πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” 58% of Ransomware Victims Forced to Shut Down Operations πŸ“”

A Ponemon Institute survey highlighted the growing impact of ransomware attacks on victims revenue and reputation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are using a new AI chatbot to wage cyber attacks: GhostGPT lets users write malicious code, create malware, and curate phishing emails – and it costs just $50 to use πŸ“’

Researchers at Abnormal Security have warned about the rise of GhostGPT, a new chatbot used by cyber criminals to create malicious code and malware.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cryptographic Agility's Legislative Possibilities & Business Benefits πŸ•΅οΈβ€β™‚οΈ

Quantum computing will bring new security risks. Both professionals and legislators need to use this time to prepare.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 4 trends in software supply chain security 🧠

Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most wellknown, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised. The post 4 trends in software supply chain security appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a nowpatched account takeover vulnerability affecting a popular online travel service for hotel and car rentals. "By exploiting this flaw, attackers can gain unauthorized access to any users account within the system, effectively allowing them to impersonate the victim and perform an array of actions on their behalf including.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
🦿 How to Protect and Secure Your Data in 10 Ways 🦿

Use this comprehensive list of strategies to help you safeguard your company's data from threats and data breaches.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks πŸ–‹οΈ

A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany. The attacks have led to the deployment of various payloads, such as Agent Tesla, Snake Keylogger, and a previously undocumented backdoor dubbed TorNet that's delivered by means of PureCrypter. TorNet is so.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ENGlobal Cyber-Attack Exposes Sensitive Data πŸ“”

Energy contractor ENGlobal reported that sensitive personal data was stolen by threat actors, with the incident disrupting operations for six weeks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Lynx Ransomware Group Unveiled with Sophisticated Affiliate Program πŸ“”

GroupIB researchers have exposed the highly organized affiliate platform and sophisticated operations of the Lynx RansomwareasaService group.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Super Bowl LIX Could Be a Magnet for Cyberattacks πŸ•΅οΈβ€β™‚οΈ

Concerns include everything from ransomware, malware, and phishing attacks on the game's infrastructure to those targeting event sponsors and fans.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Phishing Campaign Baits Hook With Malicious Amazon PDFs πŸ•΅οΈβ€β™‚οΈ

In their discovery, researchers found 31 PDF files linking to these phishing websites, none of which have been yet submitted to VirusTotal.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OAuth Flaw Exposed Millions of Airline Users to Account Takeovers πŸ•΅οΈβ€β™‚οΈ

The nowfixed vulnerability involved a major travel services company that's integrated with dozens of airline websites worldwide.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Lynx Ransomware Group 'Industrializes' Cybercrime With Affiliates πŸ•΅οΈβ€β™‚οΈ

The ransomware group provides everything an affiliate could want to breach and attack victims, including a quality controlled recruitment system to engage even more criminals.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents πŸ–‹οΈ

The advanced persistent threat APT group known as UAC0063 has been observed leveraging legitimate documents obtained by infiltrating one victim to attack another target with the goal of delivering a known malware dubbed HATVIBE. "This research focuses on completing the picture of UAC0063's operations, particularly documenting their expansion beyond their initial focus on Central Asia,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer πŸ–‹οΈ

Broadcom has alerted of a highseverity security flaw in VMware Avi Load Balancer that could be weaponized by malicious actors to gain entrenched database access. The vulnerability, tracked as CVE202522217 CVSS score 8.6, has been described as an unauthenticated blind SQL injection. "A malicious user with network access may be able to use specially crafted SQL queries to gain database.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability πŸ–‹οΈ

Cybersecurity researchers are warning that a critical zeroday vulnerability impacting Zyxel CPE Series devices is seeing active exploitation attempts in the wild. "Attackers can leverage this vulnerability to execute arbitrary commands on affected devices, leading to complete system compromise, data exfiltration, or network infiltration," GreyNoise researcher Glenn Thorpe said in an alert.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Scores of Critical UK Government IT Systems Have Major Security Holes πŸ“”

The National Audit Office warns of major gaps in cyber resilience across UK government departments.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ NAO warns that UK government doesn't know how vulnerable its IT systems are πŸ“’

A report from the audit watchdog has found creaking legacy systems and a severe cyber skills shortage.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 7 Tips for Strategically Saying "No" in Cybersecurity πŸ•΅οΈβ€β™‚οΈ

Cybersecurity can't always be "Department of No," but saying yes all the time is not the answer. Here is how to enable innovation gracefully without adding risk to the organization.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CrowdStrike Highlights Magnitude of Insider Risk πŸ•΅οΈβ€β™‚οΈ

The impetus for CrowdStrike's new professional services came from last year's Famous Chollima threat actors, which used fake IT workers to infiltrate organizations and steal data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI in Cybersecurity: What's Effective and What’s Not – Insights from 200 Experts πŸ–‹οΈ

Curious about the buzz around AI in cybersecurity? Wonder if it's just a shiny new toy in the tech world or a serious game changer? Let's unpack this together in a nottobemissed webinar that goes beyond the hype to explore the real impact of AI on cybersecurity. Join Ravid Circus, a seasoned pro in cybersecurity and AI, as we peel back the layers of AI in cybersecurity through a revealing.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity