πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ TechSlayer chronicles - Digital defenders: πŸ“’

Securing hybrid cloud infrastructure from alien forces.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The basics and business of trusted security πŸ“’

Deploy technology with confidence.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Trusted security from the edge to the cloud πŸ“’

Counter cyber risks and threats.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Putting Trusted Security to Work πŸ“’

Securely manage servers across their entire lifecycle.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ North Korea APT Triumvirate Spied on South Korean Defense Industry For Years πŸ•΅οΈβ€β™‚οΈ

Lazarus, Kimsuky, and Andariel all got in on the action, stealing "important" data from firms responsible for defending their southern neighbors from them.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape 🦿

A new report by cyber security firm Radware identifies the four main impacts of AI on the threat landscape emerging this year.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Lights On in Leicester: Streetlights in Disarray After Cyberattack πŸ•΅οΈβ€β™‚οΈ

The city is stymied in efforts to pinpoint the issue since its IT systems were shut down in the wake of the cyberattack.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ KnowBe4 to Acquire Egress πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Black Girls Do Engineer Signs Education Partnership Agreement With NSA πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Attacker Social-Engineered Backdoor Code Into XZ Utils πŸ•΅οΈβ€β™‚οΈ

Unlike the SolarWinds and CodeCov incidents, all that it took for an adversary to nearly pull off a massive supply chain attack was some slick social engineering and a string of pressure emails.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Postpones Third-Party Cookie Deprecation Amid U.K. Regulatory Scrutiny πŸ–‹οΈ

Google has once again pushed its plans to deprecate thirdparty tracking cookies in its Chrome web browser as it works to address outstanding competition concerns from U.K. regulators over its Privacy Sandbox initiative. The tech giant said it's working closely with the U.K. Competition and Markets Authority CMA and hopes to achieve an agreement by the end of the year. As part of the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage πŸ–‹οΈ

A new malware campaign leveraged two zeroday flaws in Cisco networking gear to deliver custom malware and facilitate covert data collection on target environments. Cisco Talos, which dubbed the activity ArcaneDoor, attributing it as the handiwork of a previously undocumented sophisticated statesponsored actor it tracks under the name UAT4356 aka Storm1849 by Microsoft. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” High Performance Podcast Duo to Unveil Secrets of Success at Infosecurity Europe 2024 πŸ“”

Jake Humphrey and Professor Damian Hughes, the minds behind the High Performance Podcast, share their top nonnegotiable behaviours for success in cybersecurity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” BEC and Fund Transfer Fraud Top Insurance Claims πŸ“”

Emailborne fraud accounted for more insurance claims than any other category in 2023, says Coalition.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Hackers have been abusing a popular antivirus solution to crack corporate networks for five years πŸ“’

Hackers have been using a sophisticated maninthemiddle attack to exploit a vulnerability in an antivirus solution to spread backdoors on corporate networks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Get a Lifetime Subscription of FastestVPN for just $40 🦿

In the market for a new VPN? The toprated FastestVPN has been reduced to just 39.99 for a lifetime subscription at TechRepublic Academy.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Online Banking Security Still Not Up to Par, Says Which? πŸ“”

Consumer rights group Which? has found more security gaps in UK banking sites and apps.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 11% of Cybersecurity Teams Have Zero Women πŸ“”

A new ISC2 study highlights the lack of diversity in cybersecurity with only 4 of teams having a majority of women, while 11 have none at all.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions πŸ–‹οΈ

The U.S. Department of Justice DoJ on Wednesday announced the arrest of two cofounders of a cryptocurrency mixer called Samourai and seized the service for allegedly facilitating over 2 billion in illegal transactions and for laundering more than 100 million in criminal proceeds. To that end, Keonne Rodriguez, 35, and William Lonergan Hill, 65, have been charged.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🀯1
πŸ–‹οΈ Network Threats: A Step-by-Step Attack Demonstration πŸ–‹οΈ

Follow this reallife network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense strategy. Surprisingly, most network attacks are not exceptionally sophisticated, technologically advanced, or reliant on zeroday tools that exploit.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” DragonForce Ransomware Group Uses LockBit's Leaked Builder πŸ“”

Cyber threat intelligence provider Cyble found that DragonForce was using a ransomware binary based on LockBit Blacks builder.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1