πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Scattered Spider Hops Nimbly From Cloud to On-Prem in Complex Attack πŸ•΄

The actor behind the high-profile MGM incident jumps across segmentations in under an hour, in a ransomware attack spanning Okta, Citrix, Azure, SharePoint, and more.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Mideast Oil & Gas Facilities Could Face Cyber-Related Energy Disruptions πŸ•΄

The Israel-Gaza conflict could expose the region's oil and gas operations to renewed cyberattacks, with global ramifications.

πŸ“– Read

via "Dark Reading".
🦿 Microsoft Improves Windows Security with a Path to Move Off NTLM 🦿

It’s time to stop relying on the insecure authentication protocol built into Windows. Microsoft is making it easier to switch to secure modern options.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Qatar Cyber Agency Runs National Cyber Drills πŸ•΄

Qatari organizations participate in cybersecurity exercises to hone their incident response plans and processes.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Researchers Undermine 'Windows Hello' on Lenovo, Dell, Surface Pro PCs πŸ•΄

Biometric security on PCs isn't quite as bulletproof as you might think, as the line between sensors and host computers can be tampered with.

πŸ“– Read

via "Dark Reading".
🦿 Atomic Stealer Distributes Malware to Macs Through False Browser Downloads 🦿

Atomic Stealer malware advertises itself through ClearFake browser updates disguised as Google's Chrome and Apple’s Safari.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Web Shells Gain Sophistication for Stealth, Persistence πŸ•΄

A favorite post-exploitation tool continues to gain sophistication, with one recent example adding disguised log-in pages, credential stealing, and information gathering via services such as VirusTotal.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Kiteworks' Maytech Acquisition Reaffirms Commitment to UK Market πŸ•΄



πŸ“– Read

via "Dark Reading".
πŸ•΄ Fake Browser Updates Targeting Mac Systems With Infostealer πŸ•΄

A pervasive ClearFake campaign targeting Windows systems with Atomic Stealer has expanded its social engineering scams to MacOS users, analysts warn.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Hack The Box Launches 5th Annual University CTF Competition πŸ•΄



πŸ“– Read

via "Dark Reading".
🦿 Security Risk Assessment Checklist 🦿

Organizations, regardless of size, face ever-increasing information technology and data security threats. Everything from physical sites to data, applications, networks and systems are under attack. Worse, neither an organization nor its managers need to prove prominent or controversial to prove a target. A security risk assessment should be performed annually, if not quarterly. Consider using ...

πŸ“– Read

via "Tech Republic".
πŸ•΄ Balancing Simplicity and Security in the Digital Experience πŸ•΄

New data shows consumer preferences for security in digital experiences and indicates ways businesses can best protect digital identity in today's digital world.

πŸ“– Read

via "Dark Reading".
🦿 Computer Equipment Disposal policy 🦿

Computers, laptops, servers and other IT equipment are regularly replaced and decommissioned. Off-lease systems must be returned to the manufacturer, some equipment is recycled, and other systems are given to employees or donated. Systems must be properly processed, and sensitive, proprietary and all other organization information must be properly removed prior to discarding the systems. ...

πŸ“– Read

via "Tech Republic".
🦿 Keep Web Traffic Streamlined and Safe With This $29.99 DNS 🦿

With AdGuard DNS, you can block ads, customize parental controls and keep tabs on DNS requests coming in or out β€” all for the lowest price on the web.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity πŸ•΄

Companies must do a delicate dance between consumer privacy protection, upholding their product's efficacy, and de-risking cyber breaches to run the business.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Hamas-Linked APT Wields New SysJoker Backdoor Against Israel πŸ•΄

Gaza Cybergang is using a version of the malware rewritten in the Rust programming language.

πŸ“– Read

via "Dark Reading".
πŸ•΄ General Electric, DARPA Hack Claims Raise National Security Concerns πŸ•΄

Weapons systems data, AI research, and other classified information may be up for sale, not to mention access to other government agencies.

πŸ“– Read

via "Dark Reading".
πŸ”₯1
πŸ•΄ Ardent Health Hospitals Disrupted After Ransomware Attack πŸ•΄

More than two dozen hospitals have been impacted by the breach and are diverting emergency care for patients to other healthcare facilities.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CISA, NCSC Offer a Roadmap, Not Rules, in New Secure AI Guidelines πŸ•΄

US and UK authorities issued new recommendations for companies that build and rely on AI, but they stop short of laying down the law.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cyber Threats to Watch Out for in 2024 πŸ•΄

As cyber threats evolve in 2024, organizations must prepare for deepfakes, extortion, cloud targeting, supply chain compromises, and zero day exploits. Robust security capabilities, employee training, and incident response plans are key.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Role of the CISO in Digital Transformation πŸ•΄

A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are designed and implemented appropriately, and changes are properly managed, with security in mind from the very start. 

πŸ“– Read

via "Dark Reading".