cibsecurity | Unsorted

Telegram-ะบะฐะฝะฐะป cibsecurity - ๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

23174

๐Ÿ—ž The finest daily news on cybersecurity and privacy. ๐Ÿ”” Daily releases. ๐Ÿ’ป Is your online life secure? ๐Ÿ“ฉ lalilolalo.dev@gmail.com

Subscribe to a channel

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“ข AI and cybersecurity: friends or foes? ๐Ÿ“ข

Proactive rather than reactive is the security stance that will best protect your business now and in the future. And who you partner with really matters.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“ข LinkedIn backtracks on AI training rules after user backlash ๐Ÿ“ข

UKbased LinkedIn users will now get the same protections as those elsewhere in Europe.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿฆ… Undetected Android Spyware Targeting Individuals In South Korea ๐Ÿฆ…

Key Takeaways Since June 2024, a new Android Spyware campaign has been identified targeting individuals in South Korea, leveraging an Amazon AWS S3 bucket as its Command and Control CC server. The Spyware is capable of exfiltrating sensitive information from an infected device, including SMSs, contact lists, images, and videos. The stolen data, stored openly on the S3 bucket, suggests poor operational security, potentially leading to unintended leaks of sensitive information. The spyware operates with a simple source code and few key permissions, demonstrating that even simple malware can be highly effective in exfiltrating sensitive data. The malware remained undetected by all major antivirus solutions. Four unique samples were identified, exhibiting zero detection rates a...

๐Ÿ“– Read more.

๐Ÿ”— Via "CYBLE"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ New PondRAT Malware Hidden in Python Packages Targets Software Developers ๐Ÿ–‹๏ธ

Threat actors with ties to North Korea have been observed using poisoned Python packages as a way to deliver a new malware called PondRAT as part of an ongoing campaign. PondRAT, according to new findings from Palo Alto Networks Unit 42, is assessed to be a lighter version of POOLRAT aka SIMPLESEA, a known macOS backdoor that has been previously attributed to the Lazarus Group and deployed in.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“ข UK firms are dangerously overconfident about paying ransoms to cyber criminals ๐Ÿ“ข

Only 4 of organizations that pay up recover all their data, and many take months to recover.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Ukraine Bans Telegram Use for Government and Military Personnel ๐Ÿ–‹๏ธ

Ukraine has restricted the use of the Telegram messaging app by government officials, military personnel, and other defense and critical infrastructure workers, citing national security concerns. The ban was announced by the National Coordination Centre for Cybersecurity NCCC in a post shared on Facebook. "I have always advocated and advocate for freedom of speech, but the issue of Telegram is.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber Attacks ๐Ÿ–‹๏ธ

A hacktivist group known as Twelve has been observed using an arsenal of publicly available tools to conduct destructive cyber attacks against Russian targets. "Rather than demand a ransom for decrypting data, Twelve prefers to encrypt victims' data and then destroy their infrastructure with a wiper to prevent recovery," Kaspersky said in a Friday analysis. "The approach is indicative of a.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ Citrine Sleet Poisons PyPI Packages With Mac & Linux Malware ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A North Korean advanced persistent threat APT actor aka Gleaming Pisces tried to sneak simple backdoors into public software packages.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿฆ… Cyble Sensor Intelligence: Attacks, Phishing Scams and Brute-Force Detections ๐Ÿฆ…

Key Takeaways Five exploits of recent vulnerabilities were detected by Cyble honeypot sensors this week. A 9.8severity PHP flaw identified in June remains under widespread attack, and organizations are urged to upgrade as soon as possible. Cyble researchers also identified 9 phishing scams, a number of very active bruteforce attack networks, and the most commonly targeted ports. Security teams are advised to use the information provided to harden defenses Overview The Cyble Global Sensor Intelligence Network, or CGSI, monitors and captures realtime attack data through Cybles network of Honeypot sensors. This week, Cybles Threat Hunting service discovered and investigated dozens of exploit attempts, malware intrusions, financialโ€ฏfraud,โ€ฏand bruteforce attacks.ย  The f...

๐Ÿ“– Read more.

๐Ÿ”— Via "CYBLE"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials ๐Ÿ–‹๏ธ

Law enforcement authorities have announced the takedown of an international criminal network that leveraged a phishing platform to unlock stolen or lost mobile phones. The phishingasaservice PhaaS platform, called iServer, is estimated to have claimed more than 483,000 victims globally, led by Chile 77,000, Colombia 70,000, Ecuador 42,000, Peru 41,500, Spain 30,000, and Argentina.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ›  OpenSSH 9.9p1 ๐Ÿ› 

This is a Linuxportable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patentencumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other cleanups.

๐Ÿ“– Read more.

๐Ÿ”— Via "Packet Storm - Tools"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿฆฟ HackerOne: Nearly Half of Security Professionals Believe AI Is Risky ๐Ÿฆฟ

The HackerPowered Security Report showed mixed feelings toward AI in the security community, with many seeing leaked training data as a threat.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ LinkedIn Addresses User Data Collection for AI Training ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The company announced an update to its privacy policy, acknowledging it is using customer data to train its AI models.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ Citrine Sleet Poisons PyPi Packages with Mac & Linux Malware ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A North Korean advanced persistent threat APT actor aka Gleaming Pisces tried to sneak simple backdoors into public software packages.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“ข FBI disrupts 260,000-strong botnet targeting universities and government agencies in US ๐Ÿ“ข

Chineselinked botnet believed to have stolen sensitive information from education and governmental agencies in the US.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” LinkedIn Pauses GenAI Training Following ICO Concerns ๐Ÿ“”

The Information Commissioners Office says its pleased that LinkedIn has temporarily suspended its generative AI model training.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” German Police Shutter 47 Criminal Crypto Exchanges ๐Ÿ“”

Officers in Germany have shut down 47 cryptocurrency exchanges they accused of facilitating cybercrime.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware ๐Ÿ–‹๏ธ

A suspected advanced persistent threat APT originating from China targeted a government organization in Taiwan, and possibly other countries in the AsiaPacific APAC region, by exploiting a recently patched critical security flaw impacting OSGeo GeoServer GeoTools. The intrusion activity, which was detected by Trend Micro in July 2024, has been attributed to a threat actor dubbed Earth Baxia.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ China's 'Earth Baxia' Spies Exploit Geoserver to Target APAC Orgs ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The APT group uses spearphishing and a vulnerability in a geospatial datasharing server to compromise organizations in Taiwan, Japan, the Philippines, and South Korea.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿš€ FBI, CISA warning over false claims of hacked voter data โ€“ Week in security with Tony Anscombe ๐Ÿš€

With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process.

๐Ÿ“– Read more.

๐Ÿ”— Via "ESET - WeLiveSecurity"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ LinkedIn Halts AI Data Processing in UK Amid Privacy Concerns Raised by ICO ๐Ÿ–‹๏ธ

The U.K. Information Commissioner's Office ICO has confirmed that professional social networking platform LinkedIn has suspended processing users' data in the country to train its artificial intelligence AI models. "We are pleased that LinkedIn has reflected on the concerns we raised about its approach to training generative AI models with information relating to its U.K. users," Stephen.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ CISA Releases Plan to Align Cybersecurity Across Federal Agencies ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The FOCAL plan outlines baselines to synchronize cybersecurity priorities and policies across, as well as within, agencies.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ Ivanti's Cloud Service Appliance Attacked via Second Vuln ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The critical bug, CVE20248963, can be used in conjunction with the prior known flaw to achieve remote code execution RCE.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“” US Cyberspace Solarium Commission Outlines Ten New Cyber Policy Priorities ๐Ÿ“”

In its fourth annual report, the US Cyberspace Solarium Commission highlighted the need to focus on securing critical infrastructure and bolstering cyber resilience.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿง  New cybersecurity advisory highlights defense-in-depth strategies ๐Ÿง 

In 2023, the Cybersecurity and Infrastructure Security Agency CISA conducted a red team operation against an FCEB Federal Civilian Executive Branch organization. In July 2024, CISA released a new CSA that detailed the findings of this assessment along with key findings relevant to the security of the organizations network. One of the interesting findings of The post New cybersecurity advisory highlights defenseindepth strategies appeared first on Security Intelligence.

๐Ÿ“– Read more.

๐Ÿ”— Via "Security Intelligence"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿฆฟ 5 Compelling Reasons Not to Manage Your Own VoIP Server ๐Ÿฆฟ

Discover why managing your own VoIP server can be costly, dangerous, and timeconsuming for most businesses.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ GenAI in Cybersecurity: Insights Beyond the Verizon DBIR ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The lack of abundant data on AIenabled attacks in official reports shouldn't prevent us from preparing for and mitigating potential future threats.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ•ต๏ธโ€โ™‚๏ธ Zero-Click MediaTek Bug Opens Phones, Wi-Fi to Takeover ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Criticalrated CVE202420017 allows remote code execution RCE on a range of phones and WiFi access points from a variety of OEMs.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ“ข Securing the future of your business through cybersecurity education and training ๐Ÿ“ข

All workers need to know what theyre up against to properly defend their company against modern threats. However, leaders must maintain communication for training to succeed.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News

๐Ÿ–‹๏ธ Passwordless AND Keyless: The Future of (Privileged) Access Management ๐Ÿ–‹๏ธ

In IT environments, some secrets are managed well and some fly under the radar. Heres a quick checklist of what kinds of secrets companies typically manage, including one type they should manage Passwords x TLS certificates x Accounts x SSH keys ??? The secrets listed above are typically secured with privileged access management PAM solutions or similar. Yet, most traditional PAM.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…
Subscribe to a channel