🛡 Cybersecurity & Privacy 🛡 - News – Telegram
🛡 Cybersecurity & Privacy 🛡 - News
24.5K subscribers
88K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🧠 How cyberattacks on grocery stores could threaten food security 🧠

Grocery store shoppers at many chains recently ran into an unwelcome surprise empty shelves and delayed prenoscriptions. In early November, Ahold Delhaize USA was the victim of a cyberattack that significantly disrupted operations at more than 2,000 stores, including Hannaford, Food Lion and Stop and Shop. Specific details of the nature of the attack have The post How cyberattacks on grocery stores could threaten food security appeared first on Security Intelligence.

📖 Read more.

🔗 Via "Security Intelligence"

----------
👁️ Seen on @cibsecurity
🖋️ RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations 🖋️

A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network. The 119 vulnerabilities, assigned 97 unique CVE identifiers, span seven LTE implementations Open5GS, Magma, OpenAirInterface, Athonet, SDCore, NextEPC,.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 AWS Announces £5m Grant for Cyber Education in the UK 📔

Amazon Web Services has launched its Cyber Education Grant Program in the UK.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🦅 Unlocking Vulnrichment: Enhancing CVE Data for Smarter Vulnerability Management 🦅

Overview  The Cybersecurity and Infrastructure Security Agency CISA has introduced Vulnrichment, an innovative initiative designed to enhance CVE data by adding crucial context, scoring, and detailed analysis. Launched on May 10, 2024, Vulnrichment aims to empower security professionals by providing more than just basic CVE informationit offers the insights needed to make informed, timely decisions regarding vulnerability management.   As part of a midyear update, CISA's Tod Beardsley, Vulnerability Response Section Chief, provides an overview of how this resource can be leveraged to improve vulnerability management.  For IT defenders and vulnerability management teams, Vulnrichment represents a significant advancement in how CVE data is presented and utilized. By enriching basi...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
🦅 Anatomy of an Exploit Chain: CISA, FBI Detail Ivanti CSA Attacks 🦅

Threat actors chained together four vulnerabilities in Ivanti Cloud Service Appliances CSA in confirmed attacks on multiple organizations in September, according to an advisory released this week by the FBI and the U.S. Cybersecurity and Infrastructure Security Agency CISA.  The agencies urged users to upgrade to the latest supported version of Ivanti CSA, and to conduct threat hunting on networks using recommended detection techniques and Indicators of Compromise IoCs.  The January 22 advisory builds on October 2024 advisories from CISA and Ivanti and offers new information on the ways threat actors can chain together vulnerabilities in an attack. The four vulnerabilities were exploited as zero days, leading some to suspect sophisticated nationstate threat actors, possibly linked...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
📢 Ten ways Microsoft Copilot will change the way you work 📢

Maximising the value of technology in an evolving defence sector.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📢 Integrating Copilot With CDW 📢

Maximising the value of technology in an evolving defence sector.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📢 Compliant security with CDW 📢

Maximising the value of technology in an evolving defence sector.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📢 Protect your organization with Microsoft 365 📢

Maximising the value of technology in an evolving defence sector.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🧠 Are successful deepfake scams more common than we realize? 🧠

Many times a day worldwide, a boss asks one of their team members to perform a task during a video call. But is the person assigning tasks actually who they say they are? Or is it a deepfake? Instead of blindly following orders, employees must now ask themselves if they are becoming a victims of The post Are successful deepfake scams more common than we realize? appeared first on Security Intelligence.

📖 Read more.

🔗 Via "Security Intelligence"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ DoJ Busts Up Another Multinational DPRK IT Worker Scam 🕵️‍♂️

A departmentwide initiative has now led to five major law enforcement actions, in an attempt to curb the increasingly common trend of North Korean hackers posing as IT job applicants.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ MITRE's Latest ATT&CK Simulations Tackles Cloud Defenses 🕵️‍♂️

The MITRE framework's applied exercise provides defenders with critical feedback about how to detect and defend against common, but sophisticated, attacks.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Cisco: Critical Meeting Management Bug Requires Urgent Patch 🕵️‍♂️

The bug has been given a 9.9 CVSS score, and could allow authenticated threat actors to escalate their privileges to adminlevel if exploited.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ 3 Use Cases for Third-Party API Security 🕵️‍♂️

Thirdparty API security requires a tailored approach for different scenarios. Learn how to adapt your security strategy to outbound data flows, inbound traffic, and SaaStoSaaS interconnections.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
👍1
🕵️‍♂️ CISOs Are Gaining C-Suite Swagger, but Has It Come With a Cost? 🕵️‍♂️

The number of CISOs who report directly to the CEO is up sharply in recent years, but many still say it's not enough to secure adequate resources.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🖋️ Meta's Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risks 🖋️

A highseverity security flaw has been disclosed in Meta's Llama large language model LLM framework that, if successfully exploited, could allow an attacker to execute arbitrary code on the llamastack inference server.  The vulnerability, tracked as CVE202450050, has been assigned a CVSS score of 6.3 out of 10.0. Supply chain security firm Snyk, on the other hand, has assigned it a.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
👍2
🖋️ MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks 🖋️

Threat hunters have detailed an ongoing campaign that leverages a malware loader called MintsLoader to distribute secondary payloads such as the StealC information stealer and a legitimate opensource network computing platform called BOINC. "MintsLoader is a PowerShell based malware loader that has been seen delivered via spam emails with a link to KongtukeClickFix pages or a JScript file,".

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities 🖋️

A previously unknown threat actor has been observed copying the tradecraft associated with the Kremlinaligned Gamaredon hacking group in its cyber attacks targeting Russianspeaking entities. The campaign has been attributed to a threat cluster dubbed GamaCopy, which is assessed to share overlaps with another hacking group named Core Werewolf, also tracked as Awaken Likho and PseudoGamaredon.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 Change Healthcare Breach Almost Doubles in Size to 190 Million Victims 📔

Change Healthcare has claimed 190 million customers were affected by a megabreach last year.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
1
📔 Subaru Bug Enabled Remote Vehicle Tracking and Hijacking 📔

A nowpatched vulnerability could have enabled threat actors to remotely control Subaru cars.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📢 UnitedHealth reveals 190 million US citizens were impacted by the Change Healthcare breach 📢

UnitedHealth has confirmed that 190 million US citizens were affected by the Change Healthcare cyber attack in 2024.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity