๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
26K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ•ต๏ธโ€โ™‚๏ธ 15K Fortinet Device Configs Leaked to the Dark Web ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The stolen firewall data is thorough but more than 2 years old now, meaning that most organizations following even basic security practices face minimal risk, hopefully.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
โค1
๐Ÿ•ต๏ธโ€โ™‚๏ธ Has the TikTok Ban Already Backfired on US Cybersecurity? ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The Supreme Court has affirmed TikTok's ban in the US, which has its users in revolt and is creating a whole new set of national cybersecurity concerns.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ Employees Enter Sensitive Data Into GenAI Prompts Far Too Often ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The propensity for users to enter customer data, source code, employee benefits information, financial data, and more into ChatGPT, Copilot, and others is racking up real risk for enterprises.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ‘1
๐Ÿ–‹๏ธ U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon ๐Ÿ–‹๏ธ

The U.S. Treasury Department's Office of Foreign Assets Control OFAC has imposed sanctions against a Chinese cybersecurity company and a Shanghaibased cyber actor for their alleged links to the Salt Typhoon group and the recent compromise of the federal agency. "People's Republic of Chinalinked PRC malicious cyber actors continue to target U.S. government systems, including the recent.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025 ๐Ÿ–‹๏ธ

Popular videosharing social network TikTok has officially gone dark in the United States, 2025, as a federal ban on the app comes into effect on January 19, 2025. "We regret that a U.S. law banning TikTok will take effect on January 19 and force us to make our services temporarily unavailable," the company said in a popup message. "We're working to restore our service in the U.S. as soon as.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ‘3
๐Ÿ–‹๏ธ Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP ๐Ÿ–‹๏ธ

Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index PyPI repository that come with capabilities to steal data and even delete sensitive data from infected systems. The list of identified packages is below asyncmutexmutex, a typosquat of asyncmute npm dexscreener, which masquerades as a library for accessing liquidity pool.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ‘1
๐Ÿ“” Data on Half a Million Hotel Guests Exposed After Otelier Breach ๐Ÿ“”

At least half a million accounts have been compromised after a breach at hotel management software firm Otelier.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Former CIA Analyst Pleads Guilty to Sharing Top Secret Files ๐Ÿ“”

CIA analysts Asif William Rahman has pleaded guilty to sharing classified documents about an Israeli attack.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“ข FCC orders telcos to sharpen up security after Salt Typhoon chaos ๐Ÿ“ข

The move follows a devastating attack on US telecoms infrastructure.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ โšก THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January] ๐Ÿ–‹๏ธ

As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to fade. Recent cyber sanctions and intelligence moves show a reality where malware and fake news are used as tools in global politics. Every cyberattack now seems to have deeper political consequences. Governments are facing new, unpredictable threats that can't be fought with.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Product Walkthrough: How Satori Secures Sensitive Data From Production to AI ๐Ÿ–‹๏ธ

Every week seems to bring news of another data breach, and its no surprise why securing sensitive data has become harder than ever. And its not just because companies are dealing with orders of magnitude more data. Data flows and user roles are constantly shifting, and data is stored across multiple technologies and cloud environments. Not to mention, compliance requirements are only getting.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” US Sanctions Chinese Hackers for Treasury, Telecom Breaches ๐Ÿ“”

The US has issued sanctions against an individual and a company involved in recent highprofile compromises of government officials by Chinese stateaffiliated hackers.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ US Ban on Automotive Components Could Curb Supply Chain ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The US Department of Commerce will prohibit the import of components for connected vehicles from China or Russia, as the US continues to ban technology it sees as potential national security threats.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆฟ Private Internet Access VPN Review: How Good Is PIA VPN? ๐Ÿฆฟ

When it comes to privacy and security, PIA VPN is among the best. Discover its features, performance, pricing, and more with this indepth review.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Ukraine's State Registers Restored Following Cyber-Attack ๐Ÿ“”

The December 2024 cyberattack on the countrys state registers, was attributed to Russian military intelligence services.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆ… Cyble Sensors Detect Attacks on Check Point, Ivanti and More ๐Ÿฆ…

Cyble honeypots have detected vulnerability exploits on Check Point and Ivanti products, databases, CMS systems, and many other IT products. Overview Cyble honeypot sensors have detected new attacks on vulnerabilities in Check Point and Ivanti products, among dozens of other vulnerability exploits recently picked up by Cyble sensors. Cybles sensor intelligence reports to clients in the first two weeks of 2025 also highlighted new database and CMS attacks. Unpatched Linux systems and network and IoT devices remain popular targets for hackers looking to breach networks and add to botnets. The reports also examined new bruteforce attacks and phishing campaigns. Here are some of the highlights. Vulnerabilities Under Attack Here are some of the vulnerability exploits detect...

๐Ÿ“– Read more.

๐Ÿ”— Via "CYBLE"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“ข Global cyber attacks jumped 44% last year ๐Ÿ“ข

A new report from Check Point Software warns of new tactics from threat actors.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers ๐Ÿ–‹๏ธ

New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks. "Internet hosts that accept tunneling packets without verifying the sender's identity can be hijacked to perform anonymous attacks and provide access to their networks," Top10VPN said in a study, as part of a collaboration with KU Leuven professor.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection ๐Ÿ–‹๏ธ

The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targeted cyber attacks. The artifacts in question, named Tanzeem meaning "organization" in Urdu and Tanzeem Update, were spotted in October and December 2024 by cybersecurity company Cyfirma. The apps in question have been found to incorporate identical functions, barring minor modifications to the.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
โค1
๐Ÿ•ต๏ธโ€โ™‚๏ธ Name That Toon: Incentives ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Feeling creative? Have something to say about cybersecurity? Submit your caption and our panel of experts will reward the winner with a 25 gift card.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” HPE Launches Investigation After Hacker Claims Data Breach ๐Ÿ“”

HPE is investigating claims of data breach by hacker IntelBroker, who offered stolen files for sale.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ‘1