Weekly Roundup! Top Cybersecurity Stories
The Hacker News
#1 Most trusted publication for breaking cybersecurity news, insights & analysis for information security professionals.
Greetings, fellow defenders of digital security!
It's time to fortify our shields and sharpen our swords because the battle against cyber threats never ceases. Welcome to our weekly cybersecurity newsletter, where we bring you the latest and greatest insights, news, and tips to keep your digital kingdom safe from the relentless attacks of hackers and cybercriminals.
So, join us as we dive into the exciting and ever-evolving world of cybersecurity:
Apple recently updated its security advisories to include three new vulnerabilities that affect iOS, iPadOS, and macOS. These vulnerabilities could potentially allow bad actors to read arbitrary files or execute code on affected devices. Overall, this highlights the importance of keeping devices and software up-to-date, as these updates often include important security fixes.
So, some troubling news has come to light about the safety of Android apps on the Google Play Store. Apparently, an investigation has found some pretty serious issues with the data safety labels that are supposed to tell us whether an app is safe to use or not. These labels can apparently be misleading or even completely false, which is definitely cause for concern. It's important for us to be able to trust the information we're given about the apps we download, so this is definitely something we'll want to keep an eye on.
A new and dangerous botnet called MyloBot is on the loose and spreading rapidly across the globe. This botnet is infecting over 50,000 devices each day and causing havoc for individuals and businesses alike. The malware uses a multi-stage process to infect devices and can spread through various means, including spam emails, phishing websites, and unpatched software vulnerabilities.
UPCOMING WEBINARS
We're excited to announce two upcoming webinars that we think you won't want to miss.
We hope you'll join us for both of these informative and engaging webinars.
领英推荐
Twitter has announced that it will limit SMS-based 2-factor authentication (2FA) to its blue subscribers only. This means that users who rely on SMS-based 2FA to secure their Twitter accounts will need to upgrade to a premium subscription to continue using this feature. Twitter recommends that users switch to app-based 2FA methods, such as Google Authenticator, Authy, or Duo Mobile, which are generally more secure than SMS-based 2FA.
It has been reported that a Coinbase employee was the victim of an SMS scam as part of a cyber attack. While the attack did result in limited data being exposed, it serves as a stark reminder of the importance of remaining vigilant against sophisticated cyber threats. So, what can we learn from this incident? Education and awareness around cybersecurity threats and best practices are crucial to preventing incidents like this from occurring.
The Norwegian police agency ?kokrim made a big win against cybercriminals when they announced the seizure of $5.84 million worth of cryptocurrency stolen by the notorious Lazarus Group. This successful operation serves as a reminder of the importance of international cooperation in combating cybercrime.
It seems that threat actors have found a new tool to use in their illegal activities. The tool in question is called Havoc, and it's an open-source command-and-control (C2) framework that is gaining popularity among cybercriminals as an alternative to other well-known legitimate toolkits like Cobalt Strike, Sliver, and Brute Ratel.
A recent discovery by Jamf Threat Labs has shown that hackers are using Trojanized versions of genuine applications to deploy cryptocurrency mining malware on macOS systems. These sneaky attacks are particularly evasive because they use a familiar and trustworthy application to execute their malicious intent.
As we wrap up this week's cybersecurity newsletter, it's important to remember that cybersecurity is not just a topic for IT professionals and security experts. It affects us all, from the way we shop online to the way we communicate with our friends and family.
As the digital world continues to evolve at a rapid pace, we must remain vigilant and proactive in protecting our personal and sensitive information. From staying up-to-date with the latest security measures to practicing good online habits, there are many steps we can take to stay safe in the digital age.
So, as we head into the new week, let's make a commitment to prioritize our online security and do our part to create a safer, more secure digital world for everyone. Remember, cybersecurity is a team effort, and together we can make a real difference.
Economic Support Specialist at Fulton county DFCS
1 年PLEASE,PLEASE,HELP Almost two years ago my WI-FI account was hacked, anything that was on my WI-FI account. Ring security system, email, google, Facebook.... While Ring account is hacked my property is being damage. I review the video nothing is there. No one, no animals, however the morning shows the damage that had been done. I am at my wits ends, police reports, police called, fence up, mailed certified trespass notice, had him served by Sheriff for no trespassing. contacted IC3, FBI, complaint centers... NO HELP. They ask of proof; I explain that he has hacked my security system and has tampered with my security video. But that part I cannot prove. I have requested for a digital investigation, however was told. "They provide the service, it's up to me to keep it secured. I was shocked for we are talking of someone's home security system being tamper with. Please guide me in the right direction of who can help me it would be greatly appreciated. I have become disable after 23 years as a state employee I have no resources to be had for this issue. Thank you for your time and reading this email. Sincerely: Lynnette Graham (404-663-3333)
IT Support Analyst @ Compass | Solving problems by finding solutions
1 年Great insights, thank you
Helping mid-sized organizations increase sales and improve customer service since 1993 | #LinkedInLocal
1 年TikTok has 5 trackers ... and requires 76 permissions! https://reports.exodus-privacy.eu.org/en/reports/com.ss.android.ugc.trill/latest/
Helping mid-sized organizations increase sales and improve customer service since 1993 | #LinkedInLocal
1 年Re "Is Your Data Safe? Even Top-Ranked Android Apps Deceive Users", Exodus Privacy will report on the trackers included and the permissions required by the apps you want to install (or have already installed). Exodus Privacy Reports for Android Devices https://reports.exodus-privacy.eu.org/en/reports/