πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Ransomware Rising Despite Takedowns, Says Corvus Report πŸ“”

The first quarter of 2024 saw the most ransomware activity ever recorded, Corvus Insurance found in a new analysis.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” YMCA Fined for Data Breach, ICO Raises Concerns About Privacy for People with HIV πŸ“”

Central YMCA was fined 7,500 for a data breach exposing HIV information of support program participants, prompting the ICO to call for stronger privacy protections for people with HIV.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Citrix vulnerability behind Change Healthcare cyber attack, CEO claims πŸ“’

Threat actors behind the Change Healthcare attack are said to have used vulnerable Citrix remote access software, according to UnitedHealth Group CEO.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Wireless Carriers Face $200M FCC Fine As Data Privacy Waters Roil πŸ•΅οΈβ€β™‚οΈ

Verizon, ATT, and TMobile USA are being fined for sharing location data. They plan to appeal the decision, which is the culmination of a fouryear investigation into how carriers sold customer data to third parties.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ To Damage OT Systems, Hackers Tap USBs, Old Bugs & Malware πŸ•΅οΈβ€β™‚οΈ

USBs have something the newest, hottest attack techniques lack the ability to bridge air gaps.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Attackers Planted Millions of Imageless Repositories on Docker Hub πŸ•΅οΈβ€β™‚οΈ

The purported metadata for each these containers had embedded links to malicious files.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Canadian Drug Chain in Temporary Lockdown Mode After Cyber Incident πŸ•΅οΈβ€β™‚οΈ

London Drugs offered no details about the nature of the incident, nor when its pharmacies would be functioning normally again.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Verizon DBIR: Basic Security Gaffes Underpin Bumper Crop of Breaches πŸ•΅οΈβ€β™‚οΈ

MOVEit drove a big chunk of the increase, but human vulnerability to social engineering and failure to patch known bugs led to a doubling of breaches since 2023, said Verizon Business.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ MDR: Unlocking the power of enterprise-grade security for businesses of all sizes πŸš€

Faced with expanding attack surfaces and a barrage of threats, businesses of all sizes are increasingly looking to unlock the manifold capabilities of enterprisegrade security.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia πŸ–‹οΈ

A former employee of the U.S. National Security Agency NSA has been sentenced to nearly 22 years 262 months in prison for attempting to transfer classified documents to Russia. "This sentence should serve as a stark warning to all those entrusted with protecting national defense information that there are consequences to betraying that trust," said FBI Director Christopher Wray.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NCSC’s New Mobile Risk Model Aimed at β€œHigh-Threat” Firms πŸ“”

The UKs National Cyber Security Centre claims its AMS model will protect firms from statebacked mobile threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Government Releases New Resources Against AI Threats πŸ“”

The US Department of Homeland Security has released new guidelines for securing critical infrastructure and CBRN from AI threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Infosecurity Europe Keynote: Building Strong Teams and Driving Change with F1’s Claire Williams πŸ“”

Join Claire Williams at Infosecurity Europe to learn how F1 leadership strategies can inspire cybersecurity leaders.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Human errors still a leading cause of cyber incidents, says Kaseya πŸ“’

The worstaffected industries are government, IT firms, and the financial and industrial sectors.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” DBIR: Vulnerability Exploits Triple as Initial Access Point for Data Breaches πŸ“”

The growth of software supply chain attacks pushed vulnerability exploits to the third most used initial access method, Verizon found.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 TechRepublic Premium Editorial Calendar: Policies, Checklists, Hiring Kits and Glossaries for Download 🦿

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Everyone's an Expert: How to Empower Your Employees for Cybersecurity Success πŸ–‹οΈ

Theres a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of security, youve got to remain prepared to confront those very same threats. As a decisionmaker for your organization, you know this well. But no matter how many experts or trusted cybersecurity tools your organization has a standing guard,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan πŸ–‹οΈ

The authors behind the resurfaced ZLoader malware have added a feature that was originally present in the Zeus banking trojan that it's based on, indicating that it's being actively developed. "The latest version, 2.4.1.0, introduces a feature to prevent execution on machines that differ from the original infection," Zscaler ThreatLabz researcher Santiago.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Are VPNs Legal To Use? 🦿

Are virtual private networks legal to use? Discover if VPNs are legal, restricted or banned in your geolocation and what activities are legal vs. illegal when using a VPN.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Why remote desktop tools are facing an onslaught of cyber threats πŸ“’

Hackers are increasingly targeting remote desktop tools in their attacks, new research reveals, prompting warnings for enterprises globally.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Lawsuits and Company Devaluations Await For Breached Firms πŸ“”

New report from Netwrix reveals unplanned expenses impact half of breached firms, including a surge in lawsuits.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity