πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access πŸ–‹οΈ

Cisco has rolled out updates for a maximumseverity security flaw impacting Secure Workload that could allow an unauthenticated, remote attacker to access sensitive data. Tracked as CVE202620223 CVSS score 10.0, the vulnerability arises from insufficient validation and authentication when accessing REST API endpoints. "An attacker could exploit this vulnerability if they are able to send.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a new Linux malware dubbed Showboat that has been put to use in a campaign targeting a telecommunications provider in the Middle East since at least mid2022. "Showboat is a modular postexploitation framework designed for Linux systems, capable of spawning a remote shell, transferring files, and functioning as a SOCKS5 proxy," Lumen.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories πŸ–‹οΈ

This week starts small. A token leaks. A bad package slips in. A login trick works. An old tool shows up again. At first, it feels like the usual mess. Then you see the pattern attackers are not always breaking in. They are using the parts we already trust. That is what makes it worrying. The danger is in normal things now updates, apps, cloud buttons, support chats, trusted accounts. AI.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Microsoft Warns of Two Actively Exploited Defender Vulnerabilities πŸ–‹οΈ

Microsoft has disclosed that a privilege escalation and a denialofservice flaw in Defender has come under active exploitation in the wild. The former, tracked as CVE202641091, is rated 7.8 on the CVSS scoring system. Successful exploitation of the flaw could allow an attacker to gain SYSTEM privileges. "Improper link resolution before file access 'link following' in Microsoft Defender.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ When Identity is the Attack Path πŸ–‹οΈ

Consider a cached access key on a single Windows machine. It got there the way most cached credentials do a user logged in, and the key stored itself automatically. Standard AWS behavior. No one misconfigured anything or violated a policy. Yet that single key, which was easily accessible to a minorleague attacker, could have opened a path to some 98 of entities in the company's cloud.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a vulnerability in the Linux kernel that remained undetected for nine years. The vulnerability, tracked as CVE202646333 CVSS score 5.5, is a case of improper privilege management that could permit an unprivileged local user to disclose sensitive files and execute arbitrary commands as root on default installations of several major.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fake Gemini and Claude Code Sites Spread Infostealers Through SEO Poisoning πŸ“”

The infostealer payload in this campaign collect a vast amount of data, from collaboration authentication keys to cryptocurrency wallets.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Apple Blocked $2.2bn in App Store Fraud in the Last Year πŸ“”

Total figure for fraudulent transactions Apple has blocked since 2020 now stands at over 11bn.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybercriminal VPN Dismantled in Europol Crackdown πŸ“”

First VPN, a service used by ransomware actors and fraudsters, was dismantled by Europol.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” GitHub Breach Traced to Malicious 'Nx Console' VS Code Extension πŸ“”

A threat actor compromised an Nx developer and posed as a legitimate maintainer to publish a malicious extension on Visual Studio Marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Three-Quarters of Firms Knowingly Ship Vulnerable Code πŸ“”

AI risks threaten to permeate supply chains through unvetted code and unaudited suppliers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Nine-Year-Old Linux Kernel Flaw Leaks SSH Keys and Password Hashes πŸ“”

Qualys finds nineyearold Linux ptrace flaw exposing SSH keys and password hashes locally.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Grafana Labs Says Code Breach Stemmed from TanStack Attack πŸ“”

Grafana Labs has confirmed a recent data breach was caused by the TanStack supply chain attack.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Lawmakers Demand Answers as CISA Tries to Contain Data Leak β™ŸοΈ

Lawmakers in both houses of Congress are demanding answers from the U.S. Cybersecurity Infrastructure Security Agency CISA after KrebsOnSecurity reported this week that a CISA contractor intentionally published AWS GovCloud keys and a vast trove of other agency secrets on a public GitHub account. The inquiry comes as CISA is still struggling to contain the breach and invalidate the leaked credentials.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware πŸ–‹οΈ

The Belarusaligned threat actor known as Ghostwriter aka UAC0057 and UNC1151Ukraine's National Security and Defense Council has been observed using lures related to Prometheus, a Ukrainian online learning platform, to target government organizations in the country. The activity, per the Computer Emergency Response Team of Ukraine CERTUA, involves sending phishing emails to government.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity