πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ KnowBe4 to Acquire Egress πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Black Girls Do Engineer Signs Education Partnership Agreement With NSA πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Attacker Social-Engineered Backdoor Code Into XZ Utils πŸ•΅οΈβ€β™‚οΈ

Unlike the SolarWinds and CodeCov incidents, all that it took for an adversary to nearly pull off a massive supply chain attack was some slick social engineering and a string of pressure emails.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Postpones Third-Party Cookie Deprecation Amid U.K. Regulatory Scrutiny πŸ–‹οΈ

Google has once again pushed its plans to deprecate thirdparty tracking cookies in its Chrome web browser as it works to address outstanding competition concerns from U.K. regulators over its Privacy Sandbox initiative. The tech giant said it's working closely with the U.K. Competition and Markets Authority CMA and hopes to achieve an agreement by the end of the year. As part of the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage πŸ–‹οΈ

A new malware campaign leveraged two zeroday flaws in Cisco networking gear to deliver custom malware and facilitate covert data collection on target environments. Cisco Talos, which dubbed the activity ArcaneDoor, attributing it as the handiwork of a previously undocumented sophisticated statesponsored actor it tracks under the name UAT4356 aka Storm1849 by Microsoft. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” High Performance Podcast Duo to Unveil Secrets of Success at Infosecurity Europe 2024 πŸ“”

Jake Humphrey and Professor Damian Hughes, the minds behind the High Performance Podcast, share their top nonnegotiable behaviours for success in cybersecurity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” BEC and Fund Transfer Fraud Top Insurance Claims πŸ“”

Emailborne fraud accounted for more insurance claims than any other category in 2023, says Coalition.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Hackers have been abusing a popular antivirus solution to crack corporate networks for five years πŸ“’

Hackers have been using a sophisticated maninthemiddle attack to exploit a vulnerability in an antivirus solution to spread backdoors on corporate networks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Get a Lifetime Subscription of FastestVPN for just $40 🦿

In the market for a new VPN? The toprated FastestVPN has been reduced to just 39.99 for a lifetime subscription at TechRepublic Academy.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Online Banking Security Still Not Up to Par, Says Which? πŸ“”

Consumer rights group Which? has found more security gaps in UK banking sites and apps.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 11% of Cybersecurity Teams Have Zero Women πŸ“”

A new ISC2 study highlights the lack of diversity in cybersecurity with only 4 of teams having a majority of women, while 11 have none at all.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions πŸ–‹οΈ

The U.S. Department of Justice DoJ on Wednesday announced the arrest of two cofounders of a cryptocurrency mixer called Samourai and seized the service for allegedly facilitating over 2 billion in illegal transactions and for laundering more than 100 million in criminal proceeds. To that end, Keonne Rodriguez, 35, and William Lonergan Hill, 65, have been charged.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🀯1
πŸ–‹οΈ Network Threats: A Step-by-Step Attack Demonstration πŸ–‹οΈ

Follow this reallife network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense strategy. Surprisingly, most network attacks are not exceptionally sophisticated, technologically advanced, or reliant on zeroday tools that exploit.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” DragonForce Ransomware Group Uses LockBit's Leaked Builder πŸ“”

Cyber threat intelligence provider Cyble found that DragonForce was using a ransomware binary based on LockBit Blacks builder.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
🧠 NIST’s role in the global tech race against AI 🧠

Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology NIST has been put in charge of launching a new public working group on artificial intelligence AI that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology. However, recent The post NISTs role in the global tech race against AI appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” State-Sponsored Espionage Campaign Exploits Cisco Vulnerabilities πŸ“”

An advisory from Cisco Talos has highlighted a sophisticated cyberespionage campaign targeting government networks globally.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ SolarWinds 2024: Where Do Cyber Disclosures Go From Here? πŸ•΅οΈβ€β™‚οΈ

Get updated advice on how, when, and where we should disclose cybersecurity incidents under the SEC's fourday rule after SolarWinds, and join the call to revamp the rule to remediate first.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Takes Down Illegal Cryptocurrency Mixing Service Samourai Wallet πŸ“”

The two founders of Samourai Wallet have been charged with money laundering and unlicensed moneytransmitting offenses.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Digital Blitzkrieg: Unveiling Cyber-Logistics Warfare πŸ•΅οΈβ€β™‚οΈ

Cyberattacks on logistics are becoming increasingly common, and the potential impact is enormous.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cisco Zero-Days Anchor 'ArcaneDoor' Cyber Espionage Campaign πŸ•΅οΈβ€β™‚οΈ

Attacks by a previously unknown threat actor leveraged two bugs in firewall devices to install custom backdoors on several government networks globally.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Women in Cybersecurity: ISC2 Survey Shows Pay Gap and Benefits of Inclusive Teams 🦿

About 23 of security teams include women, ISC2 found in its Cybersecurity Workforce Study.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity