πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass πŸ–‹οΈ

Cybersecurity researchers have detailed a new adversaryinthemiddle AitM phishing kit that's capable of Microsoft 365 accounts with an aim to steal credentials and twofactor authentication 2FA codes since at least October 2024. The nascent phishing kit has been dubbed Sneaky 2FA by French cybersecurity company Sekoia, which detected it in the wild in December. Nearly 100 domains hosting.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs πŸ–‹οΈ

The U.S. Treasury Department's Office of Foreign Assets Control OFAC sanctioned two individuals and four entities for their alleged involvement in illicit revenue generation schemes for the Democratic People's Republic of Korea DPRK by dispatching IT workers around the world to obtain employment and draw a steady source of income for the regime in violation of international sanctions. "These.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Microsoft files suit against threat actors abusing AI services πŸ“’

Cyber criminals are accused of using stolen credentials for an illegal hacking as a service operation.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation πŸ–‹οΈ

Cybersecurity researchers have exposed a new campaign that targets web servers running PHPbased applications to promote gambling platforms in Indonesia. "Over the past two months, a significant volume of attacks from Pythonbased bots has been observed, suggesting a coordinated effort to exploit thousands of web apps," Imperva researcher Daniel Johnston said in an analysis. "These attacks.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ UEFI Secure Boot: Not so secure? πŸš€

A vulnerability affecting a UEFI application and discovered by ESET researchers could let malicious actors deploy malicious bootkits on vulnerable systems.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Star Blizzard Targets WhatsApp in New Campaign πŸ“”

Microsoft highlighted a new Star Blizzard campaign targeting WhatsApp accounts, as the group adapts its TTPs following the takedown of its infrastructure by law enforcement.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Weekly IT Vulnerability Report: Critical Updates for SAP, Microsoft, Fortinet, and Others πŸ¦…

Key vulnerabilities in SAP, Microsoft, Fortinet, and others demand immediate attention as threat actors exploit critical flaws. Overview Cyble Research and Intelligence Labs CRIL analyzed significant IT vulnerabilities disclosed between January 8 and 14, 2025. The Cybersecurity and Infrastructure Security Agency CISA added seven vulnerabilities to its Known Exploited Vulnerabilities KEV catalog. Microsoft released its January 2025 Patch Tuesday updates, addressing 159 vulnerabilities, including eight zerodays, three of which are under active exploitation. Other notable vulnerabilities this week are flaws in SAP NetWeaver Application Server and other highprofile products. CRILs monitoring of underground forums also revealed discussions on critical zeroday vulnerabilities an...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 How to calculate your AI-powered cybersecurity’s ROI 🧠

Imagine this scenario A sophisticated, malicious phishing campaign targets a large financial institution. The attackers use emails generated by artificial intelligence AI that closely mimic the companys internal communications. The emails contain malicious links designed to steal employee credentials, which the attackers could use to gain access to company assets and data for unknown purposes. The post How to calculate your AIpowered cybersecuritys ROI appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Leveraging Behavioral Insights to Counter LLM-Enabled Hacking πŸ•΅οΈβ€β™‚οΈ

As LLMs broaden access to hacking and diversify attack strategies, understanding the thought processes behind these innovations will be vital for bolstering IT defenses.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation πŸ–‹οΈ

Cybersecurity researchers have disclosed three security flaws in Planet Technology's WGS804HPT industrial switches that could be chained to achieve preauthentication remote code execution on susceptible devices. "These switches are widely used in building and home automation systems for a variety of networking applications," Claroty's Tomer Goldschmidt said in a Thursday report. "An attacker.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Lazarus Group Targets Developers in New Data Theft Campaign πŸ“”

SecurityScorecard identified a new campaign in which the North Korean Lazarus group aims to steal source code, secrets and cryptocurrency wallet keys from developer environments.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Supreme Court Gives Green Light to TikTok Ban πŸ“”

The Supreme Court has upheld a law that could potentially ban TikTok in the US.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 15K Fortinet Device Configs Leaked to the Dark Web πŸ•΅οΈβ€β™‚οΈ

The stolen firewall data is thorough but more than 2 years old now, meaning that most organizations following even basic security practices face minimal risk, hopefully.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ Has the TikTok Ban Already Backfired on US Cybersecurity? πŸ•΅οΈβ€β™‚οΈ

The Supreme Court has affirmed TikTok's ban in the US, which has its users in revolt and is creating a whole new set of national cybersecurity concerns.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Employees Enter Sensitive Data Into GenAI Prompts Far Too Often πŸ•΅οΈβ€β™‚οΈ

The propensity for users to enter customer data, source code, employee benefits information, financial data, and more into ChatGPT, Copilot, and others is racking up real risk for enterprises.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon πŸ–‹οΈ

The U.S. Treasury Department's Office of Foreign Assets Control OFAC has imposed sanctions against a Chinese cybersecurity company and a Shanghaibased cyber actor for their alleged links to the Salt Typhoon group and the recent compromise of the federal agency. "People's Republic of Chinalinked PRC malicious cyber actors continue to target U.S. government systems, including the recent.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025 πŸ–‹οΈ

Popular videosharing social network TikTok has officially gone dark in the United States, 2025, as a federal ban on the app comes into effect on January 19, 2025. "We regret that a U.S. law banning TikTok will take effect on January 19 and force us to make our services temporarily unavailable," the company said in a popup message. "We're working to restore our service in the U.S. as soon as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ–‹οΈ Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP πŸ–‹οΈ

Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index PyPI repository that come with capabilities to steal data and even delete sensitive data from infected systems. The list of identified packages is below asyncmutexmutex, a typosquat of asyncmute npm dexscreener, which masquerades as a library for accessing liquidity pool.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Data on Half a Million Hotel Guests Exposed After Otelier Breach πŸ“”

At least half a million accounts have been compromised after a breach at hotel management software firm Otelier.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Former CIA Analyst Pleads Guilty to Sharing Top Secret Files πŸ“”

CIA analysts Asif William Rahman has pleaded guilty to sharing classified documents about an Israeli attack.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ FCC orders telcos to sharpen up security after Salt Typhoon chaos πŸ“’

The move follows a devastating attack on US telecoms infrastructure.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity