πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ The Path Toward Championing Diversity in Cybersecurity Education πŸ•΅οΈβ€β™‚οΈ

To build a truly inclusive and diverse cybersecurity workforce, we need a comprehensive approach beyond recruitment and retention.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Australian IT Sector Maintains Strong Employment Outlook for 2025 🦿

IT hiring intentions remain strong, though competition for jobs could be fierce.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Is the water safe? The state of critical infrastructure cybersecurity 🧠

On September 25, CISA issued a stark reminder that critical infrastructure remains a primary target for cyberattacks. Vulnerable systems in industrial sectors, including water utilities, continue to be exploited due to poor cyber hygiene practices. Using unsophisticated methods like bruteforce attacks and leveraging default passwords, threat actors have repeatedly managed to compromise operational technology OT The post Is the water safe? The state of critical infrastructure cybersecurity appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices πŸ–‹οΈ

Cybersecurity researchers have detailed a nowpatched security flaw impacting Monkey's Audio APE decoder on Samsung smartphones that could lead to code execution. The highseverity vulnerability, tracked as CVE202449415 CVSS score 8.1, affects Samsung devices running Android versions 12, 13, and 14. "Outofbounds write in libsaped.so prior to SMR Dec2024 Release 1 allows remote.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Cybercriminals Use Fake CrowdStrike Job Offers to Distribute Cryptominer πŸ“”

CrowdStrike warned it had observed a phishing campaign impersonating the firms recruitment process to lure victims into downloading cryptominer.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ China's UNC5337 Exploits a Critical Ivanti RCE Bug, Again πŸ•΅οΈβ€β™‚οΈ

New year, same story. Despite Ivanti's commitment to securebydesign principles, Chinese threat actors are exploiting its edge devices for the nth time.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Fake CrowdStrike 'Job Interviews' Become Latest Hacker Tactic πŸ•΅οΈβ€β™‚οΈ

Cybercriminals are luring victims into downloading the XMRig cryptomining malware via convincing emails, inviting them to schedule fake interviews using a malicious link.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Russia Carves Out Commercial Surveillance Success Globally πŸ•΅οΈβ€β™‚οΈ

Growing sales of the System for Operative Investigative Activities SORM, a Russian wiretapping platform, in Central Asia and Latin American suggests increasing risks for Western businesses.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
😱1
πŸ–‹οΈ DoJ Indicts Three Russians for Operating Crypto Mixers Used in Cybercrime Laundering πŸ–‹οΈ

The U.S. Department of Justice DoJ on Friday indicted three Russian nationals for their alleged involvement in operating the cryptocurrency mixing services Blender.io and Sinbad.io. Roman Vitalyevich Ostapenko and Alexander Evgenievich Oleynik were arrested on December 1, 2024, in coordination with the Netherlands' Financial Intelligence and Investigative Service, Finland's National Bureau of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation πŸ–‹οΈ

Microsoft has revealed that it's pursuing legal action against a "foreignbased threatactor group" for operating a hackingasaservice infrastructure to intentionally get around the safety controls of its generative artificial intelligence AI services and produce offensive and harmful content. The tech giant's Digital Crimes Unit DCU said it has observed the threat actors "develop.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
πŸ–‹οΈ WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables πŸ–‹οΈ

Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress ecommerce checkout pages by inserting malicious JavaScript code into a database table associated with the content management system CMS. "This credit card skimmer malware targeting WordPress websites silently injects malicious JavaScript into database entries to steal sensitive payment.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems πŸ–‹οΈ

No less than 4,000 unique web backdoors previously deployed by various threat actors have been hijacked by taking control of abandoned and expired infrastructure for as little as 20 per domain. Cybersecurity company watchTowr Labs said it pulled off the operation by registering over 40 domain names that the backdoors had been designed to use for commandandcontrol C2. In partnership with the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Three Russians Charged with Crypto Mixer Money Laundering πŸ“”

Three Russian men have been indicted on money laundering charges connected to cryptocurrency mixers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Telefonica Breach Hits 20,000 Employees and Exposes Jira Details πŸ“”

Telefonica has confirmed a breach of its internal ticketing system exposing more than 236,000 lines of customer data.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WEF Warns of Growing Cyber Inequity Amid Escalating Complexities in Cyberspace πŸ“”

A new WEF report highlighted growing disparities in the cyber capabilities of different types of organizations and regions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January] πŸ–‹οΈ

The cyber worlds been buzzing this week, and its all about staying ahead of the bad guys. From sneaky software bugs to advanced hacking tricks, the risks are real, but so are the ways to protect yourself. In this recap, well break down whats happening, why it matters, and what you can do to stay secure. Lets turn awareness into action and keep one step ahead.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ransomware on ESXi: The mechanization of virtualized attacks πŸ–‹οΈ

In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, with the average ransom demand skyrocketing to 5 million. With approximately 8,000 ESXi hosts exposed directly to the internet according to Shodan, the operational and business impact of these attacks is profound. Most of the Ransomware strands that are attacking ESXi servers nowadays, are variants of the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CyberSecurity Malaysia Flags Major Threats in Chrome and WordPress – Are You Safe? πŸ¦…

Google Chrome and WordPress users face highseverity security threats. CyberSecurity Malaysia advises immediate updates to prevent potential exploits and safeguard data. Overview CyberSecurity Malaysia has recently notified users of critical vulnerabilities in two widely used software platforms Google Chrome and the WordPress File Upload plugin. If exploited, these vulnerabilities could allow attackers to execute arbitrary code, escalate privileges, or cause disruptions. Security updates have been issued, and users are strongly advised to apply these updates immediately to protect their systems. This article provides an indepth look at these vulnerabilities, their potential impacts, affected products, and recommended mitigation actions. Google Chrome Security Update Goo...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Phishing campaign targets developers with fake CrowdStrike job offers πŸ“’

Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Ransomware Group Uses AI to Develop Nefarious Tools πŸ“”

Researchers at Check Point said FunkSec operators appear to use AI for malware development.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Bitwarden vs 1Password: Battle of the Best – Who Wins? 🦿

Bitwarden and 1Password are two of the top password managers. Find out which password manager is the best for you using this comprehensive comparison.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity