cyber_security_channel | News and Media

Telegram-канал cyber_security_channel - Cyber Security News

42585

Be Cyber Aware. Our vacancies channel: @CyberSecurityJobs Our chat: t.me/cybersecuritynewschat LinkedIn: https://www.linkedin.com/company/securitynews/ Facebook: https://www.facebook.com/BreakingCyberSecNews 📩 Cooperation: @cybersecadmin

Subscribe to a channel

Cyber Security News

Sailing Into Danger: DONOT APT’s Attack on Maritime & Defense Manufacturing

CRIL recently came across a campaign seemingly aimed at Pakistan’s manufacturing industry, which supports the country’s maritime and defense sectors.

After analyzing the files involved in the campaign, it was determined that the attack was linked to the known APT group DONOT.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

📩 CyberWeekly by Hacklido — Issue №11; 9th of November, 2024

It has been a minute, but here is the most recent issue of the long-awaited CyberWeekly Newsletter by Hacklido.

The wide variety of content you can expect to see:

Germany's protection for researchers
Interpol's crackdown on cybercrime
Google Cloud MFA requirement
Snowflake hacking arrests
Cisco vulnerability fixes

Make sure to follow this link for to access the entire article.

-----

→ If your Company / Project / Community wants to become a partner of Cyber Security News...

Please, do not hesitate to contact us by sending a direct message to @cybersecadmin

-----

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Global Operation Takes Down 22,000 Malicious IPs

The first iteration of Operation Synergia was announced in February 2024 when law enforcement agencies from over 50 Interpol member countries joined forces between September and November the previous year.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Most Companies Are Bracing for a Cyberattack Within a Year

Among the various types of attacks, credential theft remained a significant threat, wherein attackers steal login information to gain unauthorised access to systems.

This often occurs through AI generated phishing or social engineering.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Exploitation of Docker remote API servers has reached a “critical level”

Hackers are exploiting unprotected Docker remote API servers to deploy malware, with researchers stating the threat has reached a “critical level” and warning organizations to act now.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

DPRK Uses Microsoft Zero-Day in No-Click Toast Attacks

"Many Toast ad programs use a feature called WebView to render Web content for displaying ads," according to AhnLab researchers.

"However, WebView operates based on a browser.

Therefore, if the program creator used IE-based WebView to write the code, IE vulnerabilities could also be exploited in the program."

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach

CrowdStrike did not respond to a request for comment.

But a week after Techmundo’s piece, the tech news publication hackread.com published a story in which USDoD reportedly admitted that CrowdStrike was accurate in identifying him.

Hackread said USDoD shared a statement, which was partially addressed to CrowdStrike:

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Why Your Identity Is the Key to Modernizing Cybersecurity

Today, those technologies are coalescing around a modern vision for what is, at its heart, one of our most ancient security solutions: our own unique identity.

Let's take a look at how a modern version of this ancient solution can help protect our digital lives.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

31 New Ransomware Groups Join the Ecosystem in 12 Months

“Ransomware is a business that is nothing without its affiliate model. In the last year, law enforcement activity has shattered old allegiances, reshaping the business of cybercrime.

Originally chaotic in their response, threat actors have refined their business operations and how they work.

The result is a larger number of groups, underpinned by substantial affiliate migration,” said Don Smith, VP Threat Intelligence, Secureworks Counter Threat Unit.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Are Ghost Calls a Problem? Yes, if They Don’t Stop

When they happen repeatedly, it can be a sign that malicious intent is behind ghost calls — they may be a sign of fraudulent activity.

Let’s discuss some common not-so-nice reasons for ghost calls so you can identify when you need to take action.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

📩 CyberWeekly by Hacklido — Issue №7; 28th of September, 2024

Long time no see, but here is the latest CyberWeekly Newsletter, from our partners at Hacklido.

Dive in to explore the following industry topics:

EPA
NIST
CUPS
Patches
Malware
Logistics
ATG systems
Cyberattacks
Cybersecurity
Vulnerabilities
Transportation
Water treatment
Remote code execution
Authentication guidelines

Along with a variety of other useful materials.

Find the full article via this link.

-----

→ If your Company / Project / Community wants to become a partner of Cyber Security News...

Please, do not hesitate to contact us by sending a direct message to @cybersecadmin

-----

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Thousands of US Congress Emails Exposed to Takeover

However, the share of US political email addresses exposed on the dark web (20%) pales in comparison to that of British MPs (68%) and members of the European Parliament (44%), which the researchers discovered in an earlier iteration of the study.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Google Now Syncing Passkeys Across Desktop, Android Devices

To ensure that passkeys are kept end-to-end encrypted and protected, the internet giant has introduced a new Google Password Manager PIN, that the user will be prompted to provide when attempting to access a passkey.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Where Are Governments in Their Zero-Trust Journey?

The deadline is prompting action.

With a goal in sight, federal agencies have a systematic and organized path toward stronger defenses.

In an era where cyber threats advance in sophistication and intensity, this proactive stance is paramount for securing critical systems and data.

This is something state and local governments must consider when fortifying for the future.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

TfL Admits Some Services Are Down Following Cyber-Attack

“Due to the ongoing TfL-wide cybersecurity incident, we are currently able to process only a limited number of booking requests,” the notice read.

“In addition, many of our staff have limited access to systems and email and, as a result, we may be delayed or unable to respond to your query.”

Cyber_Security_Channel

Читать полностью…

Cyber Security News

A Comprehensive Guide to the Best Options for Secure Browsing

The key players in the privacy market are Tor, VPNs, Brave, and proxies.

But they all have unique features that are better suited for some situations than others.

It is time to understand these technologies and choose the best tools to protect your privacy and improve security.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Hacker Claims to Steal Source Code Owned by Nokia

The company’s investigation has not identified evidence that an attack has impacted any of its systems or data.

However, they assured everyone that they would continue to watch the situation actively despite not spotting a potential compromise.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Microsoft SharePoint RCE Bug Exploited to Breach Corporate Network

The attacker remained undetected for two weeks. Rapid7 determined the initial access vector to be the exploitation of a vulnerability, CVE 2024|38094, within the on-premise SharePoint server.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Fog Ransomware Targets SonicWall VPNs to Breach Corporate Networks

While the researchers aren't 100% positive the flaw was used in all cases, all of the breached endpoints were vulnerable to it, running an older, unpatched version.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Samsung Zero-Day Vuln Under Active Exploit, Google Warns

"This zero-day exploit is part of an EoP chain," Jin and Lecigne noted. "The actor is able to execute arbitrary code in a privileged camera server process.

The exploit also renamed the process name itself to 'vendor.samsung.hardware.camera.provider@3.0-service', probably for anti-forensic purposes."

Cyber_Security_Channel

Читать полностью…

Cyber Security News

📩 CyberWeekly by Hacklido — Issue №10; 19th of October, 2024

Please welcome the new issue of Hacklido's CyberWeekly Newsletter.

Here is what you can find inside:

Apple & Google propose shorter SSL/TLS certificate lifecycles
Iranian cyber threats targeting critical infrastructure
CISA warns of SolarWinds vulnerabilities
Post-quantum cryptography

Click here to begin reading the full version.

-----

→ If your Company / Project / Community wants to become a partner of Cyber Security News...

Please, do not hesitate to contact us by sending a direct message to @cybersecadmin

-----

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Pokemon Developer Discloses Breach, Extent of Leak Remains a Mystery

As of March 2024, the game developer has 207 full-time and contracted employees.

News outlets like Nintendo Life, IGN, and Nintendo Everything previously reported that massive amounts of data were leaked, ranging from source code to behind-the-scenes information.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

📩 CyberWeekly by Hacklido — Issue №9; 12th of October, 2024

Courtesy of our partners at Hacklido, we are happy to present you the new issue of the CyberWeekly Newsletter.

Navigate to their article and learn more about:

Internet Archive breach exposed 31M users' data
Microsoft Patch Tuesday fixed critical flaws
Education on cyber threats rise
OpenAI blocked AI misuse
Firefox zero-day patched

Among a wide array of other valuable materials.

Access the full Newsletter via this link.

-----

→ If your Company / Project / Community wants to become a partner of Cyber Security News...

Please, do not hesitate to contact us by sending a direct message to @cybersecadmin

-----

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

📩 CyberWeekly by Hacklido — Issue №8; 8th of October, 2024

New week = new issue of the CyberWeekly Newsletter, kindly crafted by our partners at Hacklido.

Discover a wide variety of professional themes:

CISA
Zimbra flaw
CUPS DDoS
CVE—2024—45519
CVE—2024—29824
US Healthcare Cybersecurity Bill
Texas Hospital ransomware attack
Ivanti Endpoint Manager vulnerability

In addition to other useful cybersecurity resources.

Find the complete Newsletter here.

-----

→ If your Company / Project / Community wants to become a partner of Cyber Security News...

Please, do not hesitate to contact us by sending a direct message to @cybersecadmin

-----

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Enhancing Cloud Data Security For Efficient And Private Queries With New Encrypt-Then-Index Strategy

This research, published in Frontiers of Computer Science, is a collaborative effort between Nanjing University of Aeronautics and Astronautics, the University of Tokyo, Guilin University of Electronic Technology, and China University of Geosciences.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Millions of Kia Cars Were Vulnerable to Remote Hacking: Researchers

After registering on the Kia dealer website – a link to it is sent via email to new users for registration purposes – using the same request used when registering to the owners’ portal, the researchers could generate an access token that allowed them to call the backend dealer APIs.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Severe Unauthenticated RCE Flaw (CVSS 9.9) in GNU/Linux Systems Awaiting Full Disclosure

Interestingly, there has been a delay in assigning Common Vulnerabilities and Exposures (CVE) identifiers to this issue.

Margaritelli suggests that there should be at least three CVEs assigned, possibly up to six, due to the multifaceted nature of the vulnerabilities involved.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

How Hackers Are Using Legitimate Tools to Distribute Phishing Links

These platforms are particularly popular in the education sector, a growing target for threat actors, as well as being commonly used by businesses and creative professionals.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Google AI Model Faces EU Data Privacy Investigation

Ireland’s Data Protection Commission (DPC) is examining whether the tech giant performed a legally required data protection impact assessment.

The organization is examining whether this action was done before processing European Union residents’ personal data.

Such details were used in its Pathways Language Model 2, according to a press release which was published on Thursday 12th of September.

A Google spokesman provided this statement:

“We take seriously our obligations under the GDPR and will work constructively with the DPC to answer their questions.”

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

🤝 Opportunity to Support the Cyber Security News Community

If you are looking to create a free Revolut account:

1. Do it via this link.
2. Follow the steps in the image.

Once you complete all the requirements, message us on Telegram @cybersecadmin.

To express our graditude, we will send you a unique cybersecurity-related gift.

Enjoy your Revolut account, and thank you for the support!

-----

@Cyber_Security_Channel

Читать полностью…
Subscribe to a channel