πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ New AI Jailbreak Method 'Bad Likert Judge' Boosts Attack Success Rates by Over 60% πŸ–‹οΈ

Cybersecurity researchers have shed light on a new jailbreak technique that could be used to get past a large language model's LLM safety guardrails and produce potentially harmful or malicious responses. The multiturn aka manyshot attack strategy has been codenamed Bad Likert Judge by Palo Alto Networks Unit 42 researchers Yongzhe Huang, Yang Ji, Wenjun Hu, Jay Chen, Akshata Rao, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Atos Group Denies Space Bears' Ransomware Attack Claims πŸ“”

Atos Group has denied the ransomware group Space Bears' claims of compromising its database, calling the allegations unfounded.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Crypto Boss Extradited to Face $40bn Fraud Charges πŸ“”

Former Terraform CEO Do Hyeong Kwon is now in the US facing federal fraud charges.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” DDoS Disrupts Japanese Mobile Giant Docomo πŸ“”

Docomo has revealed a DDoS attack on Thursday took down key services.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Web3 Attacks Result in $2.3Bn in Cryptocurrency Losses πŸ“”

The amount of crypto stolen in the Web3 ecosystem rose by 31.6 compared to 2023, with phishing the most costly attack vector.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Cyble Research Reports Critical Vulnerabilities Exposing Routers, Firewalls, and Web Servers πŸ¦…

Overview  Cyble Research Intelligence Labs CRIL has released its latest Weekly Vulnerability Insights report, offering a detailed overview of the critical vulnerabilities discovered between December 25, 2024, and December 31, 2024. The report highlights key security threats and vulnerabilities, including the addition of a major exploit to the Cybersecurity and Infrastructure Security Agency CISA Known Exploited Vulnerabilities KEV catalog.  The identified vulnerabilities have exposed a range of systems to active exploitation, with attackers leveraging flaws to compromise routers, firewalls, and web servers. During the reporting period, CISA incorporated CVE20243393, a highseverity vulnerability in Palo Alto Networks PANOS, into its KEV catalog. This flaw, which affects the PANOS ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Sanctions Chinese Cybersecurity Firm for Global Botnet Attacks πŸ“”

The US government said that China based firm Integrity Technology Group provided infrastructure for Flax Typhoon to attack multiple US targets.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How To Use SCP (Secure Copy) With SSH Key Authentication 🦿

Here's how to use the secure copy command, in conjunction with ssh key authentication, for an even more secure means of copying files to your remote Linux servers.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Apple Offers $95M to Settle Siri Privacy Lawsuit πŸ•΅οΈβ€β™‚οΈ

The proposed settlement would amount to roughly 20 per Apple product that has Siri enabled, for each plaintiff.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Thousands of Buggy BeyondTrust Systems Remain Exposed πŸ•΅οΈβ€β™‚οΈ

Weeks after the critical vulnerability was reported and a hacking of the Treasury Department, nearly 9,000 BeyondTrust instances remain wide open to the Internet, researchers say.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New HIPAA Cybersecurity Rules Pull No Punches πŸ•΅οΈβ€β™‚οΈ

Healthcare organizations of all shapes and sizes will be held to a stricter standard of cybersecurity starting in 2025 with new proposed rules, but not all have the budget for it.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Treasury Dept. Sanctions Chinese Tech Vendor for Complicity πŸ•΅οΈβ€β™‚οΈ

Integrity Technology Group was found complicit with Flax Typhoon as part of a broader Chinese strategy to infiltrate the IT systems of US critical infrastructure.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns πŸ–‹οΈ

The U.S. Treasury Department's Office of Foreign Assets Control OFAC on Friday issued sanctions against a Beijingbased cybersecurity company known as Integrity Technology Group, Incorporated for orchestrating several cyber attacks against U.S. victims. These attacks have been publicly attributed to a Chinese statesponsored threat actor tracked as Flax Typhoon aka Ethereal Panda or.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps πŸ–‹οΈ

Cybersecurity researchers have flagged a new malware called PLAYFULGHOST that comes with a wide range of informationgathering features like keylogging, screen capture, audio capture, remote shell, and file transferexecution. The backdoor, according to Google's Managed Defense team, shares functional overlaps with a known remote administration tool referred to as Gh0st RAT, which had its source.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Nuclei Vulnerability Enabling Signature Bypass and Code Execution πŸ–‹οΈ

A highseverity security flaw has been disclosed in ProjectDiscovery's Nuclei, a widelyused opensource vulnerability scanner that, if successfully exploited, could allow attackers to bypass signature checks and potentially execute malicious code. Tracked as CVE202443405, it carries a CVSS score of 7.4 out of a maximum of 10.0. It impacts all versions of Nuclei later than 3.0.0. "The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Scammers Drain $500m from Crypto Wallets in a Year πŸ“”

Scam Sniffer claims that threat actors used wallet drainers to steal 494m from victims in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian-Speaking Attackers Target Ethereum Devs with Fake Hardhat npm Packages πŸ–‹οΈ

Cybersecurity researchers have revealed several malicious packages on the npm registry that have been found impersonating the Nomic Foundation's Hardhat tool in order to steal sensitive data from developer systems. "By exploiting trust in open source plugins, attackers have infiltrated these platforms through malicious npm packages, exfiltrating critical data such as private keys, mnemonics,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Infostealer Campaign Uses Discord Videogame Lure πŸ“”

Threat actors are tricking victims into downloading malware with the promise of testing a new videogame.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Fake CAPTCHA attacks surged in late 2024 – here’s what to look out for πŸ“’

CAPTCHA pages that trick users into executing malicious commands almost doubled in two months at the end of 2024.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ US sanctions Chinese tech firm that targets critical infrastructure πŸ“’

Integrity Technology Group has been linked to Flax Typhoon, a hacking group that has targeted US critical infrastructure and other organizations.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 5 Fastest VPNs for 2025 🦿

Looking for a VPN that delivers speed and security? Weve rounded up the best of the best take a look and see which ones perfect for you!.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2