πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Kaspersky’s Advanced Persistent Threats Predictions for 2024 🦿

New botnets, more AI in spearphishing and increases in hack-for-hire business are some of Kaspersky's security predictions. Get extensive APT mitigation tips, too.

πŸ“– Read

via "Tech Republic".
🦿 6 Best Password Recovery Software for 2023 🦿

Looking for a trustworthy password recovery tool? Use our guide to review our editorial picks and compare pricing, features, pros and cons.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Major Saudi University to Offer AI, Cybersecurity Studies πŸ•΄

University of Jeddah partners with Resecurity to teach cybersecurity skills.

πŸ“– Read

via "Dark Reading".
🦿 Password Manager Cheat Sheet: What Is a Password Manager? 🦿

This cheat sheet provides an overview of what a password manager is and what it does, helping you keep your online accounts safe and secure.

πŸ“– Read

via "Tech Republic".
🦿 Microsoft Azure Confidential VMs Will Roll Out This December 🦿

The partnership with Intel allows for hardware-enforced security and confidentiality on 4th Gen Xeon processors.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Inside Job: Cyber Exec Admits to Hospital Hacks πŸ•΄

Healthcare cyber services executive Vikas Singla admits to hobbling hospital operations, then using the incidents to try and gin up extra business.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Role of the CISO in Digital Transformation πŸ•΄

A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are designed and implemented appropriately, and changes are properly managed, with security in mind from the very start. 

πŸ“– Read

via "Dark Reading".
πŸ•΄ DPRK Hackers Masquerade as Tech Recruiters, Job Seekers πŸ•΄

No one has turned the job market into an attack surface quite like North Korea, which plays both sides for financial gain and, possibly, espionage.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Exploit for Critical Windows Defender Bypass Goes Public πŸ•΄

Threat actors were actively exploiting CVE-2023-36025 in Windows SmartScreen as a zero-day vulnerability before Microsoft patched it in November.

πŸ“– Read

via "Dark Reading".
πŸ•΄ AutoZone Files MOVEit Data Breach Notice With State of Maine πŸ•΄

The company temporarily disabled the application and patched the vulnerability, though affected individuals should still remain vigilant.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Citrix Bleed Bug Inflicts Mounting Wounds, CISA Warns πŸ•΄

Patch or isolate now: Organizations in every sector run the risk of hemorrhaging data as opportunistic attacks from LockBit ransomware and others grow.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The 7 Deadly Sins of Security Awareness Training πŸ•΄

Stay away from using these tactics when trying to educate employees about risk.

πŸ“– Read

via "Dark Reading".
🦿 Sekoia: Latest in the Financial Sector Cyber Threat Landscape 🦿

Phishing, infostealer malware, ransomware, supply chain attacks, data breaches and crypto-related attacks are among the top evolving threats in the financial sector, says Sekoia.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Rootkit Turns Kubernetes From Orchestration to Subversion πŸ•΄

Kubernetes compromises have usually led to attackers creating cryptomining containers, but the outcomes could be much worse, say researchers presenting at the Black Hat Europe conference.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 3 Ways to Stop Unauthorized Code From Running in Your Network πŸ•΄

As organizations increasingly rely on AI-developed code, they must put guardrails in place to prevent major cybersecurity risks related to malicious code.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Scattered Spider Hops Nimbly From Cloud to On-Prem in Complex Attack πŸ•΄

The actor behind the high-profile MGM incident jumps across segmentations in under an hour, in a ransomware attack spanning Okta, Citrix, Azure, SharePoint, and more.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Mideast Oil & Gas Facilities Could Face Cyber-Related Energy Disruptions πŸ•΄

The Israel-Gaza conflict could expose the region's oil and gas operations to renewed cyberattacks, with global ramifications.

πŸ“– Read

via "Dark Reading".
🦿 Microsoft Improves Windows Security with a Path to Move Off NTLM 🦿

It’s time to stop relying on the insecure authentication protocol built into Windows. Microsoft is making it easier to switch to secure modern options.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Qatar Cyber Agency Runs National Cyber Drills πŸ•΄

Qatari organizations participate in cybersecurity exercises to hone their incident response plans and processes.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Researchers Undermine 'Windows Hello' on Lenovo, Dell, Surface Pro PCs πŸ•΄

Biometric security on PCs isn't quite as bulletproof as you might think, as the line between sensors and host computers can be tampered with.

πŸ“– Read

via "Dark Reading".
🦿 Atomic Stealer Distributes Malware to Macs Through False Browser Downloads 🦿

Atomic Stealer malware advertises itself through ClearFake browser updates disguised as Google's Chrome and Apple’s Safari.

πŸ“– Read

via "Tech Republic".