๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
26K subscribers
89.3K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿฆฟ Are VPNs Legal To Use? ๐Ÿฆฟ

Are virtual private networks legal to use? Discover if VPNs are legal, restricted or banned in your geolocation and what activities are legal vs. illegal when using a VPN.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“ข Why remote desktop tools are facing an onslaught of cyber threats ๐Ÿ“ข

Hackers are increasingly targeting remote desktop tools in their attacks, new research reveals, prompting warnings for enterprises globally.

๐Ÿ“– Read more.

๐Ÿ”— Via "ITPro"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” Lawsuits and Company Devaluations Await For Breached Firms ๐Ÿ“”

New report from Netwrix reveals unplanned expenses impact half of breached firms, including a surge in lawsuits.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” 1 in 5 US Ransomware Attacks Triggers Lawsuit ๐Ÿ“”

Comparitech found that 18 of ransomware incidents in the US led to a lawsuit in 2023, with 59 of completed lawsuits since 2018 proving successful.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ The Cybersecurity Checklist That Could Save Your M&A Deal ๐Ÿ•ต๏ธโ€โ™‚๏ธ

With mergers and acquisitions making a comeback, organizations need to be sure they safeguard their digital assets before, during, and after.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆฟ Learn Cybersecurity Skills From Scratch for Just $40 ๐Ÿฆฟ

Save on tech services or switch to a lucrative new tech career by training at your own pace to develop highdemand cybersecurity skills.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿฆฟ Adobe Adds Firefly and AI Watermarking to Bug Bounty Program ๐Ÿฆฟ

Researchers can earn up to 10,000 for critical vulnerabilities in the generative AI products.

๐Ÿ“– Read more.

๐Ÿ”— Via "Tech Republic"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds ๐Ÿ–‹๏ธ

A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with illicit activity and money laundering, including detecting criminal proceeds sent to a crypto exchange and previously unknown wallets belonging to a Russian darknet market. The findings come from Elliptic in collaboration with researchers from the.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ–‹๏ธ Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers ๐Ÿ–‹๏ธ

Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress sites as relays for its actual commandandcontrol C2 servers for detection evasion. The malware, codenamed Wpeeper, is an ELF binary that leverages the HTTPS protocol to secure its C2 communications. "Wpeeper is a typical backdoor Trojan for Android.

๐Ÿ“– Read more.

๐Ÿ”— Via "The Hacker News"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” UnitedHealth CEO Confirms Breach Tied to Stolen Credentials, No MFA ๐Ÿ“”

Andrew Witty made the claims in a written testimony submitted before a House subcommittee hearing.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐ŸŒŠ Best Pentest Companies 2024 ๐ŸŒŠ

Forget the question of If you need a pentest. In todays threat landscape, with cyberattacks striking every 39 seconds, the critical question is, How often? Penetration testing is crucial in fortifying your organizations cybersecurity. By simulating realworld attacks, ethical hackers pen testers identify vulnerabilities in your systems before malicious actors can exploit them.  But with The post Best Pentest Companies 2024 appeared first on UnderDefense.

๐Ÿ“– Read more.

๐Ÿ”— Via "UnderDefense"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿงจ What Is a Data Broker? ๐Ÿงจ

A data broker is an organization that makes money by collecting your personal information, analyzing it, and licensing it out to... The post What Is a Data Broker? appeared first on McAfee Blog.

๐Ÿ“– Read more.

๐Ÿ”— Via "McAfee"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿช– Take A Tour! NIST Cybersecurity Framework 2.0: Small Business Quick Start Guide ๐Ÿช–

The U.S. Small Business Administration is celebrating National Small Business Week from April 28 May 4, 2024. This week recognizes and celebrates the small business communitys significant contributions to the nation. Organizations across the country participate by hosting inperson and virtual events, recognizing small business leaders and changemakers, and highlighting resources that help the small business community more easily and efficiently start and scale their businesses. To add to the festivities, this NIST Cybersecurity Insights blog showcases the NIST Cybersecurity Framework 2.0.

๐Ÿ“– Read more.

๐Ÿ”— Via "NIST"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ“” LockBit, Black Basta, Play Dominate Ransomware in Q1 2024 ๐Ÿ“”

The data from ReliaQuest also suggests LockBit faced a significant setback due to law enforcement action.

๐Ÿ“– Read more.

๐Ÿ”— Via "Infosecurity Magazine"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ 'Cuttlefish' Zero-Click Malware Steals Private Cloud Data ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The newly discovered malware, which has so far mainly targeted Turkish telcos and has links to HiatusRat, infects routers and performs DNS and HTTP hijacking attacks on connections to private IP addresses.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
โค1
๐Ÿ•ต๏ธโ€โ™‚๏ธ Intel 471 Acquires Cyborg Security ๐Ÿ•ต๏ธโ€โ™‚๏ธ



๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ Cobalt's 2024 State of Pentesting Report Reveals Cybersecurity Industry Needs ๐Ÿ•ต๏ธโ€โ™‚๏ธ



๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ Shadow APIs: An Overlooked Cyber-Risk for Orgs ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Unmanaged and unknown Web services endpoints are just some of the challenges organizations must address to improve API security.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ Qantas Customers' Boarding Passes Exposed in Flight App Mishap ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Some customers found that they had the ability to cancel a stranger's flight to another country after opening the app, which was showing other individuals' flight details.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ Private Internet Search Is Still Finding Its Way ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The quest to keep data private while still being able to search may soon be within reach, with different companies charting their own paths.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity
๐Ÿ•ต๏ธโ€โ™‚๏ธ UnitedHealth Congressional Testimony Reveals Rampant Security Fails ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The breach was carried out with stolen Citrix credentials for an account that lacked multifactor authentication. Attackers went undetected for days, and Change's backup strategy failed.

๐Ÿ“– Read more.

๐Ÿ”— Via "Dark Reading"

----------
๐Ÿ‘๏ธ Seen on @cibsecurity