🛡 Cybersecurity & Privacy 🛡 - News
25K subscribers
88.4K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Dangerous Apache ActiveMQ Exploit Allows Stealthy EDR Bypass 🕴

There's no time to waste: For organizations on the fence about patching the critical bug in ActiveMQ, the new proof-of-concept exploit should push them towards action.

📖 Read

via "Dark Reading".
🦿 8 Best Enterprise Password Managers for 2023 🦿

Explore the best enterprise password managers that provide security and centralized control for managing and protecting passwords across your organization.

📖 Read

via "Tech Republic".
🕴 Detection & Response That Scales: A 4-Pronged Approach 🕴

Building a resilient incident response team requires more than a simple combination of tools and on-call rotations.

📖 Read

via "Dark Reading".
🛠 Web-Based Firewall Logging Tool 1.1.3 🛠

Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target.

📖 Read

via "Packet Storm Security".
🕴 Hands Off the Security Budget! Find Efficiencies to Reduce Risk 🕴

Security budgets will benefit from new priorities, streamlined responses rather than wholesale cost-cutting in light of cyberattacks and increased regulatory requirements.

📖 Read

via "Dark Reading".
🦿 How Do Password Managers Work and Why Do You Need One? 🦿

Learn how password managers work, their benefits, and why your organization needs one to secure sensitive data and prevent security breaches.

📖 Read

via "Tech Republic".
🕴 Actions to Take to Defeat Initial Access Brokers 🕴

Initial access brokers (IAB) are often difficult to track. This Tech Tip spells out some countermeasures enterprises need to defend against stolen credentials.

📖 Read

via "Dark Reading".
🕴 Shadowy Hack-for-Hire Group Behind Sprawling Web of Global Cyberattacks 🕴

For several years operators at New Delhi-based Appin hacked into, spied on, and stole data from targets around the world for clients that included private investigators, government agencies, law enforcement, and others.

📖 Read

via "Dark Reading".
🕴 Scattered Spider Casino Hackers Evade Arrest in Plain Sight 🕴

The feds seem to know all about the hacking group brazenly breaking into corporate networks; so why are enterprise teams left on their own to stop their cybercrimes?

📖 Read

via "Dark Reading".
🕴 British Library Confirms Ransomware Attack Caused Outages 🕴

The library said that it expects many of its services to be restored in the forthcoming weeks.

📖 Read

via "Dark Reading".
🕴 CompTIA Advises Retailers to Check their Cybersecurity Preparedness Ahead of the Holiday Shopping Season 🕴



📖 Read

via "Dark Reading".
🕴 VicOne and Block Harbor Deliver Integrated Workflow-Based Cybersecurity System 🕴



📖 Read

via "Dark Reading".
🕴 Hackers Weaponize SEC Disclosure Rules Against Corporate Targets 🕴

Ransomware group BlackCat/ALPHV files SEC complaint against its latest victim, putting an audacious new twist on cyber extortion tactics.

📖 Read

via "Dark Reading".
👎1
🕴 A Detection and Response Benchmark Designed for the Cloud 🕴

Does your security operation center's performance meet the 5/5/5 benchmark for cloud threat detection and incident response?

📖 Read

via "Dark Reading".
🕴 Leveraging Sandbox and Threat Intelligence Feeds to Combat Cyber Threats 🕴

Combining a malware sandbox with threat intelligence feeds improves security detection, analysis, and response capabilities.

📖 Read

via "Dark Reading".
🕴 How the Evolving Role of the CISO Impacts Cybersecurity Startups 🕴

CISOs and vendors must work together to keep up with emerging threats and find solutions, says a group of CISOs and security entrepreneurs.

📖 Read

via "Dark Reading".
👍2
🕴 Saudi Arabia Arms Public Sector With Google Cloud Services 🕴

Chronicle CyberShield will be offered as a managed service with security monitoring and Mandiant incident response included.

📖 Read

via "Dark Reading".
🕴 Enterprise Generative AI Enters Its Citizen Development Era 🕴

Your business users are building Copilots and GPTs with your enterprise data. What can you do about it?

📖 Read

via "Dark Reading".
🕴 CISA Launches Pilot Program to Address Critical Infrastructure Threats 🕴

CISA expects to extend this program to include up to 100 critical infrastructure entities in its first year.

📖 Read

via "Dark Reading".
🕴 Amid Military Buildup, China Deploys Mustang Panda in the Philippines 🕴

China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China Sea.

📖 Read

via "Dark Reading".
🕴 Malware Uses Trigonometry to Track Mouse Strokes 🕴

The latest LummaC2 infostealer version includes a novel anti-sandbox trick to avoid detonating when no human mouse movements are detected.

📖 Read

via "Dark Reading".