πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Cybercriminal VPN Dismantled in Europol Crackdown πŸ“”

First VPN, a service used by ransomware actors and fraudsters, was dismantled by Europol.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybercriminal VPN Dismantled in Europol Crackdown πŸ“”

First VPN, a service used by ransomware actors and fraudsters, was dismantled by Europol.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybercriminal VPN Dismantled in Europol Crackdown πŸ“”

First VPN, a service used by ransomware actors and fraudsters, was dismantled by Europol.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybercriminal VPN Dismantled in Europol Crackdown πŸ“”

First VPN, a service used by ransomware actors and fraudsters, was dismantled by Europol.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” GitHub Breach Traced to Malicious 'Nx Console' VS Code Extension πŸ“”

A threat actor compromised an Nx developer and posed as a legitimate maintainer to publish a malicious extension on Visual Studio Marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybercriminal VPN Dismantled in Europol Crackdown πŸ“”

First VPN, a service used by ransomware actors and fraudsters, was dismantled by Europol.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” GitHub Breach Traced to Malicious 'Nx Console' VS Code Extension πŸ“”

A threat actor compromised an Nx developer and posed as a legitimate maintainer to publish a malicious extension on Visual Studio Marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” GitHub Breach Traced to Malicious 'Nx Console' VS Code Extension πŸ“”

A threat actor compromised an Nx developer and posed as a legitimate maintainer to publish a malicious extension on Visual Studio Marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” GitHub Breach Traced to Malicious 'Nx Console' VS Code Extension πŸ“”

A threat actor compromised an Nx developer and posed as a legitimate maintainer to publish a malicious extension on Visual Studio Marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” GitHub Breach Traced to Malicious 'Nx Console' VS Code Extension πŸ“”

A threat actor compromised an Nx developer and posed as a legitimate maintainer to publish a malicious extension on Visual Studio Marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” GitHub Breach Traced to Malicious 'Nx Console' VS Code Extension πŸ“”

A threat actor compromised an Nx developer and posed as a legitimate maintainer to publish a malicious extension on Visual Studio Marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” GitHub Breach Traced to Malicious 'Nx Console' VS Code Extension πŸ“”

A threat actor compromised an Nx developer and posed as a legitimate maintainer to publish a malicious extension on Visual Studio Marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” GitHub Breach Traced to Malicious 'Nx Console' VS Code Extension πŸ“”

A threat actor compromised an Nx developer and posed as a legitimate maintainer to publish a malicious extension on Visual Studio Marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Three-Quarters of Firms Knowingly Ship Vulnerable Code πŸ“”

AI risks threaten to permeate supply chains through unvetted code and unaudited suppliers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Three-Quarters of Firms Knowingly Ship Vulnerable Code πŸ“”

AI risks threaten to permeate supply chains through unvetted code and unaudited suppliers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Three-Quarters of Firms Knowingly Ship Vulnerable Code πŸ“”

AI risks threaten to permeate supply chains through unvetted code and unaudited suppliers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Three-Quarters of Firms Knowingly Ship Vulnerable Code πŸ“”

AI risks threaten to permeate supply chains through unvetted code and unaudited suppliers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflows πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a new automated campaign called Megalodon that has pushed 5,718 malicious commits to 5,561 GitHub repositories within a sixhour window. "Using throwaway accounts and forged author identities buildbot, autoci, cibot, pipelinebot, the attacker injected GitHub Actions workflows containing base64encoded bash payloads that exfiltrate CI.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspective πŸ–‹οΈ

1 Introduction This article provides a technical analysis of how many Windows kernel mode drivers can be interacted with from user mode without the hardware they were developed for. This work was motivated by driveroriented vulnerability research and the need to evaluate the exploitability of individual findings, which frequently affect code whose reachability is hardwaregated. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks πŸ–‹οΈ

The U.S. Department of Justice DoJ on Thursday announced the arrest of a Canadian man in connection with allegedly operating a distributed denialofservice DDoS botnet known as Kimwolf. In tandem, Jacob Butler aka Dort, 23, Ottawa, Canada, has been charged with offenses related to the development and operation of the botnet. Kimwolf is assessed to be a variant of AISURU. "Kimwolf.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday added two security flaws impacting Langflow and Trend Micro Apex One to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below CVE202534291 CVSS score 9.4 An origin validation error vulnerability in Langflow that could.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity