πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Emerging Threats & Vulnerabilities to Prepare for in 2025 πŸ•΅οΈβ€β™‚οΈ

From zeroday exploits to 5G network vulnerabilities, these are the threats that are expected to persist over the next 12 months.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Brazilian Hacker Charged for Extorting $3.2M in Bitcoin After Breaching 300,000 Accounts πŸ–‹οΈ

A Brazilian citizen has been charged in the United States for allegedly threatening to release data stolen by hacking into a company's network in March 2020. Junior Barros De Oliveira, 29, of Curitiba, Brazil has been charged with four counts of extortionate threats involving information obtained from protected computers and four counts of threatening communications, the U.S. Department of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… NCSC Implements Key Improvements Following IPAC Review of Cyber Threats πŸ¦…

Overview The New Zealands Government Communications Security Bureau GCSB, through its National Cyber Security Centre NCSC, has implemented a series of measures to strengthen the countrys defenses against malicious cyber activity. This follows a thorough review of practices concerning cyberattacks targeting members of the InterParliamentary Alliance on China IPAC, an organization committed to addressing the growing influence of Chinas policies on global security and governance. The review was initiated in May 2024 by Lisa Fong, the Deputy DirectorGeneral of Cyber Security at GCSB. Fong recognized a need for improvement after concerns arose over how the NCSC responded to a cyber incident involving IPAC members. These concerns were particularly focused on the NCSC's handling of r...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… Must-Read Cyble Research Reports of 2024: Trends and Key Takeaways πŸ¦…

Of the many reports created by Cybles talented team of threat researchers this year, seven stand out for their unique and comprehensive insight into the contemporary threat landscape. Well examine some of the key takeaways from the reports, including the changing nature of cyber threats and some surprising solutions readers may not have considered. Here, then, are insights from seven key Cyble research reports from 2024 that you shouldnt miss, from broad trends to sectorspecific threats that affect us all. Brand Impersonation and Counterfeit Products ECommerce and Brand Monitoring examines the underappreciated risks of counterfeit products and brand impersonation. It includes statistics and case studies that should disturb companies and consumers alike. Two data points u...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Palo Alto Releases Patch for PAN-OS DoS Flaw β€” Update Immediately πŸ–‹οΈ

Palo Alto Networks has disclosed a highseverity vulnerability impacting PANOS software that could cause a denialofservice DoS condition on susceptible devices. The flaw, tracked as CVE20243393 CVSS score 8.7, impacts PANOS versions 10.X and 11.X, as well as Prisma Access running PANOS versions. It has been addressed in PANOS 10.1.14h8, PANOS 10.2.10h12, PANOS 11.1.5, PANOS.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks πŸ–‹οΈ

Cybersecurity researchers are warning about a spike in malicious activity that involves roping vulnerable DLink routers into two different botnets, a Mirai variant dubbed FICORA and a Kaiten aka Tsunami variant called CAPSAICIN. "These botnets are frequently spread through documented DLink vulnerabilities that allow remote attackers to execute malicious commands via a GetDeviceSettings.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apache MINA CVE-2024-52046: CVSS 10.0 Flaw Enables RCE via Unsafe Serialization πŸ–‹οΈ

The Apache Software Foundation ASF has released patches to address a maximum severity vulnerability in the MINA Java network application framework that could result in remote code execution under specific conditions. Tracked as CVE202452046, the vulnerability carries a CVSS score of 10.0. It affects versions 2.0.X, 2.1.X, and 2.2.X. "The ObjectSerializationDecoder in Apache MINA uses Java's.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The biggest cyber scares of 2024 πŸ“’

Cyber criminals have ramped up attacks in 2024 here's the lowdown on the biggest breaches we've seen this year.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… China Accuses the U.S. of Hacking Back as Cyber Conflict Grows πŸ¦…

Overview U.S. national security and cybersecurity agencies have leveled cyber espionage accusations against the Peoples Republic of China PRC for much of 2024, accusing the PRC of infiltrating U.S. critical infrastructure and telecom networks possibly in preparation for a potential cyber war between the two global powers.  China has pushed back, calling such charges misinformation and accusing the U.S. of its own espionage campaigns. While the PRCs claims merit skepticism most notably that alleged Volt Typhoon activities have been U.S. misinformation or false flag operations new claims by China that two recent sophisticated cyberattacks were carried out by the U.S. are worth examining if only for the details and security insights they provide.  Well examine those claims alon...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Found in Russia πŸ–‹οΈ

The threat actor known as Cloud Atlas has been observed using a previously undocumented malware called VBCloud as part of its cyber attack campaigns targeting "several dozen users" in 2024. "Victims get infected via phishing emails containing a malicious document that exploits a vulnerability in the formula editor CVE20180802 to download and execute malware code," Kaspersky researcher Oleg.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA's 2024 Review Highlights Major Efforts in Cybersecurity Industry Collaboration πŸ“”

The US Cybersecurity and Infrastructure Security Agencys 2024 Year in Review marks Jen Easterlys final report before resignation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Russia, Ukraine, China, and More: The Nations at the Center of the Cybercrime Epidemic πŸ¦…

Overview Cyberattacks on a countrys critical infrastructure have become a growing malicious trend globally. The surge in cybercrime threats and its growing impact on national security, businesses, and individuals has led experts to closely examine which regions face the most cyberattacks.   A recent study from the World Cybercrime Index WCI compiled by an international team of researchers, shed light on the most targeted countries, ranking them based on the severity of cyberattacks, the skill of the perpetrators, and the professionalism of the cybercriminals involved.  As of 2024, these countries face the highest levels of cybercrime threats, driven by a complex mix of geopolitical factors, technological infrastructure, and economic conditions. This blog explores the top 10 coun...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hackers Are Hot for Water Utilities πŸ•΅οΈβ€β™‚οΈ

The US water sector suffered a stream of cyberattacks over the past year and half, from a mix of cybercriminals, hacktivists, and nationstate hacking teams. Here's how the industry and ICSOT security experts are working to better secure vulnerable drinking and wastewater utilities.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Defining & Defying Cybersecurity Staff Burnout πŸ•΅οΈβ€β™‚οΈ

Sometimes it feels like burnout is an inevitable part of working in cybersecurity. But a little bit of knowledge can help you and your staff stay healthy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Quantum Computing Advances in 2024 Put Security In Spotlight πŸ•΅οΈβ€β™‚οΈ

The work on quantum computing hit some major milestones in 2024, making the path to a workable quantum computer seem closer than ever. Google, Microsoft, and other research efforts hit significant milestones this year, but is the cybersecurity world ready?.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🧠 CISA’s cyber incident reporting portal: Progress and future plans 🧠

On August 29, 2024, CISA announced the launch of a new cyberincident Reporting Portal, part of the new CISA Services Portal. The Incident Reporting Portal enables entities and individuals reporting cyber incidents to create unique accounts, save reports and return to submit later, and eliminate the repetitive nature of inputting routine information such as contact The post CISAs cyber incident reporting portal Progress and future plans appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Deepfakes, Quantum Attacks Loom Over APAC in 2025 πŸ•΅οΈβ€β™‚οΈ

Organizations in the region should expect to see threat actors accelerate their use of AI tools and mount ongoing "harvest now, decrypt later" attacks for various malicious use cases.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign πŸ–‹οΈ

North Korean threat actors behind the ongoing Contagious Interview campaign have been observed dropping a new JavaScript malware called OtterCookie. Contagious Interview aka DeceptiveDevelopment refers to a persistent attack campaign that employs social engineering lures, with the hacking crew often posing as recruiters to trick individuals looking for potential job opportunities into.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials πŸ–‹οΈ

A highseverity flaw impacting select FourFaith routers has come under active exploitation in the wild, according to new findings from VulnCheck. The vulnerability, tracked as CVE202412856 CVSS score 7.2, has been described as an operating system OS command injection bug affecting router models F3x24 and F3x36. The severity of the shortcoming is lower due to the fact that it only works.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft πŸ–‹οΈ

A new attack campaign has targeted known Chrome browser extensions, leading to at least 16 extensions being compromised and exposing over 600,000 users to data exposure and credential theft. The attack targeted publishers of browser extensions on the Chrome Web Store via a phishing campaign and used their access permissions to insert malicious code into legitimate extensions in order to steal.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Happy 15th Anniversary, KrebsOnSecurity! β™ŸοΈ

KrebsOnSecurity.com turns 15 years old today! Maybe it's indelicate to celebrate the birthday of a cybercrime blog that mostly publishes bad news, but happily many of 2024's most engrossing security stories were about bad things happening to bad guys. It's also an occasion to note that despite my publishing fewer stories than ever this past year, we somehow managed to attract near record levels of readership thank you!.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity