πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ AI SOC Analysts: Propelling SecOps into the future πŸ–‹οΈ

Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up with everincreasing alert volumes and complexity, modernizing SOC automation strategies with AI has emerged as a critical solution. This blog explores how an AI SOC Analyst transforms alert management, addressing key SOC challenges while enabling faster investigations and responses. Security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations πŸ–‹οΈ

Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to commandandcontrol C2 infrastructure and stay under the radar. "ESXi appliances, which are unmonitored, are increasingly exploited as a persistence mechanism and gateway to access corporate networks widely," Sygnia.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How Long Does It Take Hackers to Crack Modern Hashing Algorithms? πŸ–‹οΈ

While passwords remain the first line of defense for protecting user accounts against unauthorized access, the methods for creating strong passwords and protecting them are continually evolving. For example, NIST password recommendations are now prioritizing password length over complexity. Hashing, however, remains a nonnegotiable. Even long secure passphrases should be hashed to prevent them.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks πŸ–‹οΈ

DeepSeek, the Chinese AI startup that has captured much of the artificial intelligence AI buzz in recent days, said it's restricting registrations on the service, citing malicious attacks. "Due to largescale malicious attacks on DeepSeek's services, we are temporarily limiting registrations to ensure continued service," the company said in an incident report page. "Existing users can log in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia’s Key Ministries πŸ–‹οΈ

The Council of the European Union has sanctioned three individuals for allegedly carrying out "malicious cyber activities" against Estonia. The three Russian nationals Nikolay Alexandrovich Korchagin, Vitaly Shevchenko, and Yuriy Fedorovich Denisov are officers of the General Staff of the Armed Forces of the Russian Federation GRU Unit 29155, it said. Per the council decision, all the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” EU Sanctions Three Russians For 2020 Cyber-Attack on Estonia πŸ“”

The three Russian hackers are believed to be part of Unit 29155 of the GRU, also known as Cadet Blizzard, Ember Bear and Ruinous Ursa.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” British Vishing-as-a-Service Trio Sentenced πŸ“”

Three men have been sentenced after pleading guilty to running an account hijacking service for fraudsters.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Critical Vulnerabilities in Node.js Expose Systems to Remote Attacks πŸ¦…

Overview A series of critical security vulnerabilities have been discovered in multiple versions of Node.js, a popular opensource JavaScript runtime used to build scalable network applications. These vulnerabilities, outlined in CERTIn Vulnerability Note CIVN20250011, have been classified as high severity, with the potential to compromise sensitive information, disrupt services, and even execute arbitrary code. Users of Node.js, including developers and organizations relying on this platform, are urged to take immediate action to secure their systems. The vulnerabilities affect several versions of Node.js, including both longterm support LTS and current releases. Affected versions include Node.js v18.x, v20.x, v22.x, and the latest v23.x. The flaws stem from various issues, incl...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… phpMyAdmin 5.2.2 Addresses Critical XSS and Library Vulnerabilities πŸ¦…

Overview phpMyAdmin, a popular webbased tool for managing MySQL and MariaDB databases, has recently released version 5.2.2, addressing multiple vulnerabilities that posed a medium severity risk. This widelyused tool is a basis for database administrators, offering strong features and ease of use. However, the vulnerabilities discovered could potentially expose users to risks such as unauthorized actions, session hijacking, and data theft. The update resolves two crosssite scripting XSS vulnerabilities CVE202524530 and CVE202524529 and a potential issue in the glibciconv library CVE20242961. These vulnerabilities underline the importance of staying up to date with security patches to safeguard sensitive data and ensure secure database management. According to the advisory Re...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Mega Data Breaches Push US Victim Count to 1.7 Billion πŸ“”

The number of data breach victims increased 312 annually to exceed 1.7 billion in 2024, according to the ITRC 2024 Annual Data Breach Report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How to Use 1Password: A Guide for Beginners 🦿

Learn how to use 1Password to securely store and manage your passwords. This stepbystep guide will help you get started.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” API Supply Chain Attacks Put Millions of Airline Users at Risk πŸ“”

An API supplychain attack affecting a popular online travel booking service put millions of airline users at risk.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 58% of Ransomware Victims Forced to Shut Down Operations πŸ“”

A Ponemon Institute survey highlighted the growing impact of ransomware attacks on victims revenue and reputation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are using a new AI chatbot to wage cyber attacks: GhostGPT lets users write malicious code, create malware, and curate phishing emails – and it costs just $50 to use πŸ“’

Researchers at Abnormal Security have warned about the rise of GhostGPT, a new chatbot used by cyber criminals to create malicious code and malware.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cryptographic Agility's Legislative Possibilities & Business Benefits πŸ•΅οΈβ€β™‚οΈ

Quantum computing will bring new security risks. Both professionals and legislators need to use this time to prepare.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 4 trends in software supply chain security 🧠

Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most wellknown, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised. The post 4 trends in software supply chain security appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a nowpatched account takeover vulnerability affecting a popular online travel service for hotel and car rentals. "By exploiting this flaw, attackers can gain unauthorized access to any users account within the system, effectively allowing them to impersonate the victim and perform an array of actions on their behalf including.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
🦿 How to Protect and Secure Your Data in 10 Ways 🦿

Use this comprehensive list of strategies to help you safeguard your company's data from threats and data breaches.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks πŸ–‹οΈ

A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany. The attacks have led to the deployment of various payloads, such as Agent Tesla, Snake Keylogger, and a previously undocumented backdoor dubbed TorNet that's delivered by means of PureCrypter. TorNet is so.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ENGlobal Cyber-Attack Exposes Sensitive Data πŸ“”

Energy contractor ENGlobal reported that sensitive personal data was stolen by threat actors, with the incident disrupting operations for six weeks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Lynx Ransomware Group Unveiled with Sophisticated Affiliate Program πŸ“”

GroupIB researchers have exposed the highly organized affiliate platform and sophisticated operations of the Lynx RansomwareasaService group.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity