πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Eclypsium Raises Series B to Protect Digital Supply Chain As Attacks Grow πŸ•΄

The new round highlights market demand to protect global businesses from soaring breaches through supply chains of critical hardware, devices, firmware, and software.

πŸ“– Read

via "Dark Reading".
πŸ•΄ More Than 30% of All Malicious Attacks Target Shadow APIs πŸ•΄

New research spotlights how attackers are capitalizing on API-driven innovation.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Matrix address flaws that break message encryption assurances πŸ—“οΈ

Confidentiality and authentication flaws

πŸ“– Read

via "The Daily Swig".
⚠ Romance scammer and BEC fraudster sent to prison for 25 years ⚠

Two years of scamming + $10 million leeched = 25 years in prison. Just in time for #Cybermonth.

πŸ“– Read

via "Naked Security".
πŸ•΄ Steam Gaming Phish Showcases Browser-in-Browser Threat πŸ•΄

Attackers are using the recently emerged browser-in-the-browser phishing technique to steal accounts from Valve's popular gaming platform, but it's a warning shot to businesses.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ›  OpenSSH 9.1p1 πŸ› 

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Workforce Data Privacy in the Modern Work Era πŸ•΄

It takes culture as well as individual and corporate responsibilities to ensure workforce data privacy and compliance.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Former NSA Employee Faces Death Penalty for Selling Secrets πŸ•΄

Suspect allegedly thought he was swapping secrets with a foreign government for crypto β€” but it turned out to be an FBI agent.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Aussie Telco Telstra Breached, Reportedly Exposing 30,000 Employees' Data πŸ•΄

The Telstra cyber incident comes just weeks after its main rival Optus suffered a major compromise of its customer database.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft Updates Mitigation for Exchange Server Zero-Days πŸ•΄

Researchers had discovered that Microsoft's original mitigation steps for the so-called "ProxyNotShell" flaws was easily bypassed.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Exposure Management? Understanding the Attacker Takes Center Stage πŸ•΄

Announcing its exposure management platform, Tenable joins other companies in offering ways β€” such as attack surface management β€” to look at business networks through the eyes of attackers.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Insecurities of Cybersecurity Success πŸ•΄

Becoming a big wheel doesn't have to cost your happiness, but grind culture makes that likely.

πŸ“– Read

via "Dark Reading".
πŸ•΄ RatMilad Spyware Scurries onto Enterprise Android Phones πŸ•΄

A novel mobile malware found lurking behind a phone-spoofing app is being distributed via Telegram and a dedicated website, in a broad operation to monitor corporate victims.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Why Don't CISOs Trust Their Employees? πŸ•΄

Executives fear "malicious insiders" as top cyber threat to companies, research shows. Reasonable steps to secure and monitor systems may prevent reputational damage but are not enough.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 7 Practical Considerations for Effective Threat Intelligence πŸ•΄

If your security team is considering, planning, building, or operating a threat intelligence capability, this advice can help.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ›  Wireshark Analyzer 4.0.0 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ—“οΈ PHP package manager component Packagist vulnerable to compromise πŸ—“οΈ

Argument injection bug posed RCE risk

πŸ“– Read

via "The Daily Swig".
πŸ•΄ NetSPI Raises $410 Million in Growth Funding from KKR πŸ•΄

New investment to fuel the offensive security leader's record-breaking growth and innovation pipeline.

πŸ“– Read

via "Dark Reading".
πŸ‘2
⚠ Scammers and rogue callers – can anything ever stop them? ⚠

Some thoughts for Cybersecurity Awareness Month: Is is worth reporting nuisance calls? Is it even worth reporting outright scams?

πŸ“– Read

via "Naked Security".
πŸ‘1
⚠ Romance scammer and BEC fraudster sent to prison for 25 years ⚠

Two years of scamming + $10 million leeched = 25 years in prison. Just in time for #Cybermonth.

πŸ“– Read

via "Naked Security".
πŸ•΄ Giving Away the Keys to Your Backups? Here’s How to Keep Out Hackers πŸ•΄

As threat actors' sophistication has grown dramatically in the last few years, organizations haven't kept up with implementing the necessary countermeasure controls.

πŸ“– Read

via "Dark Reading".