πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Trump Fires Cyber Safety Board Investigating Salt Typhoon Hackers πŸ•΅οΈβ€β™‚οΈ

In a letter sent today, the acting DHS secretary terminated membership to all advisory boards, including the Cyber Safety Review Board CSRB tasked with investigating statesponsored cyber threats against the US.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Email Bombing, 'Vishing' Tactics Abound in Microsoft 365 Attacks πŸ•΅οΈβ€β™‚οΈ

Sophos noted more than 15 attacks have been reported during the past three months.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ DONOT Group Deploys Malicious Android Apps in India πŸ•΅οΈβ€β™‚οΈ

The advanced persistent threat APT group is likely Indiabased and targeting individuals with connections to the country's intelligence community.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ HPE Investigates After Alleged Data Breach πŸ•΅οΈβ€β™‚οΈ

The company reports that it is not experiencing any operational issues within its business, so far.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Mirai Botnet Spinoffs Unleash Global Wave of DDoS Attacks πŸ•΅οΈβ€β™‚οΈ

Two separate campaigns are targeting flaws in various IoT devices globally, with the goal of compromising them and propagating malware worldwide.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 β€˜Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security 🦿

The phishingasaservice kit from Sneaky Log creates fake authentication pages to farm account information, including twofactor security codes.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Why maintaining data cleanliness is essential to cybersecurity 🧠

Data, in all its shapes and forms, is one of the most critical assets a business possesses. Not only does it provide organizations with critical information regarding their systems and processes, but it also fuels growth and enables better decisionmaking on all levels. However, like any other piece of company equipment, data can degrade over The post Why maintaining data cleanliness is essential to cybersecurity appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Mirai Malware Variant Targets AVTECH Cameras, Huawei Routers πŸ“”

MurdocBotnet used Mirai malware to exploit IoT vulnerabilities, targeting devices globally.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Device πŸ–‹οΈ

Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 Terabit per second Tbps distributed denialofservice DDoS attack, the largest ever attack to be reported to date. The UDP protocolbased attack took place on October 29, 2024, targeting one of its customers, an unnamed internet service provider ISP from Eastern Asia. The activity originated.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Mandatory MFA, Biometrics Make Headway in Middle East, Africa πŸ•΅οΈβ€β™‚οΈ

Despite lagging in technology adoption, African and Middle Eastern organizations are catching up, driven by smartphone acceptance and national identity systems.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack πŸ–‹οΈ

A previously undocumented Chinaaligned advanced persistent threat APT group named PlushDaemon has been linked to a supply chain attack targeting a South Korean virtual private network VPN provider in 2023, according to new findings from ESET. "The attackers replaced the legitimate installer with one that also deployed the group's signature implant that we have named SlowStepper a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products πŸ–‹οΈ

Oracle is urging customers to apply its January 2025 Critical Patch Update CPU to address 318 new security vulnerabilities spanning its products and services. The most severe of the flaws is a bug in the Oracle Agile Product Lifecycle Management PLM Framework CVE202521556, CVSS score 9.9 that could allow an attacker to seize control of susceptible instances. "Easily exploitable.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Cyble Finds Thousands of Security Vendor Credentials on Dark Web πŸ¦…

Overview Account credentials from some of the largest cybersecurity vendors can be found on the dark web, a result of the growing problem of infostealers, according to an analysis of Cyble threat intelligence data. The credentials available for as little as 10 in cybercrime marketplaces span internal accounts and customer access across web and cloud environments, including internal security company enterprise and development environments that could pose substantial risks. The accounts ideally would have been protected by multifactor authentication MFA, which would have made any attack more difficult. However, the leaked credentials underscore the importance of dark web monitoring as an early warning system for keeping such leaks from becoming much bigger cyberattacks. Leak...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Discover Hidden Browsing Threats: Free Risk Assessment for GenAI, Identity, Web, and SaaS Risks πŸ–‹οΈ

As GenAI tools and SaaS platforms become a staple component in the employee toolkit, the risks associated with data exposure, identity vulnerabilities, and unmonitored browsing behavior have skyrocketed. Forwardthinking security teams are looking for security controls and strategies to address these risks, but they do not always know which risks to prioritize. In some cases, they might have.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ President Trump Pardons Silk Road Creator Ross Ulbricht After 11 Years in Prison πŸ–‹οΈ

U.S. President Donald Trump on Tuesday granted a "full and unconditional pardon" to Ross Ulbricht, the creator of the infamous Silk Road drug marketplace, after spending 11 years behind bars. "I just called the mother of Ross William Ulbricht to let her know that in honor of her and the Libertarian Movement, which supported me so strongly, it was my pleasure to have just signed a full and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Account Compromise and Phishing Top Healthcare Security Incidents πŸ“”

Netwrix claims 84 of healthcare organizations detected a cyberattack in the past year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cloudflare Mitigates Record-Breaking 5.6Tbps DDoS Attack πŸ“”

Cloudflare warns of a surge in hypervolumetric DDoS after revealing it stopped a massive 5.6Tbps attack.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Australian Cyber Security Centre Targets Bulletproof Hosting Providers to Disrupt Cybercrime Networks πŸ¦…

Overview The Australian Cyber Security Centre ACSC has issued a detailed warning regarding Bulletproof Hosting Providers BPH. These illicit infrastructure services play a critical role in supporting cybercrime, allowing malicious actors to conduct their operations while remaining largely undetectable. The Australian governments growing efforts to combat cybercrime highlight the increasing difficulty for cybercriminals to maintain secure, resilient, and hidden infrastructures. BPH services are an integral part of the CybercrimeasaService CaaS ecosystem, which provides a range of tools and services enabling cybercriminals to carry out their attacks. From ransomware campaigns to data theft, cybercriminals rely on BPH providers to host illicit websites, deploy malware, and execute p...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ GDPR fines might’ve dipped last year, but don’t get complacent – personal liability risks are rising πŸ“’

A decrease in big GDPR fines doesnt mean its plane sailing for enterprises in 2025.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Major Cybersecurity Vendors' Credentials Found on Dark Web πŸ“”

Cyble has found thousands of security vendors' credentials on the dark web, likely pulled from infostealer logs.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Guardz launches new β€œUltimate Plan” for MSPs πŸ“’

The offering embeds SentinelOnes endpoint protection capabilities into Guardz unified detection and response platform.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity