πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Critical Fortinet Vulnerability Draws Fresh Attention πŸ•΅οΈβ€β™‚οΈ

CISA this week added CVE202524472 to its catalog of known exploited vulnerabilities, citing ransomware activity targeting the authentication bypass flaw.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Nation-State Groups Abuse Microsoft Windows Shortcut Exploit πŸ•΅οΈβ€β™‚οΈ

Trend Micro uncovered a method that nationstate threat actors are using to target victims via the Windows .Ink shortcut file extension.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Infosys Settles $17.5M Class Action Lawsuit After Sprawling Third-Party Breach πŸ•΅οΈβ€β™‚οΈ

Several major companies in the finance sector were impacted by the thirdparty breach, prompting them to notify thousands of customers of their compromised data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 TechRepublic Exclusive: New Ransomware Attacks are Getting More Personal as Hackers β€˜Apply Psychological Pressure’ 🦿

Ransomware attackers know where your kids go to school and they want you to know it, according to professional negotiators at Sygnia.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Scam Alert: FBI β€˜Increasingly Seeing’ Malware Distributed In Document Converters 🦿

FBI warns computer users to keep an eye out for malware, including ransomware, distributed through working document converters.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🚨 Cyber chiefs unveil new roadmap for post-quantum cryptography migration 🚨

New guidance from the NCSC outlines a threephase timeline for organisations to transition to quantumresistant encryption methods by 2035.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ DOGE to Fired CISA Staff: Email Us Your Personal Data β™ŸοΈ

A message posted on Monday to the homepage of the U.S. Cybersecurity Infrastructure Security Agency CISA is the latest exhibit in the Trump administration's continued disregard for basic cybersecurity protections. The message instructed recentlyfired CISA employees to get in touch so they can be rehired and then immediately placed on leave, asking employees to send their Social Security number or date of birth in a passwordprotected email attachment presumably with the password needed to view the file included in the body of the email.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ India Is Top Global Target for Hacktivists, Regional APTs πŸ•΅οΈβ€β™‚οΈ

Global politics and a growing economy draw the wrong kind of attention to India, with denialofservice and application attacks both on the rise.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Get started on post-quantum encryption, organizations warned πŸ“’

The UK's national cybersecurity agency is urging companies to begin preparing themselves for quantum threats by 2035.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Western Alliance Bank admits cyber attack exposed 22,000 customers πŸ“’

An American bank has admitted nearly 22,000 customers had their accounts compromised following an attack that targeted a zeroday flaw in a thirdparty filetransfer tool.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are turning to AI tools to reverse engineer millions of apps – and it’s causing havoc for security professionals πŸ“’

A marked surge in attacks on clientside apps could be due to the growing use of AI tools among cyber criminals, according to new research.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯2
πŸ“’ Forget MFA fatigue, attackers are exploiting β€˜click tolerance’ to trick users into infecting themselves with malware πŸ“’

Threat actors are exploiting users familiarity with verification tests to trick them into loading malware onto their systems, new research has warned.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Mobile Jailbreaks Exponentially Increase Corporate Risk πŸ•΅οΈβ€β™‚οΈ

Both Android devices and iPhones are 3.5 times more likely to be infected with malware once "broken" and 250 times more likely to be totally compromised, recent research shows.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Master IT Fundamentals With This CompTIA Certification Prep Bundle 🦿

Prepare for a successful IT career with lifetime access to expertled courses covering CompTIA A, Network, Security, and Cloud certification prep.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems πŸ–‹οΈ

Veeam has released security updates to address a critical security flaw impacting its Backup Replication software that could lead to remote code execution. The vulnerability, tracked as CVE202523120, carries a CVSS score of 9.9 out of 10.0. It affects 12.3.0.310 and all earlier version 12 builds. "A vulnerability allowing remote code execution RCE by authenticated domain users," the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model πŸ–‹οΈ

Cybersecurity isn't just another checkbox on your business agenda. It's a fundamental pillar of survival. As organizations increasingly migrate their operations to the cloud, understanding how to protect your digital assets becomes crucial. The shared responsibility model, exemplified through Microsoft 365's approach, offers a framework for comprehending and implementing effective cybersecurity.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Data πŸ–‹οΈ

The governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore are likely customers of spyware developed by Israeli company Paragon Solutions, according to a new report from The Citizen Lab. Paragon, founded in 2019 by Ehud Barak and Ehud Schneorson, is the maker of a surveillance tool called Graphite that's capable of harvesting sensitive data from instant messaging applications.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers πŸ–‹οΈ

Regulatory compliance is no longer just a concern for large enterprises. Small and midsized businesses SMBs are increasingly subject to strict data protection and security regulations, such as HIPAA, PCIDSS, CMMC, GDPR, and the FTC Safeguards Rule. However, many SMBs struggle to maintain compliance due to limited IT resources, evolving regulatory requirements, and complex security challenges.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA has added a highseverity security flaw impacting NAKIVO Backup Replication software to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. The vulnerability in question is CVE202448248 CVSS score 8.6, an absolute path traversal bug that could allow an unauthenticated attacker to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages πŸ–‹οΈ

The Computer Emergency Response Team of Ukraine CERTUA is warning of a new campaign that targets the defense sectors with Dark Crystal RAT aka DCRat. The campaign, detected earlier this month, has been found to target both employees of enterprises of the defenseindustrial complex and individual representatives of the Defense Forces of Ukraine. The activity involves.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK CNI Security Leaders Express Confidence in Cybersecurity, Despite 95% Breach Rate πŸ“”

Bridewell has released its annual report on critical infrastructure security leaders perceived cybersecurity maturity and threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity