πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ¦… The Commonwealth Cyber Security Posture 2024: A Deep Dive into Australia’s Cyber Defense Measures πŸ¦…

Overview  The Australian Government has shared its latest report for commonwealth cyber security. The Commonwealth Cyber Security Posture in 2024 report provides an essential update on the measures and progress related to cyber security across Australian Government entities. Tabled before the Australian Parliament, the report is a key tool for understanding the implementation and effectiveness of cyber security protocols for the 202324 financial year. As part of the government's ongoing efforts to protect national security, public trust, and the economy, the Commonwealth Cyber Security Posture in 2024 highlights areas of improvement, challenges, and recommendations for enhancing Australia's cyber defenses. According to the report, the Australian Government consists of 1002 noncorp...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Expose NonEuclid RAT Using UAC Bypass and AMSI Evasion Techniques πŸ–‹οΈ

Cybersecurity researchers have shed light on a new remote access trojan called NonEuclid that allows bad actors to remotely control compromised Windows systems. "The NonEuclid remote access trojan RAT, developed in C, is a highly sophisticated malware offering unauthorised remote access with advanced evasion techniques," Cyfirma said in a technical analysis published last week. "It employs.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Scammers Exploit Microsoft 365 to Target PayPal Users πŸ“”

A new PayPal phishing scam used genuine money requests, bypassing security checks to deceive recipients.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Cloud threat report: Why have SaaS platforms on dark web marketplaces decreased? 🧠

IBMs XForce team recently released the latest edition of the Cloud Threat Landscape Report for 2024, providing a comprehensive outlook on the rise of cloud infrastructure adoption and its associated risks. One of the key takeaways of this years report was focused on the gradual decrease in SoftwareasaService SaaS platforms being mentioned across dark web The post Cloud threat report Why have SaaS platforms on dark web marketplaces decreased? appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Best Practices & Risks Considerations in LCNC and RPA Automation πŸ•΅οΈβ€β™‚οΈ

Lowcodenocode LCNC and robotic process automation RPA technologies allow companies to speed up development processes and reduce costs, but security is often overlooked. When this happens, the risks can outweigh the benefits.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Launches Cyber Trust Mark for IoT Devices πŸ“”

The voluntary Cyber Trust Mark labeling program will allow consumers to assess the cybersecurity of IoT devices when making purchasing decisions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Unconventional Cyberattacks Aim to Take Over PayPal Accounts πŸ•΅οΈβ€β™‚οΈ

Attackers are abusing a Microsoft 365 feature to send payment requests to users, tricking them into logging in to their accounts so attackers can seize control over them.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Docuseries Spotlights Hackers Who Shaped Cybersecurity πŸ•΅οΈβ€β™‚οΈ

"Where Warlocks Stay Up Late" project speaks to hackers who have played pivotal roles in shaping the field of cybersecurity. The video interviews are complemented by an encyclopedia and an anthropological map.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 US to Launch Cyber Trust Mark to Label Secure Smart Devices 🦿

The Cyber Trust Mark shows which devices meet FCC security standards.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections πŸ–‹οΈ

Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns. Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious. While there are safeguards such as DomainKeys.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Fed 'Cyber Trust' Label: Good Intentions That Fall Short πŸ•΅οΈβ€β™‚οΈ

The voluntary program is intended to boost consumer confidence in vulnerable IoT devices, but experts want to see vendors held to a higher standard.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Green Bay Packers' Online Pro Shop Sacked by Payment Skimmer πŸ•΅οΈβ€β™‚οΈ

Cyberattackers injected the NFL Wild Card team's online Pro Shop with malicious code to steal creditcard data from 8,500 fans.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ India Readies Overhauled National Data Privacy Rules πŸ•΅οΈβ€β™‚οΈ

The country awaits implementation guidelines for a framework that gives Indians greater autonomy and security over their personal data and recognizes a right to personal privacy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure πŸ–‹οΈ

Ivanti is warning that a critical security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways has come under active exploitation in the wild beginning midDecember 2024. The security vulnerability in question is CVE20250282 CVSS score 9.0, a stackbased buffer overflow that affects Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure πŸ–‹οΈ

Ivanti is warning that a critical security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways has come under active exploitation in the wild beginning midDecember 2024. The security vulnerability in question is CVE20250282 CVSS score 9.0, a stackbased buffer overflow that affects Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ E.U. Commission Fined for Transferring User Data to Meta in Violation of Privacy Laws πŸ–‹οΈ

The European General Court on Wednesday fined the European Commission, the primary executive arm of the European Union responsible for proposing and enforcing laws for member states, for violating the bloc's own data privacy regulations. The development marks the first time the Commission has been held liable for infringing stringent data protection laws in the region. The court determined that.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Green Bay Packers Pro Shop Data Breach Compromises Customers πŸ“”

The Green Bay Packers disclosed on Monday that their official online store was breached and customer information stolen.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Critical Ivanti Zero-Day Exploited in the Wild πŸ“”

Ivanti customers are urged to patch two new bugs in the security vendor's products, one of which is being actively exploited.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ UK cyber experts on red alert after Salt Typhoon attacks on US telcos πŸ“’

The UK could be next in a spate of statesponsored attacks on telecoms infrastructure.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ China cyber threats: What businesses can do to protect themselves πŸ“’

As attacks from the likes of Salt Typhoon escalate, business leaders must take a proactive approach to improving their cyber capabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ "Thinly spread": Questions raised over UK government’s latest cyber funding scheme πŸ“’

The funding will go towards bolstering cyber skills, though some industry experts have questioned the size of the price tag.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity