π’ Stealthy malware: The threats hiding in plain sight π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
As malicious software becomes increasingly difficult to detect, businesses must act to counter the stealthy malware threat.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Stealthy malware: The threats hiding in plain sight
As malicious software becomes increasingly difficult to detect, businesses must act to counter the stealthy malware threat
π§ AI cybersecurity solutions detect ransomware in under 60 seconds π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Worried about ransomware? If so, its not surprising. According to the World Economic Forum, for large cyber losses 1 million, the number of cases in which data is exfiltrated is increasing, doubling from 40 in 2019 to almost 80 in 2022. And more recent activity is tracking even higher. Meanwhile, other dangers are appearing on The post AI cybersecurity solutions detect ransomware in under 60 seconds appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
AI cybersecurity solutions detect ransomware in under 60 seconds
As cyber criminals make use of AI tools, cybersecurity pros have to keep up. New security solutions may offer an exciting edge against ransomware attacks.
π Millions of Malicious Containers Found on Docker Hub π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
According to JFrog, approximately 25 of all repositories lack useful functionality and serve as vehicles for spam and malware.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Millions of Malicious Containers Found on Docker Hub
According to JFrog, approximately 25% of all repositories lack useful functionality and serve as vehicles for spam and malware
π Disinformation: EU Opens Probe Against Facebook and Instagram Ahead of Election π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Metas moderation failings could allow coordinated disinformation campaigns to thrive in the runup to the EU election.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Disinformation: EU Opens Probe Against Facebook and Instagram Ahead of Election
Metaβs moderation failings could allow coordinated disinformation campaigns to thrive in the run-up to the EU election
π Ransom Payments Surge by 500% to an Average of $2m π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Sophos found that the average ransom payment was 2m in 2023, with 63 of ransom demands 1m or more.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ransom Payments Surge by 500% to an Average of $2m
Sophos found that the average ransom payment was $2m in 2023, with 63% of ransom demands $1m or more
βοΈ Man Who Mass-Extorted Psychotherapy Patients Gets Six Years βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
A 26yearold Finnish man was sentenced to more than six years in prison today after being convicted of hacking into an online psychotherapy clinic, leaking tens of thousands of patient therapy records, and attempting to extort the clinic and patients.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Man Who Mass-Extorted Psychotherapy Patients Gets Six Years
A 26-year-old Finnish man was sentenced to more than six years in prison today after being convicted of hacking into an online psychotherapy clinic, leaking tens of thousands of patient therapy records, and attempting to extort the clinic and patients.
ποΈ Millions of Malicious 'Imageless' Containers Planted on Docker Hub Over 5 Years ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious "imageless" containers over the past five years, once again underscoring how opensource registries could pave the way for supply chain attacks. "Over four million of the repositories in Docker Hub are imageless and have no content except for the repository.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
π΅οΈββοΈ The 6 Data Security Sessions You Shouldn't Miss at RSAC 2024 π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Themed "The Art of Possible," this year's conference celebrates new challenges and opportunities in the age of AI.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
The 6 Data Security Sessions You Shouldn't Miss at RSAC 2024
Themed "The Art of Possible," this year's conference celebrates new challenges and opportunities in the age of AI.
π Ransomware Rising Despite Takedowns, Says Corvus Report π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The first quarter of 2024 saw the most ransomware activity ever recorded, Corvus Insurance found in a new analysis.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ransomware Rising Despite Takedowns, Says Corvus Report
The first quarter of 2024 saw the most ransomware activity ever recorded, Corvus Insurance found in a new analysis
π YMCA Fined for Data Breach, ICO Raises Concerns About Privacy for People with HIV π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Central YMCA was fined 7,500 for a data breach exposing HIV information of support program participants, prompting the ICO to call for stronger privacy protections for people with HIV.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
YMCA Fined for Data Breach, ICO Raises Concerns About Privacy for People with HIV
Central YMCA was fined Β£7,500 for a data breach exposing HIV information of support program participants, prompting the ICO to call for stronger privacy protections for people with HIV
π1
π’ Citrix vulnerability behind Change Healthcare cyber attack, CEO claims π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Threat actors behind the Change Healthcare attack are said to have used vulnerable Citrix remote access software, according to UnitedHealth Group CEO.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Citrix vulnerability behind Change Healthcare cyber attack, CEO claims
Threat actors behind the Change Healthcare attack are said to have used vulnerable Citrix remote access software, according to UnitedHealth Group CEO
π΅οΈββοΈ Wireless Carriers Face $200M FCC Fine As Data Privacy Waters Roil π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Verizon, ATT, and TMobile USA are being fined for sharing location data. They plan to appeal the decision, which is the culmination of a fouryear investigation into how carriers sold customer data to third parties.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Wireless Carriers Face $200M FCC Fine As Data Privacy Waters Roil
Verizon, AT&T, and T-Mobile USA are being fined $200 million for sharing location data. They plan to appeal the decision, which is the culmination of a four-year investigation into how carriers sold customer data to third parties.
π΅οΈββοΈ To Damage OT Systems, Hackers Tap USBs, Old Bugs & Malware π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
USBs have something the newest, hottest attack techniques lack the ability to bridge air gaps.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
To Damage OT Systems, Hackers Tap USBs, Old Bugs & Malware
USBs have something the newest, hottest attack techniques lack: the ability to bridge air gaps.
π΅οΈββοΈ Attackers Planted Millions of Imageless Repositories on Docker Hub π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The purported metadata for each these containers had embedded links to malicious files.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Attackers Planted Millions of Imageless Repositories on Docker Hub
The purported metadata for each these containers had embedded links to malicious files.
π΅οΈββοΈ Canadian Drug Chain in Temporary Lockdown Mode After Cyber Incident π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
London Drugs offered no details about the nature of the incident, nor when its pharmacies would be functioning normally again.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Canadian Drug Chain in Temporary Lockdown Mode After Cyber Incident
London Drugs offered no details about the nature of the incident, nor when its pharmacies would be functioning normally again.
π΅οΈββοΈ Verizon DBIR: Basic Security Gaffes Underpin Bumper Crop of Breaches π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
MOVEit drove a big chunk of the increase, but human vulnerability to social engineering and failure to patch known bugs led to a doubling of breaches since 2023, said Verizon Business.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Verizon DBIR: Basic Security Gaffes Cause Breach Surge
MOVEit drove a big chunk of the increase, but social engineering and failure to patch led to a doubling of data breaches since 2023, said Verizon Business.
π MDR: Unlocking the power of enterprise-grade security for businesses of all sizes π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Faced with expanding attack surfaces and a barrage of threats, businesses of all sizes are increasingly looking to unlock the manifold capabilities of enterprisegrade security.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
MDR unlocks the power of enterprise-grade security for businesses of all sizes through a human expert-led service that empowers companies year-round, filling in any security gaps that might exist.
ποΈ Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A former employee of the U.S. National Security Agency NSA has been sentenced to nearly 22 years 262 months in prison for attempting to transfer classified documents to Russia. "This sentence should serve as a stark warning to all those entrusted with protecting national defense information that there are consequences to betraying that trust," said FBI Director Christopher Wray.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π NCSCβs New Mobile Risk Model Aimed at βHigh-Threatβ Firms π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The UKs National Cyber Security Centre claims its AMS model will protect firms from statebacked mobile threats.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
NCSCβs New Mobile Risk Model Aimed at βHigh-Threatβ Firms
The UKβs National Cyber Security Centre claims its AMS model will protect firms from state-backed mobile threats
π US Government Releases New Resources Against AI Threats π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The US Department of Homeland Security has released new guidelines for securing critical infrastructure and CBRN from AI threats.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
US Government Releases New Resources Against AI Threats
The US Department of Homeland Security has released new guidelines for securing critical infrastructure and CBRN from AI threats
π Infosecurity Europe Keynote: Building Strong Teams and Driving Change with F1βs Claire Williams π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Join Claire Williams at Infosecurity Europe to learn how F1 leadership strategies can inspire cybersecurity leaders.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Infosecurity Europe Keynote: Building Strong Teams and Driving Change with F1βs Claire Williams
Join Claire Williams at Infosecurity Europe to learn how F1 leadership strategies can inspire cybersecurity leaders