π’ "A limited amount of data has been published": Southern Water confirms ransomware attack as BlackBasta group claims responsibility π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Southern Water said its working closely with relevant authorities to remediate the incident, which BlackBasta claimed responsibility for.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
"A limited amount of data has been published": Southern Water confirms ransomware attack as Black Basta group claims responsibility
Southern Water said itβs working closely with relevant authorities to remediate the incident, which Black Basta claimed responsibility for
βοΈ Using Google Search to Find Software Can Be Risky βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading boobytrapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make searching for software on Google a dicey affair.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Using Google Search to Find Software Can Be Risky
Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and oftenβ¦
πͺ New Year, New Initiatives for the NIST Privacy Framework! πͺ
π Read more.
π Via "NIST"
----------
ποΈ Seen on @cibsecurity
Its been four years since the release of The NIST Privacy Framework A Tool for Improving Privacy Through Enterprise Risk Management, Version 1.0. Since then, many organizations have found it highly valuable for building or improving their privacy programs. Weve also been able to add a variety of resources to support its implementation. Were proud of how much has been accomplished in just a few short years, but were not resting on our laurels. As another, more famous, Dylan once said, the times they are achangin. For example, the past year has seen the release of the NIST AI Risk.π Read more.
π Via "NIST"
----------
ποΈ Seen on @cibsecurity
NIST
New Year, New Initiatives for the NIST Privacy Framework!
Itβs been four years since the release of Th
π΅οΈββοΈ Airline Gets SASE to Modernize Operations π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Cathay, a travel lifestyle brand that includes the Cathay Pacific airline, had a growing cybersecurity problem made worse by its aging technology infrastructure. It solved part of the problem by replacing legacy technology with a modern one that has security built in.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Airline Gets SASE to Modernize Operations
Cathay, a travel lifestyle brand that includes the Cathay Pacific airline, had a growing cybersecurity problem made worse by its aging technology infrastructure. It solved part of the problem by replacing legacy technology with a modern one that has securityβ¦
ποΈ Russian TrickBot Mastermind Gets 5-Year Prison Sentence for Cybercrime Spree ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
40yearold Russian national Vladimir Dunaev has been sentenced to five years and four months in prison for his role in creating and distributing the TrickBot malware, the U.S. Department of Justice DoJ said. The development comes nearly two months after Dunaev pleaded guilty to committing computer fraud and identity theft and conspiracy to commit wire fraud and bank fraud. ".π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Critical Cisco Flaw Lets Hackers Remotely Take Over Unified Comms Systems ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cisco has released patches to address a critical security flaw impacting Unified Communications and Contact Center Solutions products that could permit an unauthenticated, remote attacker to execute arbitrary code on an affected device. Tracked as CVE202420253 CVSS score 9.9, the issue stems from improper processing of userprovided data that a threat actor could abuse to send a.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Microsoft Warns of Widening APT29 Espionage Attacks Targeting Global Orgs ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Microsoft on Thursday said the Russian statesponsored threat actors responsible for a cyber attack on its systems in late November 2023 have been targeting other organizations and that it's currently beginning to notify them. The development comes a day after Hewlett Packard Enterprise HPE revealed that it had been the victim of an attack perpetrated by a hacking crew.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Malicious Ads on Google Target Chinese Users with Fake Messaging Apps ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Chinesespeaking users have been targeted by malicious Google ads for restricted messaging apps like Telegram as part of an ongoing malvertising campaign. "The threat actor is abusing Google advertiser accounts to create malicious ads and pointing them to pages where unsuspecting users will download Remote Administration Trojan RATs instead," Malwarebytes' Jrme Segura said in a.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Data Privacy Week: Companies are Banning Generative AI Due to Privacy Risks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Cisco found that privacy and data security risks have led to over a quarter of organizations banning generative AI, at least temporarily, while a majority have instituted controls.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Data Privacy Week: Companies are Banning Generative AI Due to Privacy Risks
Cisco found that privacy and data security risks have led to over a quarter of organizations banning generative AI, at least temporarily, while a majority have instituted controls
ποΈ Perfecting the Defense-in-Depth Strategy with Automation ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Medieval castles stood as impregnable fortresses for centuries, thanks to their meticulous design. Fast forward to the digital age, and this medieval wisdom still echoes in cybersecurity. Like castles with strategic layouts to withstand attacks, the DefenseinDepth strategy is the modern counterpart a multilayered approach with strategic redundancy and a blend of passive and active security.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ The 23andMe data breach is getting messier by the day π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
23andMe said it was unaware a breach occurred for several months, just weeks after an embarrassing public spat with concerned customers.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
The 23andMe data breach is getting messier by the day
23andMe said it was unaware a breach occurred for several months, just weeks after an embarrassing public spat with concerned customers
π¦Ώ Malwarebytes vs. Norton (2024): Which Antivirus Solution Is Better? π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Which is better, Malwarebytes or Norton? Read this guide to find out which one is better in terms of features, performance and protection against malware.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Malwarebytes vs. Norton (2024): Which Antivirus Is Better?
Which is better, Malwarebytes or Norton? Read this guide to find out which one is better in terms of features, performance and protection against malware.
π New Leaks Expose Web of Iranian Intelligence and Cyber Companies π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Recorded Future analyzed leaks describing the close relationship between the Iranian government and Iranaligned APT groups.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New Leaks Expose Web of Iranian Intelligence and Cyber Companies
Recorded Future analyzed leaks describing the close relationship between the Iranian government and Iran-aligned APT groups
π΅οΈββοΈ CISO Corner: Deep Dive Into SecOps, Insurance, & CISOs' Evolving Role π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
CISO Corner: Deep Dive Into SecOps, Insurance, & CISOs' Evolving Role
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps.
𧨠Protect What Matters on Data Privacy Day π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
Imagine a Privacy Facts label on the apps, devices, and websites you use. Like a digital version of the Nutrition... The post Protect What Matters on Data Privacy Day appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
Protect What Matters on Data Privacy Day | McAfee Blog
Imagine a βPrivacy Factsβ label on the apps, devices, and websites you use. Like a digital version of the βNutrition Factsβ on the sides of your cereal
π΅οΈββοΈ ICS Ransomware Danger Rages Despite Fewer Attacks π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Refined tactics, increased collaboration between groups, and continued success exploiting zerodays is helping ICS ransomware attackers inflict more damage, researchers find.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
ICS Ransomware Danger Rages Despite Fewer Attacks
Refined tactics, increased collaboration between groups, and continued success exploiting zero-days is helping ICS ransomware attackers inflict more damage, researchers find.
π΅οΈββοΈ Redefining Cybersecurity for a Comprehensive Security Posture π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The integration of different disciplines of cybersecurity and fraud management is a necessary evolution in the face of increasingly sophisticated digital threats.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Redefining Cybersecurity for a Comprehensive Security Posture
The integration of different disciplines of cybersecurity and fraud management is a necessary evolution in the face of increasingly sophisticated digital threats.
π΅οΈββοΈ Saudi Arabia Boosts Railway Cybersecurity π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Saudi rail provider partners will help Saudi Telecommunication Company stc to keep its security on track.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Saudi Arabia Boosts Railway Cybersecurity
Saudi rail provider partners will help Saudi Telecommunication Company (stc) to keep its security on track.
π Ukraine Arrests Hacker for Assisting Russian Missile Strikes π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Ukraines security services said that the IT specialist from Kharkiv targeted government websites and provided intelligence to Russia to carry out missile strikes.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ukraine Arrests Hacker for Assisting Russian Missile Strikes
Ukraineβs security services said that the hacker targeted government websites and provided intelligence to Russia to carry out missile strikes
π§ DORA and your quantum-safe cryptography migration π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Quantum computing is a new paradigm with the potential to tackle problems that classical computers cannot solve today. Unfortunately, this also introduces threats to the digital economy and particularly the financial sector. The Digital Operational Resilience Act DORA is a regulatory framework that introduces uniform requirements across the European Union EU to achieve a high The post DORA and your quantumsafe cryptography migration appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
DORA and your quantum-safe cryptography migration
Quantum computing represents a unique threat to the financial sector. Soon EU businesses must look to the Digital Operational Resilience Act for guidance.
βοΈ Who is Alleged Medibank Hacker Aleksandr Ermakov? βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Authorities in Australia, the United Kingdom and the United States this week levied financial sanctions against a Russian man accused of stealing data on nearly 10 million customers of the Australian health insurance giant Medibank. 33yearold Aleksandr Ermakov allegedly stole and leaked the Medibank data while working with one of Russia's most destructive ransomware groups, but little more is shared about the accused. Here's a closer look at the activities of Mr. Ermakov's alleged hacker handles.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Who is Alleged Medibank Hacker Aleksandr Ermakov?
Authorities in Australia, the United Kingdom and the United States this week levied financial sanctions against a Russian man accused of stealing data on nearly 10 million customers of the Australian health insurance giant Medibank. 33-year-old Aleksandrβ¦