πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions πŸ–‹οΈ

Ransomware isnt slowing downits getting smarter. Encryption, designed to keep our online lives secure, is now being weaponized by cybercriminals to hide malware, steal data, and avoid detection.The result? A 10.3 surge in encrypted attacks over the past year and some of the most shocking ransom payouts in history, including a 75 million ransom in 2024. Are you prepared to fight back? Join.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan πŸ–‹οΈ

Japan's National Police Agency NPA and National Center of Incident Readiness and Strategy for Cybersecurity NCSC accused a Chinalinked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting organizations, businesses, and individuals in the country since 2019. The primary objective of the attack campaign is to steal information related to Japan's national.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection πŸ–‹οΈ

Threat actors are attempting to take advantage of a recently disclosed security flaw impacting GFI KerioControl firewalls that, if successfully exploited, could allow malicious actors to achieve remote code execution RCE. The vulnerability in question, CVE202452875, refers to a carriage return line feed CRLF injection attack, paving the way for HTTP response splitting, which could then.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” EU Commission Liable for Breaching EU’s Own Data Protection Rules πŸ“”

A court has ruled the EU Commission infringed an individuals right to the protection of their personal data by transferring their details to the US.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Government Launches Β£1.9m Initiative to Boost UK’s Cyber Resilience πŸ“”

The UK government has pledged nearly 2m to 30 new Cyber Local projects designed to enhance cyber resilience.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 DevOps/SecOps 🌊

The post DevOpsSecOps appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… HexaLocker V2: Skuld Stealer Paving the Way prior to Encryption πŸ¦…

Key Takeaways HexaLocker was first discovered in mid2024, with version 2 introducing significant updates and enhanced functionalities. HexaLocker V2 includes a persistence mechanism that modifies registry keys to ensure continued execution after the affected system reboots. The updated version downloads Skuld Stealer, which extracts sensitive information from the victims system before encryption. Unlike its predecessor, HexaLocker V2 exfiltrates victim files before encrypting them, following the double extortion method of data theft and file encryption. HexaLocker V2 utilizes a combination of advanced encryption algorithms, including AESGCM for string encryption, Argon2 for key derivation, and ChaCha20 for file encryption. HexaLocker V2 replaces the TOXID communication me...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Lithuania’s New Cyber Command is a Strategic Step Towards National and NATO Cybersecurity Resilience πŸ¦…

Overview  On January 1, Lithuania marked a pivotal moment in its national defense strategy with the official launch of the Lithuanian Cyber Command LTCYBERCOM. Spearheaded by the Ministry of National Defence, this new military unit aims to enhance the country's cybersecurity posture while strengthening its collaboration with NATO and other international partners.  A New Era in Cyber Defense with Lithuanian Cyber Command  LTCYBERCOM is tasked with conducting cyberspace operations and managing strategic communications and information systems CIS. Its creation reflects Lithuanias recognition of the growing importance of cyberspace in modern warfare and national security. By consolidating cyber defense resources under one command, LTCYBERCOM ensures a unified and efficient approach ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Cybersecurity trends: IBM’s predictions for 2025 🧠

Cybersecurity concerns in 2024 can be summed up in two letters AI or five letters if you narrow it down to gen AI. Organizations are still in the early stages of understanding the risks and rewards of this technology. For all the good it can do to improve data protection, keep up with compliance regulations The post Cybersecurity trends IBMs predictions for 2025 appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption πŸ–‹οΈ

Cybersecurity researchers have uncovered a new, stealthier version of a macOSfocused informationstealing malware called Banshee Stealer. "Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple's XProtect," Check Point Research said in a new analysis shared with The Hacker News. "This development allows it to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New AI Challenges Will Test CISOs & Their Teams in 2025 πŸ•΅οΈβ€β™‚οΈ

CISOs need to recognize the new threats AI can present while also embracing AIpowered solutions to stay ahead of those threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 IPVanish VPN Review: Is It Really as Secure as Claimed? 🦿

Read our comprehensive review of IPVanish VPN. Discover its features, pricing, and more to determine if it meets your online security and privacy needs.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Japan Faces Prolonged Cyber-Attacks Linked to China’s MirrorFace πŸ“”

Cyberattacks by Chinalinked MirrorFace targeted Japans national security information in major campaigns operating since 2019.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” PowerSchool Reportedly Pays Ransom to Prevent Student Data Leak πŸ“”

A school district said that PowerSchool paid a ransom to prevent the attackers releasing data it accessed of students and teachers in North America.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ“” Fancy Product Designer Plugin Flaws Expose WordPress Sites πŸ“”

Critical Fancy Product Designer plugin flaws risk remote code execution and SQL injection attacks on WordPress sites.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 What’s Next for Open Source Software Security in 2025? 🦿

Hidden dependencies, social engineering attacks, and the complexity of foundation models can all contribute tothe insecure use of opensource software in 2025.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers πŸ–‹οΈ

Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a highseverity bug that an authenticated attacker could exploit to access sensitive data. "Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hacking Group 'Silk Typhoon' Linked to US Treasury Breach πŸ•΅οΈβ€β™‚οΈ

The attack used a stolen remote support SaaS API key to exfiltrate data from workstations in the Treasury Department's Office of Foreign Assets Control.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese APT Group Is Ransacking Japan's Secrets πŸ•΅οΈβ€β™‚οΈ

Since 2019, MirrorFace has been stealing information from myriad Japanese organizations to gain leverage over Japan in the event of hostilities between the two countries, experts said.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Banshee 2.0 Malware Steals Apple's Encryption to Hide on Macs πŸ•΅οΈβ€β™‚οΈ

The most recent iteration of the open source infostealer skates by antivirus programs on Macs, using an encryption mechanism stolen from Apple's own antivirus product.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Critical ICS Vulnerabilities Uncovered in Weekly Vulnerability Report πŸ¦…

Overview  This week's ICS vulnerability report sheds light on multiple flaws detected between January 01, 2025, to January 07, 2025. The report offers crucial insights into the cybersecurity challenges faced by organizations. It draws attention to the vulnerabilities identified by the Cybersecurity and Infrastructure Security Agency CISA, which has issued multiple advisories highlighting the risks that need urgent mitigation. CISA's latest advisories target two specific vulnerabilities affecting a wide range of ICS devices and systems. These advisories are crucial, given that vulnerabilities in ICS systems can have serious consequences for the safety and efficiency of critical infrastructure. In total, 27 vulnerabilities were reported, affecting products from vendors such as ABB a...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity