recent policy shift means for cyber crime appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps πŸ–‹οΈ

Cybersecurity researchers are warning that a commandandcontrol CC framework called Winos is being distributed within gamingrelated applications like installation tools, speed boosters, and optimization utilities. "Winos 4.0 is an advanced malicious framework that oers comprehensive functionality, a stable architecture, and efficient control over numerous online endpoints to execute.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 9 Steps to Get CTEM on Your 2025 Budgetary Radar πŸ–‹οΈ

Budget season is upon us, and everyone in your organization is vying for their slice of the pie. Every year, every department has a pet project that they present as absolutely essential to profitability, business continuity, and quite possibly the future of humanity itself. And no doubt that some of these actually may be mission critical. But as cybersecurity professionals, we understand that.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” IRISSCON: Organizations Still Falling Victim to Predictable Cyber-Attacks πŸ“”

Organizations remain unprepared to defend against known and predictable attacks like ransomware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Winos4.0 Malware Found in Game Apps, Targets Windows Users πŸ“”

Winos4.0 malware, derived from Gh0strat, targets Windows users via gamerelated applications, enabling remote control of affected systems.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Massive Nigerian Cybercrime Bust Sees 130 Arrested πŸ“”

The Nigerian police have arrested 113 foreign individuals and their 17 Nigerian collaborators for their alleged involvement in highlevel cybercrimes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Sales Director 🌊

The post Sales Director appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Google Fixes Critical Zero-Day Vulnerabilities in Latest Android Security Update πŸ¦…

Overview In its latest security bulletin, Google has patched two actively exploited zeroday vulnerabilities in Android, marking a crucial step toward protecting users from likely spyware attacks.  The November update addresses a total of 51 vulnerabilities, including a critical issue in Qualcomm components. Android users are strongly advised to install these updates to secure their devices against potential exploitation. Key Vulnerabilities in Focus CVE202443047 and CVE202443093 The two zerodaystracked as CVE202443047 and CVE202443093have been identified as exploited in targeted attacks. There are indications that the following may be under limited, targeted exploitation, Google said in its November Android Security Bulletin. These vulnerabilities have raised concerns du...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… GodFather Malware Expands Its Reach, Targeting 500 Banking And Crypto Applications Worldwide πŸ¦…

Key Takeaways Cyble Research and Intelligence Labs CRIL has identified a new variant of the GodFather malware, now targeting 500 banking and cryptocurrency apps. Initially focused on regions like the UK, US, Turkey, Spain, and Italy, GodFather has expanded its reach to include Japan, Singapore, Greece, and Azerbaijan. The GodFather malware has transitioned the Java code implementation to the Native code for its malicious activities. In its latest version, the GodFather malware uses limited permissions, relying heavily on Accessibility services to capture credentials from targeted applications. This updated variant also includes new commands that enable the malware to automate gestures on infected devices, mimicking user actions. The Threat ActorTA behind GodFather malwa...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity