πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.2K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime πŸ–‹οΈ

INTERPOL on Tuesday said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from April 1 to August 31, 2024, targeting phishing, ransomware, and information stealer infrastructure. "Of the approximately 30,000 suspicious IP addresses identified, 76 per cent were taken down and 59.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Cloud to Mandate Multifactor Authentication by 2025 πŸ“”

Google wants to ensure a smooth transition towards required MFA across all Google Cloud accounts with a phased rollout running throughout 2025.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Google Cloud will make MFA mandatory by the end of 2025 – here’s what you need to know πŸ“’

Admins and federated users will be required to use MFA to sign in by the end of 2025 in a move Google Cloud says will bolster cyber resilience.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Attackers Breach IT-Based Networks Before Jumping to ICS/OT Systems πŸ•΅οΈβ€β™‚οΈ

SANS recently published its 2024 State of ICS.OT Cybersecurity report, highlighting the skills of cyber professionals working in critical infrastructure, budget estimates, and emerging technologies. The report also looked at the most common types of attack vectors used against ICTOT networks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How to Outsmart Stealthy E-Crime and Nation-State Threats πŸ•΅οΈβ€β™‚οΈ

In a time of increasingly sophisticated crossdomain attacks, relying solely on automated solutions isn't enough.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 What Is a VPN? Definition, How It Works, and More 🦿

A VPN virtual private network encrypts your internet traffic and protects your online privacy. Find out how it works and why you should use it.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 What Telegram’s recent policy shift means for cyber crime 🧠

Since its launch in August 2013, Telegram has become the goto messaging app for privacyfocused users. To start using the app, users can sign up using either their real phone number or an anonymous number purchased from the Fragment blockchain marketplace. In the case of the latter, Telegram cannot be linked to the users real The post What Telegrams recent policy shift means for cyber crime appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps πŸ–‹οΈ

Cybersecurity researchers are warning that a commandandcontrol CC framework called Winos is being distributed within gamingrelated applications like installation tools, speed boosters, and optimization utilities. "Winos 4.0 is an advanced malicious framework that oers comprehensive functionality, a stable architecture, and efficient control over numerous online endpoints to execute.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 9 Steps to Get CTEM on Your 2025 Budgetary Radar πŸ–‹οΈ

Budget season is upon us, and everyone in your organization is vying for their slice of the pie. Every year, every department has a pet project that they present as absolutely essential to profitability, business continuity, and quite possibly the future of humanity itself. And no doubt that some of these actually may be mission critical. But as cybersecurity professionals, we understand that.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” IRISSCON: Organizations Still Falling Victim to Predictable Cyber-Attacks πŸ“”

Organizations remain unprepared to defend against known and predictable attacks like ransomware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Winos4.0 Malware Found in Game Apps, Targets Windows Users πŸ“”

Winos4.0 malware, derived from Gh0strat, targets Windows users via gamerelated applications, enabling remote control of affected systems.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Massive Nigerian Cybercrime Bust Sees 130 Arrested πŸ“”

The Nigerian police have arrested 113 foreign individuals and their 17 Nigerian collaborators for their alleged involvement in highlevel cybercrimes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Sales Director 🌊

The post Sales Director appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Google Fixes Critical Zero-Day Vulnerabilities in Latest Android Security Update πŸ¦…

Overview In its latest security bulletin, Google has patched two actively exploited zeroday vulnerabilities in Android, marking a crucial step toward protecting users from likely spyware attacks.  The November update addresses a total of 51 vulnerabilities, including a critical issue in Qualcomm components. Android users are strongly advised to install these updates to secure their devices against potential exploitation. Key Vulnerabilities in Focus CVE202443047 and CVE202443093 The two zerodaystracked as CVE202443047 and CVE202443093have been identified as exploited in targeted attacks. There are indications that the following may be under limited, targeted exploitation, Google said in its November Android Security Bulletin. These vulnerabilities have raised concerns du...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… GodFather Malware Expands Its Reach, Targeting 500 Banking And Crypto Applications Worldwide πŸ¦…

Key Takeaways Cyble Research and Intelligence Labs CRIL has identified a new variant of the GodFather malware, now targeting 500 banking and cryptocurrency apps. Initially focused on regions like the UK, US, Turkey, Spain, and Italy, GodFather has expanded its reach to include Japan, Singapore, Greece, and Azerbaijan. The GodFather malware has transitioned the Java code implementation to the Native code for its malicious activities. In its latest version, the GodFather malware uses limited permissions, relying heavily on Accessibility services to capture credentials from targeted applications. This updated variant also includes new commands that enable the malware to automate gestures on infected devices, mimicking user actions. The Threat ActorTA behind GodFather malwa...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cyber-Attack on Microlise Disrupts DHL and Serco Tracking Services πŸ“”

A cyberattack targeting telematics provider Microlise has disrupted tracking services for key clients like DHL and Serco.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese Gamers Targeted in Winos4.0 Framework Scam πŸ•΅οΈβ€β™‚οΈ

Campaigns like Silver Fox and Void Arachne are deploying the framework, using social media and messaging platforms to lure in victims.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ German Law Could Protect Researchers Reporting Vulns πŸ•΅οΈβ€β™‚οΈ

The draft amendment also includes prison time for those who access systems to maliciously spy or intercept data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds 🦿

AIenhanced malicious attacks are a top concern for 80 of executives, and for good reason, as there is a lot of evidence that bad actors are exploiting the technology.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Increasing Awareness of DNS Hijacking: A Growing Cyber Threat 🦿

Read more about DNS hijacking and how organizations can prevent it.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware πŸ–‹οΈ

An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi. "Leveraging Microsoft SaaS services including Teams, SharePoint, Quick Assist, and OneDrive the attacker exploited the trusted infrastructures of previously compromised organizations to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity