πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” CISA Throws Lifeline to CVE Program with Last-Minute Contract Extension πŸ“”

MITRE will be able to keep running the CVE program for at least the next 11 months.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution πŸ–‹οΈ

A critical security vulnerability has been disclosed in the ErlangOpen Telecom Platform OTP SSH implementation that could permit an attacker to execute arbitrary code sans any authentication under certain conditions. The vulnerability, tracked as CVE202532433, has been given the maximum CVSS score of 10.0. "The vulnerability allows an attacker with network access to an ErlangOTP SSH.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Throws Lifeline to CVE Program with Last-Minute Contract Extension πŸ“”

MITRE will be able to keep running the CVE program for at least the next 11 months.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CVE Program Cuts Send the Cyber Sector Into Panic Mode πŸ•΅οΈβ€β™‚οΈ

After threatening to slash support for the CVE program, CISA threw MITRE a lifeline at the last minute extending its government contract for another 11 months. After that, it looks like it's up to the private sector to find the cash to keep it going.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity by Design: When Humans Meet Technology πŸ•΅οΈβ€β™‚οΈ

If security tools are challenging to use, people will look for workarounds to get around the restrictions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Thwarts $4bn in Fraud Attempts πŸ“”

Microsoft has blocked fraud worth 4bn as threat actors ramp up AI use.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Android Phones Pre-Downloaded With Malware Target User Crypto Wallets πŸ•΅οΈβ€β™‚οΈ

The threat actors lace predownloaded applications with malware to steal cryptocurrency by covertly swapping users' wallet addresses with their own.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dogged by Trump, Chris Krebs Resigns From SentinelOne πŸ•΅οΈβ€β™‚οΈ

The president revoked the former CISA director's security clearance, half a decade after Krebs challenged rightwing election disinformation, prompting his eventual resignation.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Android Phones Pre-Downloaded With Malware Target User Crypto Wallets πŸ•΅οΈβ€β™‚οΈ

The threat actors lace predownloaded applications with malware to steal cryptocurrency by covertly swapping users' wallet addresses with their own.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Network Edge Devices the Biggest Entry Point for Attacks on SMBs πŸ“”

Sophos found that compromise of network edge devices, such as VPN appliances, accounted for 30 of incidents impacted SMBs in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Thwarts $4bn in Fraud Attempts πŸ“”

Microsoft has blocked fraud worth 4bn as threat actors ramp up AI use.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Middle East, North Africa Security Spending to Top $3B πŸ•΅οΈβ€β™‚οΈ

Gartner projects IT security spending in the MENA region will continue to increase in 2025, with security services accounting for the most growth.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity by Design: When Humans Meet Technology πŸ•΅οΈβ€β™‚οΈ

If security tools are challenging to use, people will look for workarounds to get around the restrictions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Middle East, North Africa Security Spending to Top $3B πŸ•΅οΈβ€β™‚οΈ

Gartner projects IT security spending in the MENA region will continue to increase in 2025, with security services accounting for the most growth.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Blockchain Offers Security Benefits – But Don't Neglect Your Passwords πŸ–‹οΈ

Blockchain is best known for its use in cryptocurrencies like Bitcoin, but it also holds significant applications for online authentication. As businesses in varying sectors increasingly embrace blockchainbased security tools, could the technology one day replace passwords? How blockchain works  Blockchain is a secure way to maintain, encrypt, and exchange digital records of transactions.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ GPS Spoofing Attacks Spike in Middle East, Southeast Asia πŸ•΅οΈβ€β™‚οΈ

An Indian disasterrelief flight delivering aid is the latest airtraffic incident, as attacks increase in the Middle East and Myanmar and along the IndiaPakistan border.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ GPS Spoofing Attacks Spike in Middle East, Southeast Asia πŸ•΅οΈβ€β™‚οΈ

An Indian disasterrelief flight delivering aid is the latest airtraffic incident, as attacks increase in the Middle East and Myanmar and along the IndiaPakistan border.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Network Edge Devices the Biggest Entry Point for Attacks on SMBs πŸ“”

Sophos found that compromise of network edge devices, such as VPN appliances, accounted for 30 of incidents impacted SMBs in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Network Edge Devices the Biggest Entry Point for Attacks on SMBs πŸ“”

Sophos found that compromise of network edge devices, such as VPN appliances, accounted for 30 of incidents impacted SMBs in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 β€˜No AI Agents are Allowed.’ EU Bans Use of AI Assistants in Virtual Meetings 🦿

In a presentation delivered this month by the European Commission, a meeting etiquette slide stated No AI Agents are allowed.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Apple Patches Two Zero-Days Used in β€˜Extremely Sophisticated’ Attacks 🦿

Find out the specifics of these iOS and macOS vulnerabilities, as well as which Apple devices were impacted.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity