πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🧠 AI and cloud vulnerabilities aren’t the only threats facing CISOs today 🧠

With cloud infrastructure and, more recently, artificial intelligence AI systems becoming prime targets for attackers, security leaders are laserfocused on defending these highprofile areas. Theyre right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks. However, this heightened attention to emerging threats makes The post AI and cloud vulnerabilities arent the only threats facing CISOs today appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Threat Actors Exploit Government Websites for Phishing πŸ“”

Cybercriminals exploit government websites using open redirects and phishing tactics, bypassing secure email gateway protections.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top 8 Penetration Testing Tools to Enhance Your Security 🦿

Penetration testing is vital in keeping an organizations digital assets secure. Here are the top picks among the latest pen testing tools and software.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Old Ways of Vendor Risk Management Are No Longer Good Enough πŸ•΅οΈβ€β™‚οΈ

Managing thirdparty risk in the SaaS era demands a proactive, datadriven approach beyond checkbox compliance.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI Surge Drives Record 1205% Increase in API Vulnerabilities πŸ“”

AIrelated API vulnerabilities surged 1,205 in 2024, with 99 tied to API flaws, according to a new report by Wallarm.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Nation-State Hackers Abuse Gemini AI Tool πŸ“”

Google highlighted significant abuse of its Gemini LLM tool by nation state actors to support malicious activities, including research and malware development.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Hellcat Ransomware Gang Employs Humiliation Tactics πŸ“”

Cato Networks highlighted how the recently emerged HellCat ransomware group is using novel psychological tactics to court attention and pressurize victims.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks πŸ–‹οΈ

The North Korean threat actor known as the Lazarus Group has been observed leveraging a "webbased administrative platform" to oversee its commandandcontrol C2 infrastructure, giving the adversary the ability to centrally supervise all aspects of their campaigns. "Each C2 server hosted a webbased administrative platform, built with a React application and a Node.js API," SecurityScorecard's.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Mirai Variant β€˜Aquabot’ Exploits Mitel Device Flaws πŸ•΅οΈβ€β™‚οΈ

Yet another spinoff of the infamous DDoS botnet is exploiting a known vulnerability in active attacks, while its threat actors are promoting it on Telegram for other attackers to use as well, in a DDoSasaservice model.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Researchers Uncover Lazarus Group Admin Layer for C2 Servers πŸ•΅οΈβ€β™‚οΈ

The threat actor is using a sophisticated network of VPNs and proxies to centrally manage commandandcontrol servers from Pyongyang.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Unpatched Zyxel CPE Zero-Day Pummeled by Cyberattackers πŸ•΅οΈβ€β™‚οΈ

VulnCheck initially disclosed the critical commandinjection vulnerability CVE202440891 six months ago, but Zyxel has yet to mention its existence or offer users a patch to mitigate threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 DeepSeek Chatbot Beats OpenAI on App Store Leaderboard 🦿

The Chinese firm said training the model cost just 5.6 million. Alibaba Cloud followed with a new generative AI model, while Microsoft alleges DeepSeek distilled OpenAIs work.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
🦿 DeepSeek Chatbot Beats OpenAI on App Store Leaderboard 🦿

The Chinese firm said training the model cost just 5.6 million. Alibaba Cloud followed with a new generative AI model, while Microsoft alleges DeepSeek distilled OpenAIs work.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ PrintNightmare Aftermath: Windows Print Spooler is Better. What's Next? πŸ•΅οΈβ€β™‚οΈ

While Microsoft has boosted the security of Windows Print Spooler in the three years since the disclosure of the PrintNightmare vulnerability, the service remains a spooky threat that organizations cannot afford to ignore.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Fake Videos of Former First Lady Scam Namibians πŸ•΅οΈβ€β™‚οΈ

Amateurish financial scams are common across Africa, and Namibia's influential former first lady, Monica Geingos, has emerged as a particularly effective host body for these messages.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits πŸ–‹οΈ

Three security flaws have been disclosed in the opensource PHP package Voyager that could be exploited by an attacker to achieve oneclick remote code execution on affected instances. "When an authenticated Voyager user clicks on a malicious link, attackers can execute arbitrary code on the server," Sonar researcher Yaniv Nizry said in a writeup published earlier this week. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks πŸ–‹οΈ

A Mirai botnet variant dubbed Aquabot has been observed actively attempting to exploit a mediumseverity security flaw impacting Mitel phones in order to ensnare them into a network capable of mounting distributed denialofservice DDoS attacks. The vulnerability in question is CVE202441710 CVSS score 6.8, a case of command injection in the boot process that could allow a malicious actor.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NCSC Calls on Vendors to Eradicate β€œUnforgivable” Vulnerabilities πŸ“”

The UKs National Cyber Security Centre has released a new paper making it easier to assess if a flaw is unforgivable.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… ICS Vulnerability Report: Cyble Urges Critical mySCADA Fixes πŸ¦…

Overview A pair of 9.8severity flaws in mySCADA myPRO Manager SCADA systems were among the vulnerabilities highlighted in Cybles weekly Industrial Control System ICS Vulnerability Intelligence Report. Cyble Research Intelligence Labs CRIL examined eight ICS vulnerabilities in the January 28 report for clients, including highseverity flaws in critical manufacturing, energy infrastructure, and transportation networks. OS Command Injection CWE78 and Improper Security Checks CWE358, CWE319 accounted for half of the vulnerabilities in the report, indicating a persistent challenge in securing authentication and execution processes in ICS environments, Cyble said. Critical mySCADA Vulnerabilities The critical mySCADA myPRO supervisory control and data acquisition SCADA vulnera...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… UK, US Introduce β€œContent Credentials” Labeling to Counter Deepfakes, Misinformation in the Age of AI πŸ¦…

Overview The rapid evolution of generative artificial intelligence AI has introduced both opportunities and risks in the digital landscape. While AIgenerated content can enhance creativity and efficiency, it also presents significant challenges related to misinformation, deepfakes, and digital content authenticity. In response, the concept of Content Credentials has emerged as a critical solution for maintaining transparency and trust in multimedia content. The Rise of AIGenerated Content and Its Challenges Generative AI tools allow users to create realistic images, videos, and audio clips with minimal effort. This accessibility has raised concerns about digital deception, particularly in cybersecurity, journalism, and law enforcement. Malicious actors can leverage AIgenerat...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SOC Analysts - Reimagining Their Role Using AI πŸ–‹οΈ

The job of a SOC analyst has never been easy. Faced with an overwhelming flood of daily alerts, analysts and sometimes IT teams who are doubling as SecOps must try and triage thousands of security alertsoften false positivesjust to identify a handful of real threats. This relentless, 247 work leads to alert fatigue, desensitization, and increased risk of missing critical security incidents.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity