πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Australian pension funds slammed for β€˜absolute incompetence’ in wake of cyber attacks πŸ“’

While firms are working to minimize the damage, Super Consumers Australia said the attack showed 'absolute incompetence'.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are targeting Ivanti VPN users again – here’s what you need to know πŸ“’

Ivanti has repatched a security flaw in its Connect Secure VPN appliances that's been exploited by a Chinalinked espionage group since at least the middle of March.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ β€˜Insiders don’t need to break in’: A developer crippled company networks with malicious code and a β€˜kill switch’ after being sacked – and experts warn it shows the huge danger of insider threats πŸ“’

Security experts have warned ITPro over the risks of insider threats from disgruntled workers after a software developer deployed a 'kill switch' to sabotage his former employers networks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber criminals are using the US tax deadline to score a payday πŸ“’

Cyber criminals are using tax season as an opportunity to trick individuals and businesses into handing over sensitive information.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dangerous, Windows-Hijacking Neptune RAT Scurries Into Telegram, YouTube πŸ•΅οΈβ€β™‚οΈ

The malware's creators insist a new open source version of Neptune is for educational use by pen testers, but a raft of sophisticated backdoor and evasion capabilities says otherwise.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Experts Optimistic About Secure by Design Progress πŸ•΅οΈβ€β™‚οΈ

Secure by Design is an important step to reduce the number of vulnerabilities present originally, but is it progressing fast enough? According to security experts Chris Wysopal and Jason Healey, the landscape is improving.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Palo Alto Networks Begins Unified Security Rollout πŸ•΅οΈβ€β™‚οΈ

Cortex Cloud integrates Prisma Cloud with CDR to provide a consolidated security posture management and realtime threat detection and remediation platform.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How to Use a VPN: 4 Easy Steps to Get Started 🦿

Learn how to set up and use a VPN with just four easy steps. This stepbystep guide takes you through how you can secure your connection and online data.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Agentic AI in the SOC - Dawn of Autonomous Alert Triage πŸ–‹οΈ

Security Operations Centers SOCs today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases analyst fatigue, burnout, and attrition. While artificial intelligence has emerged as a goto solution, the term AI often blurs crucial distinctions. Not all AI is built equal, especially in the SOC. Many.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine πŸ–‹οΈ

The Computer Emergency Response Team of Ukraine CERTUA has revealed a new set of cyber attacks targeting Ukrainian institutions with informationstealing malware. The activity is aimed at military formations, law enforcement agencies, and local selfgovernment bodies, particularly those located near Ukraine's eastern border, the agency said. The attacks involve distributing phishing emails.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation πŸ–‹οΈ

A recently disclosed critical security flaw impacting CrushFTP has been added by the U.S. Cybersecurity and Infrastructure Security Agency CISA to its Known Exploited Vulnerabilities KEV catalog after reports emerged of active exploitation in the wild. The vulnerability is a case of authentication bypass that could permit an unauthenticated attacker to take over susceptible instances. It has.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities πŸ–‹οΈ

Google has shipped patches for 62 vulnerabilities, two of which it said have been exploited in the wild. The two highseverity vulnerabilities are listed below CVE202453150 CVSS score 7.8 An outofbounds flaw in the USB subcomponent of Kernel that could result in information disclosure CVE202453197 CVSS score 7.8 A privilege escalation flaw in the USB subcomponent of Kernel.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NIST Defers Pre-2018 CVEs to Tackle Growing Vulnerability Backlog πŸ“”

NIST marks CVEs pre2018 as Deferred in the NVD as agency focus shifts to managing emerging threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Half of Firms Stall Digital Projects as Cyber Warfare Risk Surges πŸ“”

Armis survey reveals that the growing threat of nationstate cyberattacks is disrupting digital transformation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Warns of CrushFTP Vulnerability Exploitation in the Wild πŸ“”

The US Cybersecurity and Infrastructure Security Agency CISA has added CVE202531161 to its Known Exploited Vulnerabilities KEV catalog.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Boards Urged to Follow New Cyber Code of Practice πŸ“”

The British government has launched a new code of practice designed to boost corporate cyber governance.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 What Is EDR (Endpoint Detection and Response)? 🌊

Endpoint detection and Response EDR is a cybersecurity technology that provides continuous endpoint monitoring to detect, investigate, and respond to threats. EDR solutions empower security teams to quickly identify, understand, and mitigate risks by providing realtime visibility, automated threat containment, and detailed insights into the entire attack lifecycle.  How Does EDR Work? EDR software acts The post What Is EDR Endpoint Detection and Response? appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Releases April Android Update to Address Two Zero-Days πŸ“”

Googles latest Android update fixes 62 flaws, including two zerodays previously used in limited targeted attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 2 Android Zero-Day Bugs Under Active Exploit πŸ•΅οΈβ€β™‚οΈ

Neither security issue requires user interaction and one of the vulnerabilities was used to unlock a student activist's device in an attempt to install spyware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Amazon EC2 SSM Agent Flaw Patched After Privilege Escalation via Path Traversal πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a nowpatched security flaw in the Amazon EC2 Simple Systems Manager SSM Agent that, if successfully exploited, could permit an attacker to achieve privilege escalation and code execution. The vulnerability could permit an attacker to create directories in unintended locations on the filesystem, execute arbitrary scripts with root privileges,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listings πŸ–‹οΈ

Threat actors have been observed distributing malicious payloads such as cryptocurrency miner and clipper malware via SourceForge, a popular software hosting service, under the guise of cracked versions of legitimate applications like Microsoft Office. "One such project, officepackage, on the main website sourceforge.net, appears harmless enough, containing Microsoft Office addins copied from a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity