πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Data Privacy Week: Companies are Banning Generative AI Due to Privacy Risks πŸ“”

Cisco found that privacy and data security risks have led to over a quarter of organizations banning generative AI, at least temporarily, while a majority have instituted controls.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Perfecting the Defense-in-Depth Strategy with Automation πŸ–‹οΈ

Medieval castles stood as impregnable fortresses for centuries, thanks to their meticulous design. Fast forward to the digital age, and this medieval wisdom still echoes in cybersecurity. Like castles with strategic layouts to withstand attacks, the DefenseinDepth strategy is the modern counterpart a multilayered approach with strategic redundancy and a blend of passive and active security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The 23andMe data breach is getting messier by the day πŸ“’

23andMe said it was unaware a breach occurred for several months, just weeks after an embarrassing public spat with concerned customers.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Malwarebytes vs. Norton (2024): Which Antivirus Solution Is Better? 🦿

Which is better, Malwarebytes or Norton? Read this guide to find out which one is better in terms of features, performance and protection against malware.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Leaks Expose Web of Iranian Intelligence and Cyber Companies πŸ“”

Recorded Future analyzed leaks describing the close relationship between the Iranian government and Iranaligned APT groups.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISO Corner: Deep Dive Into SecOps, Insurance, & CISOs' Evolving Role πŸ•΅οΈβ€β™‚οΈ

Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 Protect What Matters on Data Privacy Day 🧨

Imagine a Privacy Facts label on the apps, devices, and websites you use. Like a digital version of the Nutrition... The post Protect What Matters on Data Privacy Day appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ ICS Ransomware Danger Rages Despite Fewer Attacks πŸ•΅οΈβ€β™‚οΈ

Refined tactics, increased collaboration between groups, and continued success exploiting zerodays is helping ICS ransomware attackers inflict more damage, researchers find.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Redefining Cybersecurity for a Comprehensive Security Posture πŸ•΅οΈβ€β™‚οΈ

The integration of different disciplines of cybersecurity and fraud management is a necessary evolution in the face of increasingly sophisticated digital threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Saudi Arabia Boosts Railway Cybersecurity πŸ•΅οΈβ€β™‚οΈ

Saudi rail provider partners will help Saudi Telecommunication Company stc to keep its security on track.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ukraine Arrests Hacker for Assisting Russian Missile Strikes πŸ“”

Ukraines security services said that the IT specialist from Kharkiv targeted government websites and provided intelligence to Russia to carry out missile strikes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 DORA and your quantum-safe cryptography migration 🧠

Quantum computing is a new paradigm with the potential to tackle problems that classical computers cannot solve today. Unfortunately, this also introduces threats to the digital economy and particularly the financial sector. The Digital Operational Resilience Act DORA is a regulatory framework that introduces uniform requirements across the European Union EU to achieve a high The post DORA and your quantumsafe cryptography migration appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Who is Alleged Medibank Hacker Aleksandr Ermakov? β™ŸοΈ

Authorities in Australia, the United Kingdom and the United States this week levied financial sanctions against a Russian man accused of stealing data on nearly 10 million customers of the Australian health insurance giant Medibank. 33yearold Aleksandr Ermakov allegedly stole and leaked the Medibank data while working with one of Russia's most destructive ransomware groups, but little more is shared about the accused. Here's a closer look at the activities of Mr. Ermakov's alleged hacker handles.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Series of Cyberattacks Hit Ukrainian Critical Infrastructure Organizations πŸ•΅οΈβ€β™‚οΈ

It's unclear if the attacks which hit oil and gas, postal service, transport safety, and railway organizations in the nation were related.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Shares New Guidance in Wake of 'Midnight Blizzard' Cyberattack πŸ•΅οΈβ€β™‚οΈ

Threat actors created and abused OAuth apps to access Microsoft's corporate email environment and remain there for weeks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Newly ID'ed Chinese APT Hides Backdoor in Software Updates πŸ•΅οΈβ€β™‚οΈ

The threat actor went more than half a decade before being discovered thanks to a remarkable backdoor delivered in invisible adversaryinthemiddle attacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Black Kite Unveils Monthly Ransomware Dashboards πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Wyden Releases Documents Confirming the NSA Buys Americans' Internet Browsing Records πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ NRC Issues Recommendations for Better Network, Software Security πŸ•΅οΈβ€β™‚οΈ

The Network Resilience Coalition pushes adoption of standards like SSDF, OpenEoX and CISA's Secure By Design and Default framework.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AllaKore RAT Malware Targeting Mexican Firms with Financial Fraud Tricks πŸ–‹οΈ

Mexican financial institutions are under the radar of a new spearphishing campaign that delivers a modified version of an opensource remote access trojan called AllaKore RAT. The BlackBerry Research and Intelligence Team attributed the activity to an unknown Latin Americanbased financially motivated threat actor. The campaign has been active since at least 2021. "Lures use Mexican Social.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Midnight Blizzard claims another big tech scalp with HPE hack just days after Microsoft breach - and more victims could be coming πŸ“’

Microsoft has warned Midnight Blizzard may have hacked a raft of other organizations in addition to itself and HPE, and has begun warning potential victims.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity