🛡 Cybersecurity & Privacy 🛡 - News – Telegram
🛡 Cybersecurity & Privacy 🛡 - News
24.5K subscribers
88K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕵️‍♂️ Unpatched Zyxel CPE Zero-Day Pummeled by Cyberattackers 🕵️‍♂️

VulnCheck initially disclosed the critical commandinjection vulnerability CVE202440891 six months ago, but Zyxel has yet to mention its existence or offer users a patch to mitigate threats.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🦿 DeepSeek Chatbot Beats OpenAI on App Store Leaderboard 🦿

The Chinese firm said training the model cost just 5.6 million. Alibaba Cloud followed with a new generative AI model, while Microsoft alleges DeepSeek distilled OpenAIs work.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
1
🦿 DeepSeek Chatbot Beats OpenAI on App Store Leaderboard 🦿

The Chinese firm said training the model cost just 5.6 million. Alibaba Cloud followed with a new generative AI model, while Microsoft alleges DeepSeek distilled OpenAIs work.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ PrintNightmare Aftermath: Windows Print Spooler is Better. What's Next? 🕵️‍♂️

While Microsoft has boosted the security of Windows Print Spooler in the three years since the disclosure of the PrintNightmare vulnerability, the service remains a spooky threat that organizations cannot afford to ignore.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
👍1
🕵️‍♂️ Fake Videos of Former First Lady Scam Namibians 🕵️‍♂️

Amateurish financial scams are common across Africa, and Namibia's influential former first lady, Monica Geingos, has emerged as a particularly effective host body for these messages.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🖋️ Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits 🖋️

Three security flaws have been disclosed in the opensource PHP package Voyager that could be exploited by an attacker to achieve oneclick remote code execution on affected instances. "When an authenticated Voyager user clicks on a malicious link, attackers can execute arbitrary code on the server," Sonar researcher Yaniv Nizry said in a writeup published earlier this week. The.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks 🖋️

A Mirai botnet variant dubbed Aquabot has been observed actively attempting to exploit a mediumseverity security flaw impacting Mitel phones in order to ensnare them into a network capable of mounting distributed denialofservice DDoS attacks. The vulnerability in question is CVE202441710 CVSS score 6.8, a case of command injection in the boot process that could allow a malicious actor.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 NCSC Calls on Vendors to Eradicate “Unforgivable” Vulnerabilities 📔

The UKs National Cyber Security Centre has released a new paper making it easier to assess if a flaw is unforgivable.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
👍1
🦅 ICS Vulnerability Report: Cyble Urges Critical mySCADA Fixes 🦅

Overview A pair of 9.8severity flaws in mySCADA myPRO Manager SCADA systems were among the vulnerabilities highlighted in Cybles weekly Industrial Control System ICS Vulnerability Intelligence Report. Cyble Research Intelligence Labs CRIL examined eight ICS vulnerabilities in the January 28 report for clients, including highseverity flaws in critical manufacturing, energy infrastructure, and transportation networks. OS Command Injection CWE78 and Improper Security Checks CWE358, CWE319 accounted for half of the vulnerabilities in the report, indicating a persistent challenge in securing authentication and execution processes in ICS environments, Cyble said. Critical mySCADA Vulnerabilities The critical mySCADA myPRO supervisory control and data acquisition SCADA vulnera...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
🦅 UK, US Introduce “Content Credentials” Labeling to Counter Deepfakes, Misinformation in the Age of AI 🦅

Overview The rapid evolution of generative artificial intelligence AI has introduced both opportunities and risks in the digital landscape. While AIgenerated content can enhance creativity and efficiency, it also presents significant challenges related to misinformation, deepfakes, and digital content authenticity. In response, the concept of Content Credentials has emerged as a critical solution for maintaining transparency and trust in multimedia content. The Rise of AIGenerated Content and Its Challenges Generative AI tools allow users to create realistic images, videos, and audio clips with minimal effort. This accessibility has raised concerns about digital deception, particularly in cybersecurity, journalism, and law enforcement. Malicious actors can leverage AIgenerat...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
🖋️ SOC Analysts - Reimagining Their Role Using AI 🖋️

The job of a SOC analyst has never been easy. Faced with an overwhelming flood of daily alerts, analysts and sometimes IT teams who are doubling as SecOps must try and triage thousands of security alertsoften false positivesjust to identify a handful of real threats. This relentless, 247 work leads to alert fatigue, desensitization, and increased risk of missing critical security incidents.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked 🖋️

Buzzy Chinese artificial intelligence AI startup DeepSeek, which has had a meteoric rise in popularity in recent days, left one of its databases exposed on the internet, which could have allowed malicious actors to gain access to sensitive data. The ClickHouse database "allows full control over database operations, including the ability to access internal data," Wiz security researcher Gal.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 UK Organizations Boosting Cybersecurity Budgets 📔

UK organizations are significantly increasing cybersecurity budgets, with a projected 31 growth in the next year.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 Ransomware Attack Disrupts Blood Donation Services in US 📔

New York Blood Center Enterprises revealed that it has been hit by a ransomware attack, disrupting activities and blood drives at its centers across the country.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📢 How hackers bypass MFA – and what to do about it 📢

Security leaders must ensure theres more to their defenses than the simplest identity checks.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📢 Malicious GitHub repositories target users with malware 📢

Criminals are exploiting GitHub's reputation to install Lumma Stealer disguised as game hacks and cracked software.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Exposure Management Provider CYE Acquires Solvo 🕵️‍♂️

The addition of Solvo CSPM to CYE Hyver aims to address need for multicloud vulnerability monitoring and risk assessment.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🦿 How to Use Keeper Password Manager: A Comprehensive Guide 🦿

This stepbystep guide shows you how to set up Keeper Password Manager and use it to secure and organize your passwords.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
🧠 When ransomware kills: Attacks on healthcare facilities 🧠

As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients lives are literally on the line. Since 2015, there has been a staggering increase in ransomware The post When ransomware kills Attacks on healthcare facilities appeared first on Security Intelligence.

📖 Read more.

🔗 Via "Security Intelligence"

----------
👁️ Seen on @cibsecurity
🖋️ Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown 🖋️

An international law enforcement operation has dismantled the domains associated with various online platforms linked to cybercrime such as Cracked, Nulled, Sellix, and StarkRDP. The effort has targeted the following domains www.cracked.io www.nulled.to www.mysellix.io www.sellix.io www.starkrdp.io Visitors to these websites are now greeted by a seizure banner that says they were confiscated.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter 🖋️

Cybersecurity researchers have disclosed a critical security flaw in the Lightning AI Studio development platform that, if successfully exploited, could allow for remote code execution. The vulnerability, rated a CVSS score of 9.4, enables "attackers to potentially execute arbitrary commands with root privileges" by exploiting a hidden URL parameter, application security firm Noma said in a.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity