πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics πŸ–‹οΈ

The U.S. Treasury Department's Office of Foreign Assets Control OFAC on Tuesday leveled sanctions against two entities in Iran and Russia for their attempts to interfere with the November 2024 presidential election. The federal agency said the entities a subordinate organization of Iran's Islamic Revolutionary Guard Corps and a Moscowbased affiliate of Russia's Main Intelligence.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
🦿 What Is Patch Tuesday? Microsoft’s Monthly Update Explained 🦿

Patch Tuesday is Microsofts monthly update day for fixing vulnerabilities. Learn its purpose, benefits, and how it enhances system security.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New "DoubleClickjacking" Exploit Bypasses Clickjacking Protections on Major Websites πŸ–‹οΈ

Threat hunters have disclosed a new "widespread timingbased vulnerability class" that leverages a doubleclick sequence to facilitate clickjacking attacks and account takeovers in almost all major websites. The technique has been codenamed DoubleClickjacking by security researcher Paulos Yibelo. "Instead of relying on a single click, it takes advantage of a doubleclick sequence," Yibelo said.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT πŸ–‹οΈ

Cybersecurity researchers have discovered a malicious package on the npm package registry that masquerades as a library for detecting vulnerabilities in Ethereum smart contracts but, in reality, drops an opensource remote access trojan called Quasar RAT onto developer systems. The heavily obfuscated package, named ethereumvulncontracthandler, was published to npm on December 18, 2024, by a user.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Three Russian-German Nationals Charged with Espionage for Russian Secret Service πŸ–‹οΈ

German prosecutors have charged three RussianGerman nationals for acting as secret service agents for Russia. The individuals, named Dieter S., Alexander J., and Alex D., have been accused of working for a foreign secret service. Dieter S. is also alleged to have participated in sabotage operations as well as taking pictures of military installations with an aim to endanger national security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download 🦿

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Dozens of Chrome Browser Extensions Hijacked by Data Thieves πŸ“”

Over 2.5 million end users are at risk as researchers discover 36 compromised Chrome extensions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Treasury Computers Accessed by China in Supply Chain Attack πŸ“”

Chinese hackers appear to have compromised Treasury machines via a trusted third party.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Atos hits back at ransomware attack claims πŸ“’

The company says it has no evidence that systems have been compromised, but is investigating the report.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Chinese threat actors breached the US Treasury in β€˜major incident’ – here’s what you need to know πŸ“’

The attackers took control of Treasury Department workstations to access the office in charge of US economic sanctions, officials say.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them πŸ–‹οΈ

In the past year, crossdomain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple domains including endpoints, identity systems and cloud environments so the adversary can infiltrate organizations, move laterally and evade detection. eCrime groups like SCATTERED SPIDER and North Koreanexus adversaries such as FAMOUS.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Hackers Leak Rhode Island Citizens' Data on Dark Web πŸ“”

The State of Rhode Island has confirmed that cybercriminals have begun publishing data stolen from its social services portal, the RIBridges system.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ¦… CISA Adds CVE-2024-3393 to Vulnerabilities Catalog: Palo Alto Networks PAN-OS DNS Packet Flaw Threatens Firewalls πŸ¦…

Overview  The Cybersecurity and Infrastructure Security Agency CISA has added CVE20243393, a Palo Alto Networks PANOS Malformed DNS Packet vulnerability, to its Known Exploited Vulnerabilities KEV catalog. This vulnerability impacts the DNS Security feature of PANOS, which powers firewalls and security solutions. The vulnerability allows attackers to exploit the system through specially crafted DNS packets, leading to a denialofservice DoS condition, affecting the availability of essential firewall services.  On December 27, 2024, Palo Alto Networks reported a Denial of Service DoS vulnerability in the DNS Security feature of PANOS, specifically linked to the malformed DNS packet handling process. This issue, now documented as CVE20243393, has been added to the CISAs Known Exploit...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ 'Bad Likert Judge' Jailbreak Bypasses Guardrails of OpenAI, Other Top LLMs πŸ•΅οΈβ€β™‚οΈ

A novel technique to stump artificial intelligence AI textbased systems increases the likelihood of a successful cyberattack by 60.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Preparing for the future of data privacy 🧠

The focus on data privacy started to quickly shift beyond compliance in recent years and is expected to move even faster in the near future. Not surprisingly, the Thomson Reuters Risk Compliance Survey Report found that 82 of respondents cited data and cybersecurity concerns as their organizations greatest risk. However, the majority of organizations The post Preparing for the future of data privacy appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API πŸ–‹οΈ

Details have emerged about three nowpatched security vulnerabilities in Dynamics 365 and Power Apps Web API that could result in data exposure. The flaws, discovered by Melbournebased cybersecurity company Stratus Security, have been addressed as of May 2024. Two of the three shortcomings reside in Power Platform's OData Web API Filter, while the third vulnerability is rooted in the FetchXML.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” HIPAA Rules Update Proposed to Combat Healthcare Data Breaches πŸ“”

The US government has set out proposals to increase security obligations on healthcare providers to protect patient data amid surging cyberattacks in the sector.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Ukraine Takes Steps to Strengthen its Cybersecurity Framework with Policy Advancements and Strategic Initiatives πŸ¦…

Overview  Ukraine has taken significant steps to enhance its cybersecurity posture, introducing key updates to its Organizational and Technical Model OTM of Cybersecurity and implementing new standards for safeguarding critical infrastructure facilities CIF. These developments are part of the countrys broader Cybersecurity Strategy, aligning with global best practices and addressing evolving cyber threats.  Unified Cybersecurity Framework Inspired by NIST  The Cabinet of Ministers of Ukraine has approved amendments to the OTM of Cybersecurity, adopting a unified approach based on NIST's Cybersecurity Framework 2.0. The updated framework provides state bodies and critical infrastructure operators with a structured methodology for identifying, mitigating, and recovering from cyber...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Global Campaign Targets PlugX Malware with Innovative Portal πŸ“”

Sekoias innovative PlugX malware disinfection campaign removed active threats across ten countries.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New DoubleClickjacking Attack Bypasses Protections πŸ“”

DoubleClickjacking bypasses XFrameOptions and SameSite cookies in doubleclick sequences, exposing UI authentication flaws.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Volkswagen Breach Exposes Data of 800K EV Customers πŸ•΅οΈβ€β™‚οΈ

Ethical hacking group Chaos Computer Club uncovered exposed data of electrical vehicle owners across the company's VW, Audi, Seat, and Skoda brands.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1