πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Teen Found Alive After β€œCyber-Kidnapping” Incident πŸ“”

A Chinese foreign exchange student has been found after online scammers extorted money from his parents

πŸ“– Read

via "Infosecurity Magazine".
πŸ‘1
πŸ“’ Google and the University of Cambridge deal looks to pioneer responsible AI research πŸ“’

Google will collaborate with university researchers on AI for good

πŸ“– Read

via "ITPro".
πŸ–‹οΈ The Definitive Enterprise Browser Buyer's Guide πŸ–‹οΈ

Security stakeholders have come to realize that the prominent role the browser has in the modern corporate environment requires a re-evaluation of how it is managed and protected. While not long-ago web-borne risks were still addressed by a patchwork of endpoint, network, and cloud solutions, it is now clear that the partial protection these solutions provided is no longer sufficient. Therefore,

πŸ“– Read

via "The Hacker News".
❀1
πŸ–‹οΈ Google Settles $5 Billion Privacy Lawsuit Over Tracking Users in 'Incognito Mode' πŸ–‹οΈ

Google has agreed to settle a lawsuit filed in June 2020 that alleged that the company misled users by tracking their surfing activity who thought that their internet use remained private when using the β€œincognito” or β€œprivate” mode on web browsers.The class-action lawsuit sought at least $5 billion in damages. The settlement terms were not disclosed.The plaintiffs had

πŸ“– Read

via "The Hacker News".
πŸ“” Australian Court Service Hacked, Hearing Recordings at Risk πŸ“”

Court Services Victoria said the incident may have compromised recordings involving people whose identities are protected

πŸ“– Read

via "Infosecurity Magazine".
πŸ“’ Google settles $5 billion privacy lawsuit ahead of cookie phase-out πŸ“’

Google has agreed to settle a $5 billion lawsuit over claims the it covertly tracked millions of users

πŸ“– Read

via "ITPro".
πŸ“’ Generative AI poses a β€œmajor risk” to UK national security as report warns over risk of radicalization πŸ“’

Terrorism tsar John Hall has called for new laws to mitigate the risks of generative AI

πŸ“– Read

via "ITPro".
πŸ“’ Hackers use LinkedIn to target UK nuclear waste firm πŸ“’

Radioactive Waste Management said attackers have leveraged LinkedIn in a spear phishing campaign

πŸ“– Read

via "ITPro".
πŸ•΄ 10 Years After Yahoo Breach, What's Changed? (Not Much) πŸ•΄

Yahoo customers suffered the largest data breaches in history by some measures. But a decade on, experts warn, we still haven't learned our lesson.

πŸ“– Read

via "Dark Reading".
πŸ›  Stegano 0.11.3 πŸ› 

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

πŸ“– Read

via "Packet Storm Security".
πŸ“” Over $80m in Crypto Stolen in Cyber-Attack on Orbit Chain πŸ“”

Orbit Chain said that the stolen cryptocurrency currently remains unmoved

πŸ“– Read

via "Infosecurity Magazine".
πŸ“’ Russia-linked group could be behind Australian state court cyber attack πŸ“’

A ransomware group was able to gain access to a database containing courtroom recordings of trials between November and December

πŸ“– Read

via "ITPro".
πŸ•΄ Startups Scramble to Build Immediate AI Security πŸ•΄

AI may be inherently insecure, but only a handful of startups have put forward real visions to mitigate AI's threats and keep data private.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Localization Mandates, AI Regs to Pose Major Data Challenges in 2024 πŸ•΄

With more than three-quarters of countries adopting some form of data localization and, soon, three-quarters of people worldwide protected by privacy rules, companies need to take care.

πŸ“– Read

via "Dark Reading".
πŸ•΄ CISO Planning for 2024 May Struggle When It Comes to AI πŸ•΄

Artificial intelligence (AI) is constantly evolving. How can security executives plan for something so unpredictable?

πŸ“– Read

via "Dark Reading".
πŸ•΄ Israel Battles Spike in Wartime Hacktivist, OT Cyberattacks πŸ•΄

Israel's cybersecurity industry made strides in the past year despite the backdrop of the war in Gaza.

πŸ“– Read

via "Dark Reading".
πŸ›  RansomLord Anti-Ransomware Exploit Tool 2 πŸ› 

RansomLord is a proof-of-concept tool that automates the creation of PE files, used to compromise ransomware pre-encryption. This tool uses dll hijacking to defeat ransomware by placing PE files in the x32 or x64 directories where the program is run from.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Google Settles Lawsuit Over Tracking 'Incognito Mode' Chrome Users πŸ•΄

Google tracked privacy-conscious Internet users, and now it's paying for it.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cybercriminals Share Millions of Stolen Records During Holiday Break πŸ•΄

The "Leaksmus" event on the Dark Web exposed some 50 million records containing sensitive information from people all around the world.

πŸ“– Read

via "Dark Reading".
‼️CVE-2024-0185‼️

A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboardteacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB249443.

πŸ“– Read more

Via "National Vulnerability Database"
‼️CVE-2024-0186‼️

A vulnerability classified as problematic has been found in HuiRan Host Reseller System up to 2.0.0. Affected is an unknown function of the file userindexfindpass?do4 of the component HTTP POST Request Handler. The manipulation leads to weak password recovery. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB249444.

πŸ“– Read more

Via "National Vulnerability Database"