πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Trend Micro: 90% of IT Decision Makers Believe Organizations Compromise on Cybersecurity in Favor of Other Goals πŸ•΄

Trend Micro study reveals need for new way to discuss business risk.

πŸ“– Read

via "Dark Reading".
πŸ•΄ MacOS Zero-Day Used in Watering-Hole Attacks πŸ•΄

Attackers targeted Chinese pro-democracy groups using a vulnerability fixed in September along with a second vulnerability fixed early in the year, Google says.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Immersive Labs Acquires Snap Labs to Power Cyber Simulations With New Depth and Realism πŸ•΄

Integrated offering to deliver hyper-realistic team exercises specific to customer environments for more relevant cyber knowledge, skills, and judgment.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Troubling Rise of Internet Access Brokers πŸ•΄

Criminal groups are ramping up use of IABs to get access to networks without having to deal with the initial reconnaissance and intrusion phases.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ HTTP header smuggling attack against AWS API Gateway exposes systems to cache poisoning πŸ—“οΈ

New hacking technique may pave the way for other serious attacks

πŸ“– Read

via "The Daily Swig".
🦿 Fear and shame are making it harder to fight ransomware and accidental data loss, report finds 🦿

A third of employees admit lying to hide the fact that they accidentally deleted data, most doing so out of embarrassment or fear of punishment. Even more would lie about a ransomware infection.

πŸ“– Read

via "Tech Republic".
❌ Emotet Resurfaces on the Back of TrickBot After Nearly a Year ❌

Researchers observed what looks like the Emotet botnet – the "world’s most dangerous malware" – reborn and distributed by the trojan it used to deliver.

πŸ“– Read

via "Threat Post".
⚠ Emotet malware: β€œThe report of my death was an exaggeration” ⚠

"Old malware rarely dies." The best way to predict the future is to look at the past... if it worked before, it will probably work again.

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Server-side vulnerabilities in Concrete CMS put thousands of websites under threat πŸ—“οΈ

Web admins urged to apply patches now

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Navigating the Complexity of Today's Digital Supply Chain πŸ•΄

An efficient way to monitor security is to model user behavior using time series data and watching for anomalies.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Number of cyber-attacks infiltrating critical New Zealand networks soars πŸ—“οΈ

National cybersecurity agency also observes rise in automated probing for web security flaws

πŸ“– Read

via "The Daily Swig".
⚠ The self-driving smart suitcase… that the person behind you can hijack! ⚠

Apparently, we need a self-driving IoT Bluetooth robot suitcase. Who knew?

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Exploit-as-a-service: Cybercriminals exploring potential of leasing out zero-day vulnerabilities πŸ—“οΈ

New approach echoes the depressingly successful ransomware-as-a-service business model

πŸ“– Read

via "The Daily Swig".
πŸ•΄ 4 Considerations for Improving Cloud Security Hygiene πŸ•΄

Mixing cloud security and maintenance practices with legacy enterprise approaches usually ends up shortchanging cloud hygiene. Here are some ways to remedy that.

πŸ“– Read

via "Dark Reading".
❌ MosesStaff Locks Up Targets, with No Ransom Demand, No Decryption ❌

A politically motivated group is paralyzing Israeli entities with no financial goal -- and no intention of handing over decryption keys.

πŸ“– Read

via "Threat Post".
πŸ•΄ The Old Ways Aren’t Working: Let’s Rethink OT Security πŸ•΄

Ransomware attacks against critical infrastructure go beyond locking up data. They can entirely shut down production in a facility. Here's how AI can help you fight back.

πŸ“– Read

via "Dark Reading".
❌ 200M Adult Cam Model, User Records Exposed in Stripchat Breach ❌

The leak included model information, chat messages and payment details.

πŸ“– Read

via "Threat Post".
🦿 14 tactics to use during a ransomware negotiation 🦿

Security researchers analyzed 700 incidents to understand the economics of these threats as well as what bargaining tactics work.

πŸ“– Read

via "Tech Republic".
❌ Rooting Malware Is Back for Mobile. Here’s What to Look Out For. ❌

Hank Schless, senior manager of security solutions at Lookout, discusses AbstractEmu, mobile malware found on Google Play, Amazon Appstore and the Samsung Galaxy Store.

πŸ“– Read

via "Threat Post".
πŸ•΄ Emotet Makes a Comeback πŸ•΄

The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cybercriminals Increasingly Employ Crypto-Mixers to Launder Stolen Profits πŸ•΄

Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.

πŸ“– Read

via "Dark Reading".