๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25K subscribers
88.4K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿฆฟ Security Risk Assessment Checklist ๐Ÿฆฟ

Organizations, regardless of size, face ever-increasing information technology and data security threats. Everything from physical sites to data, applications, networks and systems are under attack. Worse, neither an organization nor its managers need to prove prominent or controversial to prove a target. A security risk assessment should be performed annually, if not quarterly. Consider using ...

๐Ÿ“– Read

via "Tech Republic".
๐Ÿ•ด Balancing Simplicity and Security in the Digital Experience ๐Ÿ•ด

New data shows consumer preferences for security in digital experiences and indicates ways businesses can best protect digital identity in today's digital world.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿฆฟ Computer Equipment Disposal policy ๐Ÿฆฟ

Computers, laptops, servers and other IT equipment are regularly replaced and decommissioned. Off-lease systems must be returned to the manufacturer, some equipment is recycled, and other systems are given to employees or donated. Systems must be properly processed, and sensitive, proprietary and all other organization information must be properly removed prior to discarding the systems. ...

๐Ÿ“– Read

via "Tech Republic".
๐Ÿฆฟ Keep Web Traffic Streamlined and Safe With This $29.99 DNS ๐Ÿฆฟ

With AdGuard DNS, you can block ads, customize parental controls and keep tabs on DNS requests coming in or out โ€” all for the lowest price on the web.

๐Ÿ“– Read

via "Tech Republic".
๐Ÿ•ด Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity ๐Ÿ•ด

Companies must do a delicate dance between consumer privacy protection, upholding their product's efficacy, and de-risking cyber breaches to run the business.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Hamas-Linked APT Wields New SysJoker Backdoor Against Israel ๐Ÿ•ด

Gaza Cybergang is using a version of the malware rewritten in the Rust programming language.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด General Electric, DARPA Hack Claims Raise National Security Concerns ๐Ÿ•ด

Weapons systems data, AI research, and other classified information may be up for sale, not to mention access to other government agencies.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ”ฅ1
๐Ÿ•ด Ardent Health Hospitals Disrupted After Ransomware Attack ๐Ÿ•ด

More than two dozen hospitals have been impacted by the breach and are diverting emergency care for patients to other healthcare facilities.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด CISA, NCSC Offer a Roadmap, Not Rules, in New Secure AI Guidelines ๐Ÿ•ด

US and UK authorities issued new recommendations for companies that build and rely on AI, but they stop short of laying down the law.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Cyber Threats to Watch Out for in 2024 ๐Ÿ•ด

As cyber threats evolve in 2024, organizations must prepare for deepfakes, extortion, cloud targeting, supply chain compromises, and zero day exploits. Robust security capabilities, employee training, and incident response plans are key.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด The Role of the CISO in Digital Transformation ๐Ÿ•ด

A successful CISO should play a leading role in digital transformation and cloud migration initiatives in their organization. The CISO is responsible for making sure technical security controls are designed and implemented appropriately, and changes are properly managed, with security in mind from the very start. 

๐Ÿ“– Read

via "Dark Reading".
๐Ÿฆฟ Australian SMBs Feel the Cyber Security Heat: Hereโ€™s What IT Pros Can Do to Help ๐Ÿฆฟ

60% of Australian small businesses donโ€™t survive a cyber breach. What can the overworked IT pros in small businesses do with limited budgets against the cyber crime wave?

๐Ÿ“– Read

via "Tech Republic".
โ™Ÿ๏ธ ID Theft Service Resold Access to USInfoSearch Data โ™Ÿ๏ธ

One of the cybercrime underground's more active sellers of Social Security numbers, background and credit reports has been pulling data from hacked accounts at the U.S. consumer data broker USinfoSearch, KrebsOnSecurity has learned.

๐Ÿ“– Read

via "Krebs on Security".
๐Ÿ›  Proxmark3 4.17511 Custom Firmware ๐Ÿ› 

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware. This release is nicknamed Faraday.

๐Ÿ“– Read

via "Packet Storm Security".
๐Ÿฆฟ AWS Launches New Chips for AI Training and Its Own AI Chatbot ๐Ÿฆฟ

At AWS re:Invent, NVIDIA contributed GPUs to Amazon's cloud efforts and added a retriever system to its AI Enterprise Software platform on AWS Marketplace.

๐Ÿ“– Read

via "Tech Republic".
๐Ÿฆฟ New AI Security Guidelines Published by NCSC, CISA & More International Agencies ๐Ÿฆฟ

The Guidelines for Secure AI System Development have been drawn up to help developers ensure security is baked into the heart of new artificial intelligence models.

๐Ÿ“– Read

via "Tech Republic".
๐Ÿฆฟ Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs ๐Ÿฆฟ

Hunters researchers noted the vulnerability could lead to privilege escalation. Google said the report โ€œdoes not identify an underlying security issue in our products.โ€

๐Ÿ“– Read

via "Tech Republic".
๐Ÿฆฟ Make Life Safer and Easier With This Password Manager for Just $15 ๐Ÿฆฟ

Store unlimited passwords in unlimited vaults on multiple servers, customize fields, use the tool on your smart watch, enjoy built-in authenticator and much more.

๐Ÿ“– Read

via "Tech Republic".
โค1๐Ÿค”1
๐Ÿฆฟ Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs ๐Ÿฆฟ

Hunters researchers noted the vulnerability could lead to privilege escalation. Google said the report โ€œdoes not identify an underlying security issue in our products.โ€

๐Ÿ“– Read

via "Tech Republic".
๐Ÿฆฟ Apple Security Update Fixes Zero-Day Webkit Exploits ๐Ÿฆฟ

Apple recommends users update to iOS 17.1.2, iPadOS 17.1.2 and macOS 14.1.2. Googleโ€™s Threat Analysis Group discovered these security bugs.

๐Ÿ“– Read

via "Tech Republic".
๐Ÿฆฟ 2023 Gartnerยฎ Market Guide for Security, Orchestration, Automation and Response Solutions ๐Ÿฆฟ

โ€œThe security technology market is in a state of general overload with pressure on budgets, staff hiring/retention, and having too many point solutions are pervasive issues for organizations today.โ€ Security and risk management leaders should evaluate how security orchestration, automation and response (SOAR) can support and optimize their broader security operations by automating repetitive tasks; ...

๐Ÿ“– Read

via "Tech Republic".
โค1