πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ¦… ICS Vulnerability Report: Hitachi Energy Network Management Flaw Scores a Perfect 10 πŸ¦…

Overview  Critical vulnerabilities in Hitachi Energy UNEM Network Management Systems were among the highlights in Cybles weekly Industrial Control System ICS Vulnerability Intelligence Report, which also examined flaws in products from Delta Electronics, Schneider Electric and other ICS vendors.  Cyble Research Intelligence Labs CRIL examined 16 vulnerabilities in the report for clients half of which affect Hitachi Energy FOXMANUN products based on ICS alerts by the Cybersecurity and Infrastructure Security Agency CISA between January 814.  Of the 16 vulnerabilities, two are critical, nine are high severity, and five are medium severity. They span Communication, Critical Manufacturing, Chemical, Energy, Wastewater Systems and Commercial Facilities, and could lead to operation...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Strategic Approaches to Threat Detection, Investigation & Response πŸ•΅οΈβ€β™‚οΈ

By staying vigilant, agile, and prepared, organizations can turn TDIR from a defensive strategy into a proactive enabler of security and operational excellence.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Middle Eastern Real Estate Fraud Grows with Online Listings πŸ“”

Middle East real estate scams are surging as fraudsters exploit online listings and bypassed due diligence checks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Trump’s Truth Social Users Targeted by Rampant Scams Online πŸ“”

Truth Social, launched by the Trump Media Technology Group in 2022, has become a hotspot for scams like phishing and investment fraud.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Biden Tightens Software Supply Chain Security Requirements Ahead of Trump Takeover πŸ“”

The US Presidents second cybersecurity Executive Order will impose stricter security standards on software providers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting πŸ–‹οΈ

The Russian threat actor known as Star Blizzard has been linked to a new spearphishing campaign that targets victims' WhatsApp accounts, signaling a departure from its longstanding tradecraft in a likely attempt to evade detection. "Star Blizzard's targets are most commonly related to government or diplomacy both incumbent and former position holders, defense policy or international relations.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Biden's Cybersecurity EO Leaves Trump a Comprehensive Blueprint for Defense πŸ•΅οΈβ€β™‚οΈ

New order mandates securing the federal software supply chain and communications networks, as well as deploying AI tools to protect critical infrastructure from cyberattacks but will the Trump administration follow through?.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FTC Orders GoDaddy to Fix Inadequate Security Practices πŸ•΅οΈβ€β™‚οΈ

The FTC claims that the Web hosting company's security failures led to several major breaches in the past few years.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Chinese Innovations Spawn Wave of Toll Phishing Via SMS β™ŸοΈ

Residents across the United States are being inundated with text messages purporting to come from toll road operators like EZPass, warning that recipients face fines if a delinquent toll fee remains unpaid. Researchers say the surge in SMS spam coincides with new features added to a popular commercial phishing kit sold in China that makes it simple to set up convincing lures spoofing toll road operators in multiple U.S. states.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Russian APT Phishes Kazakh Gov't for Strategic Intel πŸ•΅οΈβ€β™‚οΈ

A highly targeted cyberintelligence campaign adds fuel to the increasingly complex relationship between the two former Soviet states.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China πŸ–‹οΈ

Austrian privacy nonprofit None of Your Business noyb has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully transferring users' data to China. The advocacy group is seeking an immediate suspension of such transfers, stating the companies in question cannot shield user data.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ“” Noyb Files GDPR Complaints Against TikTok and Five Chinese Tech Giants πŸ“”

AliExpress, Shein, Temu, TikTok, WeChat and Xiaomi are accused of operating unlawful data transfers to China.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” DORA Takes Effect: Financial Firms Still Navigating Compliance Headwinds πŸ“”

The EUs DORA regulation is in effect as of January 17, with mixed evidence around compliance levels among financial firms.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Sliver Implant Targets German Entities with DLL Sideloading and Proxying Techniques πŸ¦…

Key Takeaways Cyble Research and Intelligence Labs CRIL has identified an ongoing cyberattack targeting organizations in Germany. The attack is initiated through a deceptive LNK file embedded within an archive. When executed by an unsuspecting user, this LNK file triggers cmd.exe to copy and run wksprt.exe, a legitimate executable. This executable sideloads a malicious DLL that employs DLL proxying, ensuring the host application continues to operate seamlessly while executing malicious shellcode in the background. The shellcode ultimately decrypts and executes the final payload Sliver, a wellknown opensource Red Teamadversary emulation framework. Once deployed, Sliver functions as an implant, enabling threat actors to establish communication with the compromised system and...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… AI Takes the Center Stage in Biden’s Landmark Cybersecurity Order πŸ¦…

Overview Outgoing U.S. President Joe Biden issued an order yesterday outlining measures to improve government cybersecurity. The lengthy order includes suggestions to improve cloud and software security by building requirements into the federal acquisition process. It also orders federal agencies to adopt a number of cybersecurity technologies and practices and takes a forwardthinking approach to AI. As the culmination of efforts that began nearly four years ago in response to the Colonial Pipeline ransomware attack, the order is also valuable as a lessons learned document from an Administration that has had much to deal with in four years of dramatic cybersecurity events. Cloud, Software Security Goals Bidens final cybersecurity plan is also ambitious in its implementatio...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? πŸ–‹οΈ

Recent data breaches have highlighted the critical need to improve guest WiFi infrastructure security in modern business environments. Organizations face increasing pressure to protect their networks while providing convenient access to visitors, contractors, temporary staff, and employees with BYOD. Implementing secure guest WiFi infrastructure has become essential for authenticating access,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass πŸ–‹οΈ

Cybersecurity researchers have detailed a new adversaryinthemiddle AitM phishing kit that's capable of Microsoft 365 accounts with an aim to steal credentials and twofactor authentication 2FA codes since at least October 2024. The nascent phishing kit has been dubbed Sneaky 2FA by French cybersecurity company Sekoia, which detected it in the wild in December. Nearly 100 domains hosting.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs πŸ–‹οΈ

The U.S. Treasury Department's Office of Foreign Assets Control OFAC sanctioned two individuals and four entities for their alleged involvement in illicit revenue generation schemes for the Democratic People's Republic of Korea DPRK by dispatching IT workers around the world to obtain employment and draw a steady source of income for the regime in violation of international sanctions. "These.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Microsoft files suit against threat actors abusing AI services πŸ“’

Cyber criminals are accused of using stolen credentials for an illegal hacking as a service operation.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation πŸ–‹οΈ

Cybersecurity researchers have exposed a new campaign that targets web servers running PHPbased applications to promote gambling platforms in Indonesia. "Over the past two months, a significant volume of attacks from Pythonbased bots has been observed, suggesting a coordinated effort to exploit thousands of web apps," Imperva researcher Daniel Johnston said in an analysis. "These attacks.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ UEFI Secure Boot: Not so secure? πŸš€

A vulnerability affecting a UEFI application and discovered by ESET researchers could let malicious actors deploy malicious bootkits on vulnerable systems.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity