πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 IVPN Review: Pricing, Features, Pros, and Cons 🦿

Read our IVPN review to uncover its strong security features and privacyfirst approach. Discover what sets it apart but are there hidden drawbacks?.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Mobile device security: Why protection is critical in the hybrid workforce 🧠

In our mobilefirstmobilelast world, many employees work days both start and end on a mobile device. Mobile devices are now essential tools for productivity and communication. As many organizations transition to hybrid work environments, mobile devices offer a rich target for malicious actors because they are often the least protected corporate devices and offer platforms The post Mobile device security Why protection is critical in the hybrid workforce appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Name That Edge Toon: Greetings and Salutations πŸ•΅οΈβ€β™‚οΈ

Feeling creative? Submit your caption and our panel of experts will reward the winner with a 25 gift card.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybercriminals Don't Care About National Cyber Policy πŸ•΅οΈβ€β™‚οΈ

We can't put defense on hold until Inauguration Day.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers πŸ–‹οΈ

Cybersecurity researchers have uncovered firmware security vulnerabilities in the Illumina iSeq 100 DNA sequencing instrument that, if successfully exploited, could permit attackers to brick or plant persistent malware on susceptible devices. "The Illumina iSeq 100 used a very outdated implementation of BIOS firmware using CSM Compatibility Support Mode mode and without Secure Boot or standard.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ PhishWP Plug-in Hijacks WordPress E-Commerce Checkouts πŸ•΅οΈβ€β™‚οΈ

The malware, found on a Russian cybercriminal site, impersonates ecommerce paymentprocessing services such as Stripe to steal user payment data from legitimate websites.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISA: Third-Party Data Breach Limited to Treasury Dept. πŸ•΅οΈβ€β™‚οΈ

The breach was carried out by exploiting CVE202412356 in BeyondTrust cybersecurity company, just last week.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Research Highlights Vulnerabilities in MLOps Platforms πŸ“”

New research by Security Intelligence has revealed security risks in MLOps platforms including Azure ML, BigML and Google Vertex AI.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Moxa Urges Immediate Updates for Security Vulnerabilities πŸ“”

Moxa has reported two critical vulnerabilities in its routers and network security appliances that could allow system compromise and arbitrary code execution.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Sharing of Telegram User Data Surged After CEO Arrest πŸ•΅οΈβ€β™‚οΈ

Until September 2024, the encrypted messaging service acceded to 14 requests for user data from the US that number jumped to 900 after its CEO was detained by French authorities in August.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Pentagon Adds Chinese Gaming Giant Tencent to Federal Ban πŸ•΅οΈβ€β™‚οΈ

The sprawling social media and gaming platform says that being considered a Chinese military business must be a mistake.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ A Day in the Life of a Prolific Voice Phishing Crew β™ŸοΈ

Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and Google to force a variety of outbound communications to their users, including emails, automated phone calls and systemlevel messages sent to all signedin devices.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Flags Critical Flaws in Mitel and Oracle Systems Amid Active Exploitation πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Tuesday added three flaws impacting Mitel MiCollab and Oracle WebLogic Server to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows CVE202441713 CVSS score 9.1 A path traversal vulnerability in Mitel MiCollab that could allow an attacker.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ Ransomware Targeting Infrastructure Hits Telecom Namibia πŸ•΅οΈβ€β™‚οΈ

The southern African telco is the latest entity on the continent to have its critical infrastructure hacked, and attackers release sensitive info online when Telecom Namibia refuses to negotiate.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fake Government Officials Use Remote Access Tools for Card Fraud πŸ“”

GroupIB has observed scammers impersonating government officials to trick disaffected consumers into divulging card details.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ US eyes 'Cyber Trust Mark' to lock down IoT frailties, but experts worry it doesn’t go far enough πŸ“’

The label is intended to build trust in internetconnected devices.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Top 5 Malware Threats to Prepare Against in 2025 πŸ–‹οΈ

2024 had its fair share of highprofile cyber attacks, with companies as big as Dell and TicketMaster falling victim to data breaches and other infrastructure compromises. In 2025, this trend will continue. So, to be prepared for any kind of malware attack, every organization needs to know its cyber enemy in advance. Here are 5 common malware families that you can start preparing to counter.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks πŸ–‹οΈ

A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting FourFaith industrial routers since early November 2024 with the goal of conducting distributed denialofservice DDoS attacks. The botnet maintains approximately 15,000 daily active IP addresses, with the infections primarily scattered across China, Iran, Russia, Turkey, and the United States.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ FCC Launches 'Cyber Trust Mark' for IoT Devices to Certify Security Compliance πŸ–‹οΈ

The U.S. government on Tuesday announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for InternetofThings IoT consumer devices. "IoT products can be susceptible to a range of security vulnerabilities," the U.S. Federal Communications Commission FCC said. "Under this program, qualifying consumer smart products that meet robust cybersecurity standards will bear.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ State-aligned APT groups are increasingly deploying ransomware – and that’s bad news for everyone πŸš€

The blurring of lines between cybercrime and statesponsored attacks underscores the increasingly fluid and multifaceted nature of todays cyberthreats.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Casio Admits Security Failings as Attackers Leak Employee and Customer Data πŸ“”

Electronics firm Casio revealed that ransomware attackers have leaked the personal data of employees, customers and business partners.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity