πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” New PhishWP Plugin Enables Sophisticated Payment Page Scams πŸ“”

The PhishWP plugin enables scammers to create fake payment pages, stealing sensitive data via Telegram.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese Hackers Double Cyber-Attacks on Taiwan πŸ“”

Taiwans security service said government networks faced 2.4 million attacks in 2024, most of which are attributed to Chinese state actors.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Weekly Vulnerability Insights Report: Critical Vulnerabilities Highlighted from December 25-31, 2024 πŸ¦…

Overview This weeks vulnerability report sheds light on a broad range of critical vulnerabilities identified from December 25 to December 31, 2024. The report emphasizes several highseverity flaws that pose online threats to cybersecurity, including new additions to the CISA's Known Exploited Vulnerability KEV catalog. Among the most pressing vulnerabilities, one concerning Palo Alto Networks PANOS stands out. This vulnerability has been actively exploited by cybercriminals to compromise firewalls, forcing them to reboot and disrupting network security. The Cybersecurity and Infrastructure Security Agency CISA added this vulnerability to their KEV catalog, signifying its exploitation in the wild. Beyond this, CRIL also analyzed multiple highprofile vulnerabilities impacting DL...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Weekly Vulnerability Roundup: Highlights from SingCERT’s Security Bulletin πŸ¦…

Overview The Singapore Computer Emergency Response Team SingCERT has released its latest Security Bulletin, summarizing vulnerabilities reported in the past week from the National Institute of Standards and Technology NISTs National Vulnerability Database NVD. This bulletin provides essential insights for businesses and security professionals to mitigate risks associated with these vulnerabilities. The vulnerabilities have been categorized based on the Common Vulnerability Scoring System v3 CVSSv3 base scores, which assess their severity levels Critical CVSS score of 9.0 to 10.0 High CVSS score of 7.0 to 8.9 Medium CVSS score of 4.0 to 6.9 Low CVSS score of 0.1 to 3.9 None CVSS score of 0.0 Lets take a closer look at the critical vulnerabilities reported this wee...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ IoT's Regulatory Reckoning Is Overdue πŸ•΅οΈβ€β™‚οΈ

New security regulations are more than compliance hurdles they're opportunities to build better products, restore trust, and lead the next chapter of innovation.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ India Proposes Digital Data Rules with Tough Penalties and Cybersecurity Requirements πŸ–‹οΈ

The Indian government has published a draft version of the Digital Personal Data Protection DPDP Rules for public consultation. "Data fiduciaries must provide clear and accessible information about how personal data is processed, enabling informed consent," India's Press Information Bureau PIB said in a statement released Sunday. "Citizens are empowered with rights to demand data erasure,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Supply Chain Attack Targets Key Ethereum Development Tools πŸ“”

A new supply chain attack targets Ethereum tools, exploiting npm packages to steal sensitive data.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ EagerBee Backdoor Takes Flight Against Mideast ISPs, Government Targets πŸ•΅οΈβ€β™‚οΈ

The malware, operated by Chinabacked cyberattackers, has been significantly fortified with new evasive and postinfection capabilities.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ In Appreciation: Amit Yoran, Tenable CEO, Passes Away πŸ•΅οΈβ€β™‚οΈ

Cybersecurity industry visionary and renowned executive Amit Yoran has passed away after an almost oneyear battle with cancer.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ China's Salt Typhoon Adds Charter, Windstream to Telecom Victim List πŸ•΅οΈβ€β™‚οΈ

These latest attacks follow a long string of cyberattacks and breaches targeting US and global telecom and ISP companies.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FireScam Android Spyware Campaign Poses 'Significant Threat Worldwide' πŸ•΅οΈβ€β™‚οΈ

A fake Telegram Premium app delivers informationstealing malware, in a prime example of the rising threat of adversaries leveraging everyday applications, researchers say.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Moxa Alerts Users to High-Severity Vulnerabilities in Cellular and Secure Routers πŸ–‹οΈ

Taiwanbased Moxa has warned of two security vulnerabilities impacting its cellular routers, secure routers, and network security appliances that could allow privilege escalation and command execution. The list of vulnerabilities is as follows CVE20249138 CVSS 4.0 score 8.6 A hardcoded credentials vulnerability that could allow an authenticated user to escalate privileges and gain.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Claims Treasury Breach Did Not Impact Other Agencies πŸ“”

The US Cybersecurity and Infrastructure Security Agency claims a recent Chinalinked breach was confined to the Treasury.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities πŸ–‹οΈ

Internet service providers ISPs and governmental entities in the Middle East have been targeted using an updated variant of the EAGERBEE malware framework. The new variant of EAGERBEE aka Thumtais comes fitted with various components that allow the backdoor to deploy additional payloads, enumerate file systems, and execute commands shells, demonstrating a significant evolution. "The key.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA: No Wider Federal Impact from Treasury Cyber Attack, Investigation Ongoing πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Monday said there are no indications that the cyber attack targeting the Treasury Department impacted other federal agencies. The agency said it's working closely with the Treasury Department and BeyondTrust to get a better understanding of the breach and mitigate its impacts. "The security of federal systems and the data they.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ UN aviation body investigates potential data breach πŸ“’

The agency is acting on a hacker forum post which claimed 42,000 records had been stolen in a recent incident.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Farewell to the Fallen: The Cybersecurity Stars We Lost Last Year πŸ–‹οΈ

It's time once again to pay our respects to the oncefamous cybersecurity solutions whose usefulness died in the past year. The cybercriminal world collectively mourns the loss of these solutions and the easy access they provide to victim organizations. These solutions, though celebrated in their prime, succumbed to the twin forces of time and advancing threats. Much like a tribute to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Phishing Click Rates Triple in 2024 πŸ“”

Netskope observed a 190 growth in enterprise users clicking phishing links as attackers become more creative in delivering effective lures.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Government to Ban Creation of Explicit Deepfakes πŸ“”

The UK government is cracking down on the generation of sexually explicit deepfakes in a bid to protect women and girls.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… MyCERT Advisory Recommends Cybersecurity Practices for Water Systems πŸ¦…

Overview  The water sector is experiencing a rise in cyber threats, with critical infrastructure, including both IT and operational technology OT systems, becoming primary targets for malicious actors. These attacks, which exploit vulnerabilities in internetfacing OT systems and industrial control systems ICS, pose cybersecurity risks to public health, business continuity, and national security.   MyCERT, the Malaysian Computer Emergency Response Team, has issued MA1228.012025, an advisory aimed at raising awareness of cybersecurity risks in the water sector and providing recommendations to mitigation stratergies. While there have been no cyber incidents reported in Malaysia's water systems, the MyCERT advisory stresses the importance of vigilance and proactive defense strategies....

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Tenable Nessus Bug and LDAP RCE: What You Need to Know πŸ¦…

Overview  JoCERT has alerted the global cybersecurity community about two critical issues requiring urgent attention from IT professionals and system administrators. The first involves Tenable Nessus Agents, a widelyused vulnerability scanning tool, while the second concerns a critical vulnerability in Windows Lightweight Directory Access Protocol LDAP, potentially leading to remote code execution RCE. Both incidents emphasize the need for prompt action and a proactive approach to cybersecurity.  This blog will provide a detailed overview of the incidents, their impacts, and recommended resolution steps to help organizations mitigate potential risks.  Incident 1 Tenable Nessus Agent Outage  Incident Overview  On December 31, 2024, Tenable Nessus Agent versions 10.8.0 and 10....

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity