π‘ Cybersecurity & Privacy π‘ - News
π The finest daily news on cybersecurity and privacy. π Daily releases. π» Is your online life secure? π© [email protected]
Show more- Subscribers
- Post coverage
- ER - engagement ratio
Data loading in progress...
Data loading in progress...
US ports rely on cranes manufactured by a Chinese stateowned company, many with unmonitored cellular connections, causing cybersecurity concerns.
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurityUS ports rely on cranes manufactured by a Chinese state-owned company, many with unmonitored cellular connections, causing cybersecurity concerns.
Inc ransomware one of the most popular among cybercriminals today meets healthcare, the industry sector most targeted by RaaS.
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurityInc ransomware β one of the most popular among cybercriminals today β meets healthcare, the industry sector most targeted by RaaS.
Company urges organizations using selfhosting GitLab instances to apply updates for CVE202445409 as soon as possible.
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurityCompany wants organizations that are self-hosting GitLab instances to apply its updates for CVE-2024-45409 as soon as possible.
The first patch lets threat actors with lowlevel credentials still exploit the vulnerability, while the second fully resolves the flaw.
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurityThe first patch lets threat actors with low-level credentials still exploit the vulnerability, while the second fully resolves the flaw.
Threat actors have been observed targeting the construction sector by infiltrating the FOUNDATION Accounting Software, according to new findings from Huntress. "Attackers have been observed bruteforcing the software at scale, and gaining access simply by using the products default credentials," the cybersecurity company said. Targets of the emerging threat include plumbing, HVAC heating,.
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurityUntil just a couple of years ago, only a handful of IAM pros knew what service accounts are. In the last years, these silent NonHumanIdentities NHI accounts have become one of the most targeted and compromised attack surfaces. Assessments report that compromised service accounts play a key role in lateral movement in over 70 of ransomware attacks. However, theres an alarming disproportion.
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurityMany GitHub users this week received a novel phishing email warning of critical security holes in their code. Those who clicked the link for details were asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download passwordstealing malware. While it's unlikely that many programmers fell for this scam, it's notable because less targeted versions of it are likely to be far more successful against the average Windows user.
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurityMany GitHub users this week received a novel phishing email warning of critical security holes in their code. Those who clicked the link for details were asked to distinguish themselves from bots by pressing a combination of keyboard keys thatβ¦
Infostealer malware and digital identity exposure behind rise in ransomware, researchers find.
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurityInfostealer malware and digital identity exposure behind rise in ransomware, researchers find
With APIs becoming ever more popular, they've become attractive targets for attackers, particularly through the use of highly sophisticated bots.
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurityWith APIs becoming ever more popular, they've become attractive targets for attackers, particularly through the use of highly sophisticated bots
Once a user's device is infected as part of an ongoing Flax Typhoon APT campaign, the malware connects it to a botnet called Raptor Train, initiating malicious activity.
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurityOnce a user's device is infected as part of an ongoing Flax Typhoon APT campaign, the malware connects it to a botnet called Raptor Train, initiating malicious activity.
Your current plan allows analytics for only 5 channels. To get more, please choose a different plan.