cookie

We use cookies to improve your browsing experience. By clicking Β«Accept allΒ», you agree to the use of cookies.

avatar

πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News

πŸ—ž The finest daily news on cybersecurity and privacy. πŸ”” Daily releases. πŸ’» Is your online life secure? πŸ“© [email protected]

Show more
Advertising posts
21 949
Subscribers
+2924 hours
+2027 days
+82530 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

πŸ•΅οΈβ€β™‚οΈ Concerns Over Supply Chain Attacks on US Seaports Grow πŸ•΅οΈβ€β™‚οΈ US ports rely on cranes manufactured by a Chinese stateowned company, many with unmonitored cellular connections, causing cybersecurity concerns. πŸ“– Read more. πŸ”— Via "Dark Reading" ---------- πŸ‘οΈ Seen on @cibsecurity
Show all...
Concerns Over Supply Chain Attacks on US Seaports Grow

US ports rely on cranes manufactured by a Chinese state-owned company, many with unmonitored cellular connections, causing cybersecurity concerns.

πŸ•΅οΈβ€β™‚οΈ Vice Society Pivots to Inc Ransomware in Healthcare Attack πŸ•΅οΈβ€β™‚οΈ Inc ransomware one of the most popular among cybercriminals today meets healthcare, the industry sector most targeted by RaaS. πŸ“– Read more. πŸ”— Via "Dark Reading" ---------- πŸ‘οΈ Seen on @cibsecurity
Show all...
Vice Society Uses Inc Ransomware in Healthcare Attack

Inc ransomware β€” one of the most popular among cybercriminals today β€” meets healthcare, the industry sector most targeted by RaaS.

πŸ•΅οΈβ€β™‚οΈ GitLab Warns of Max Severity Authentication Bypass Bug πŸ•΅οΈβ€β™‚οΈ Company urges organizations using selfhosting GitLab instances to apply updates for CVE202445409 as soon as possible. πŸ“– Read more. πŸ”— Via "Dark Reading" ---------- πŸ‘οΈ Seen on @cibsecurity
Show all...
GitLab Warns of Max Severity Authentication Bypass Bug

Company wants organizations that are self-hosting GitLab instances to apply its updates for CVE-2024-45409 as soon as possible.

πŸ•΅οΈβ€β™‚οΈ 1 PoC Exploit for Critical RCE Flaw, but 2 Patches From Veeam πŸ•΅οΈβ€β™‚οΈ The first patch lets threat actors with lowlevel credentials still exploit the vulnerability, while the second fully resolves the flaw. πŸ“– Read more. πŸ”— Via "Dark Reading" ---------- πŸ‘οΈ Seen on @cibsecurity
Show all...
1 PoC Exploit for RCE Flaw, but 2 Patches From Veeam

The first patch lets threat actors with low-level credentials still exploit the vulnerability, while the second fully resolves the flaw.

πŸ–‹οΈ Hackers Exploit Default Credentials in FOUNDATION Software to Breach Construction Firms πŸ–‹οΈ Threat actors have been observed targeting the construction sector by infiltrating the FOUNDATION Accounting Software, according to new findings from Huntress. "Attackers have been observed bruteforcing the software at scale, and gaining access simply by using the products default credentials," the cybersecurity company said. Targets of the emerging threat include plumbing, HVAC heating,. πŸ“– Read more. πŸ”— Via "The Hacker News" ---------- πŸ‘οΈ Seen on @cibsecurity
Show all...
πŸ–‹οΈ Wherever There's Ransomware, There's Service Account Compromise. Are You Protected? πŸ–‹οΈ Until just a couple of years ago, only a handful of IAM pros knew what service accounts are. In the last years, these silent NonHumanIdentities NHI accounts have become one of the most targeted and compromised attack surfaces. Assessments report that compromised service accounts play a key role in lateral movement in over 70 of ransomware attacks. However, theres an alarming disproportion. πŸ“– Read more. πŸ”— Via "The Hacker News" ---------- πŸ‘οΈ Seen on @cibsecurity
Show all...
β™ŸοΈ This Windows PowerShell Phish Has Scary Potential β™ŸοΈ Many GitHub users this week received a novel phishing email warning of critical security holes in their code. Those who clicked the link for details were asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download passwordstealing malware. While it's unlikely that many programmers fell for this scam, it's notable because less targeted versions of it are likely to be far more successful against the average Windows user. πŸ“– Read more. πŸ”— Via "Krebs on Security" ---------- πŸ‘οΈ Seen on @cibsecurity
Show all...
This Windows PowerShell Phish Has Scary Potential

Many GitHub users this week received a novel phishing email warning of critical security holes in their code. Those who clicked the link for details were asked to distinguish themselves from bots by pressing a combination of keyboard keys that…

πŸ“” Infostealers Cause Surge in Ransomware Attacks, Just One in Three Recover Data πŸ“” Infostealer malware and digital identity exposure behind rise in ransomware, researchers find. πŸ“– Read more. πŸ”— Via "Infosecurity Magazine" ---------- πŸ‘οΈ Seen on @cibsecurity
Show all...
Infostealers Cause Surge in Ransomware Attacks, Just One in Three Recover Data

Infostealer malware and digital identity exposure behind rise in ransomware, researchers find

❀ 1
πŸ“’ API and bot attacks are costing businesses billions–and they're on the rise πŸ“’ With APIs becoming ever more popular, they've become attractive targets for attackers, particularly through the use of highly sophisticated bots. πŸ“– Read more. πŸ”— Via "ITPro" ---------- πŸ‘οΈ Seen on @cibsecurity
Show all...
API and bot attacks are costing businesses billions – and they're on the rise

With APIs becoming ever more popular, they've become attractive targets for attackers, particularly through the use of highly sophisticated bots

πŸ•΅οΈβ€β™‚οΈ FBI Leads Takedown of Chinese Botnet Impacting 200K Devices πŸ•΅οΈβ€β™‚οΈ Once a user's device is infected as part of an ongoing Flax Typhoon APT campaign, the malware connects it to a botnet called Raptor Train, initiating malicious activity. πŸ“– Read more. πŸ”— Via "Dark Reading" ---------- πŸ‘οΈ Seen on @cibsecurity
Show all...
FBI Leads Takedown of Chinese Botnet Impacting 200K Devices

Once a user's device is infected as part of an ongoing Flax Typhoon APT campaign, the malware connects it to a botnet called Raptor Train, initiating malicious activity.

Choose a Different Plan

Your current plan allows analytics for only 5 channels. To get more, please choose a different plan.