πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Leaky DICOM Medical Standard Exposes Millions of Patient Records πŸ•΄

A 30-year-old, rarely updated protocol for medical devices has exposed reams of highly personal data, thanks to a lack of proper security throughout owner environments.

πŸ“– Read

via "Dark Reading".
🦿 How to Use a VPN: 4 Easy Steps to Get Started 🦿

Learn how to set up and use a VPN with just four easy steps. This step-by-step guide takes you through how you can secure your connection and online data.

πŸ“– Read

via "Tech Republic".
🦿 Is a VPN Worth It? Benefits and Choosing the Best VPN 🦿

Is a VPN worth it? Learn about the benefits of using a VPN and how to choose the right one for your business needs.

πŸ“– Read

via "Tech Republic".
πŸ•΄ ChatGPT: OpenAI Attributes Regular Outages to DDoS Attacks πŸ•΄

ChatGPT and the associated APIs have been affected by regular outages, citing DDoS attacks as the reason β€” the Anonymous Sudan group claimed responsibility.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 'Shields Ready' Critical Infrastructure Initiative Addresses Inevitable Cyberattacks πŸ•΄

A cyberattack is coming, disasters are certain, and the US government wants critical infrastructure firms ready to handle any disruption. Welcome to Shields Ready.

πŸ“– Read

via "Dark Reading".
🦿 Best Mac Password Managers for 2023 🦿

What is the best password manager for Mac? Is it worth paying for a password manager? Use our guide to compare pricing, pros, and cons.

πŸ“– Read

via "Tech Republic".
πŸ•΄ State of Maine Becomes Latest MOVEit Victim to Surface πŸ•΄

The state said 1.3 million individuals have been affected by this breach, which includes Social Security numbers and taxpayer information.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 'CitrixBleed' Linked to Ransomware Hit on China's State-Owned Bank πŸ•΄

Meanwhile, CISA joins the call to patch CVE-2023-4966 immediately amid reports of mass-exploit activity; at least 5,000 orgs remain exposed.

πŸ“– Read

via "Dark Reading".
🦿 Microsoft and SysAid Find Clop Malware Vulnerability 🦿

SysAid has patched a zero-day vulnerability that could allow attackers to exfiltrate data and launch ransomware.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Intel Faces 'Downfall' Bug Lawsuit, Seeking $10K Per Plaintiff πŸ•΄

A class action suit claims Intel knowingly sold billions of faulty chips for years. The outcome could help define where poor vulnerability remediation becomes outright negligence.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ It’s Still Easy for Anyone to Become You at Experian β™ŸοΈ

In the summer of 2022, KrebsOnSecurity documented the plight of several readers who had their accounts at big-three consumer credit reporting bureau Experian hijacked after identity thieves simply re-registered the accounts using a different email address. Sixteen months later, Experian clearly has not addressed this gaping lack of security. I know that because my account at Experian was recently hijacked, and the only way I could recover access was by recreating the account.

πŸ“– Read

via "Krebs on Security".
❀1πŸ‘1
🦿 Australian Nonprofit Cyber Security Is So Poor It Might Be Affecting Donations 🦿

Research from Infoxchange indicates that poor cyber security practices in Australia’s not-for-profit sector are putting its donors’ and communities’ data at risk.

πŸ“– Read

via "Tech Republic".
πŸ•΄ SaaS Vendor Risk Assessment in 3 Steps πŸ•΄

SaaS applications are the new supply chain and, practically speaking, SaaS is the modern vendor. Here are three straightforward steps to manage this new vendor risk.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Security Is a Process, Not a Tool πŸ•΄

Process failures are the root cause of most serious cybersecurity incidents. We need to treat security as a process issue, not try to solve it with a collection of tools.

πŸ“– Read

via "Dark Reading".
πŸ•΄ SEC Suit Ushers in New Era of Cyber Enforcement πŸ•΄

A federal push to enforce cybersecurity requirements is holding public companies and government contractors accountable as a matter of law and for national security.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Ducktail Malware Targets the Fashion Industry πŸ•΄

Threat actors distributed an archive containing images of new products by major clothing companies, along with a malicious executable disguised with a PDF icon.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Q&A: Generative AI Comes to the Middle East, Driving Security Changes πŸ•΄

The influx of generative AI could cause security leaders to learn new skills and defensive tactics.

πŸ“– Read

via "Dark Reading".
πŸ•΄ A Closer Look at State and Local Government Cybersecurity Priorities πŸ•΄

Complexity impedes the universal and consistent application of security policy, which is an obstacle to adequately securing government environments.

πŸ“– Read

via "Dark Reading".
🦿 Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack 🦿

Any company that is strategic could be targeted for the same kind of actions as this cyberattack. Follow these tips to mitigate your company’s risk to this cybersecurity threat.

πŸ“– Read

via "Tech Republic".
πŸ•΄ 'Hunters International' Cyberattackers Take Over Hive Ransomware πŸ•΄

Hunters International appears to have acquired Hive ransomware from its original operators and may be seeking to cash in on the malware's reputation.

πŸ“– Read

via "Dark Reading".
πŸ›  Samhain File Integrity Checker 4.5.0 πŸ› 

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

πŸ“– Read

via "Packet Storm Security".
πŸ‘2