π¦Ώ What Do Appleβs EU App Store Changes Mean for App Developers? π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
The EU says the DMA keeps markets fair and open Apple says the DMA introduces security problems. Apple is leveling fees against independent app stores.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
What Do Appleβs EU App Store Changes Mean for App Developers?
The EU says the DMA keeps markets fair and open; Apple says the DMA introduces security problems. Apple is leveling fees against independent app stores.
β€1
π¦Ώ Ransomwareβs Impact Could Include Heart Attacks, Strokes & PTSD π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
New research details the possible effects of ransomware attacks on businesses and staff, society, the economy and national security, highlighting that its impact on mental and physical health is often overlooked.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Ransomwareβs Impact Could Include Heart Attacks, Strokes & PTSD
New research details the possible impact of ransomware attacks on businesses and staff, society, the economy and national security.
π1
π΅οΈββοΈ SolarWinds Files Motion to Dismiss SEC Lawsuit π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Responding to SEC charges, SolarWinds fired back with a detailed defense of how a Russianbacked cyber espionage attack on its system was handled.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
SolarWinds Files Motion to Dismiss SEC Lawsuit
Responding to SEC charges, SolarWinds fired back with a detailed defense of how a Russian-backed cyber espionage attack on its system was handled.
π΅οΈββοΈ PoC Exploits Heighten Risks Around Critical New Jenkins Vuln π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The arbitrary fileread flaw can lead to remote code execution.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
PoC Exploits Heighten Risks Around Critical New Jenkins Vuln
The arbitrary file-read flaw can lead to remote code execution.
π΅οΈββοΈ Keenan & Associates Reports Data Breach Exposing Social Security Numbers of More Than 1.5M π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Keenan & Associates Reports Data Breach Exposing Social Security Numbers of More Than 1.5M
ποΈ Juniper Networks Releases Urgent Junos OS Updates for High-Severity Flaws ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Juniper Networks has released outofband updates to address highseverity flaws in SRX Series and EX Series that could be exploited by a threat actor to take control of susceptible systems. The vulnerabilities, tracked as CVE202421619 and CVE202421620, are rooted in the JWeb component and impact all versions of Junos OS. Two other shortcomings, CVE202336846 and.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
ποΈ New ZLoader Malware Variant Surfaces with 64-bit Windows Compatibility ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat hunters have identified a new campaign that delivers the ZLoader malware, resurfacing nearly two years after the botnet's infrastructure was dismantled in April 2022. A new variant of the malware is said to have been in development since September 2023, Zscaler ThreatLabz said in an analysis published this month. "The new version of Zloader made significant changes to the loader.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π UK House of Lords Calls For Legislation on Facial Recognition Tech π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The House of Lords has questioned the legal basis for police use of facial recognition and wants parliament to legislate.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
UK House of Lords Calls For Legislation on Facial Recognition Tech
The House of Lords has questioned the legal basis for police use of facial recognition and wants parliament to legislate
π FBI: Scammers Are Sending Couriers to Collect Cash From Victims π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The FBI is warning the public not to fall for scams where they are urged to liquidate assets and hand them to couriers for safekeeping.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
FBI: Scammers Are Sending Couriers to Collect Cash From Victims
The FBI is warning the public not to fall for scams where they are urged to liquidate assets and hand them to couriers for βsafekeepingβ
ποΈ Top Security Posture Vulnerabilities Revealed ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Each New Year introduces a new set of challenges and opportunities for strengthening our cybersecurity posture. It's the nature of the field the speed at which malicious actors carry out advanced persistent threats brings a constant, evolving battle for cyber resilience. The excitement in cybersecurity lies in this continuous adaptation and learning, always staying one step ahead of potential.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Italian Data Protection Watchdog Accuses ChatGPT of Privacy Violations ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Italy's data protection authority DPA has notified ChatGPTmaker OpenAI of supposedly violating privacy laws in the region. "The available evidence pointed to the existence of breaches of the provisions contained in the E.U. GDPR General Data Protection Regulation," the Garante per la protezione dei dati personali aka the Garante said in a statement on Monday. It also said it.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
β€1
π§ Mapping attacks on generative AI to business impact π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
In recent months, weve seen government and business leaders put an increased focus on securing AI models. If generative AI is the next big platform to transform the services and functions on which society as a whole depends, ensuring that technology is trusted and secure must be businesses top priority. While generative AI adoption is The post Mapping attacks on generative AI to business impact appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
Mapping attacks on generative AI to business impact
If generative AI is the next big platform to transform the services and functions on which society depends, ensuring that technology is trusted and secure must be businessesβ top priority.
π’ Salesforce-based phishing attacks surge 109% since the start of 2024 π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Threat analysts have uncovered a sophisticated phishing attack imitating emails from Salesforce that are likely bypassing many business email filters.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Salesforce-based phishing attacks surge 109% since the start of 2024
Threat analysts have uncovered a sophisticated phishing attack imitating emails from Salesforce that are likely bypassing many business email filters
π¦
Protected: Active Exploitation of Atlassian Confluence RCE Vulnerability (CVE-2023-22527) π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
There is no excerpt because this is a protected post. The post Protected Active Exploitation of Atlassian Confluence RCE Vulnerability CVE202322527 appeared first on Cyble. The post Protected Active Exploitation of Atlassian Confluence RCE Vulnerability CVE202322527 appeared first on Cyble.π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Exploitation Of Atlassian Confluence RCE Vulnerability
Cyble's Global Sensor Intelligence (CGSI) network picks up scanning attempts aiming to exploit a recent Vulnerability in Atlassian Confluence.
ποΈ China-Linked Hackers Target Myanmar's Top Ministries with Backdoor Blitz ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Chinabased threat actor known as Mustang Panda is suspected to have targeted Myanmar's Ministry of Defence and Foreign Affairs as part of twin campaigns designed to deploy backdoors and remote access trojans. The findings come from CSIRTCTI, which said the activities took place in November 2023 and January 2024 after artifacts in connection with the attacks were uploaded to the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Ransomware Incidents Hit Record High, But Law Enforcement Takedowns Slow Growth π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
New data from Corvus found that ransomware incidents rose by 68 in 2023 compared to 2022, but law enforcement takedowns led to a fall in Q4.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ransomware Incidents Hit Record High, But Law Enforcement Takedowns Slow Growth
New data from Corvus found that ransomware incidents rose by 68% in 2023 compared to 2022, but law enforcement takedowns led to a fall in Q4
π΅οΈββοΈ Q&A: How Israeli Cybersecurity Companies Endure Through the Conflict π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
As Israeli employees get called up for reserve military duty, the impact on their day jobs and employers is still being calculated.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Q&A: How Israeli Cybersecurity Companies Endure Through the Conflict
As Israeli employees get called up for reserve military duty, the impact on their day jobs and employers is still being calculated.
π Falco 0.37.0 π
π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Packetstormsecurity
Falco 0.37.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π1
π΅οΈββοΈ Solving the Cybersecurity Skills Gap With Racial Inclusivity π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Addressing the growing demand for cybersecurity professionals is also an opportunity to create a more racially inclusive workforce.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Solving the Cybersecurity Skills Gap With Racial Inclusivity
Addressing the growing demand for cybersecurity professionals is also an opportunity to create a more racially inclusive workforce.
π Rust Payloads Exploiting Ivanti Zero-Days Linked to Sophisticated Sliver Toolkit π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
After analyzing the 12 Rust payloads exploiting Ivanti ConnectSecure vulnerabilities, Synacktiv found they all enabled a sophisticated postexploitation toolkit.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Rust Payloads Exploiting Ivanti Zero-Days Linked to Sophisticated Sliver Toolkit
After analyzing the Rust payloads exploiting Ivanti ConnectSecure vulnerabilities, Synacktiv found they all enabled a post-exploitation toolkit
π΅οΈββοΈ UAE Government Cyber Chief: We Face 50K Cyberattacks Daily π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The Emirates see phishing emails, DDoS attacks, and ransomware, as well as port scans, regularly.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
UAE Government Cyber Chief: We Face 50K Cyberattacks Daily
The Emirates face phishing emails, DDoS attacks, and ransomware, as well as port scans, on a regular basis.