πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Security Breach Exposes Dropbox Sign Users πŸ“”

Attackers accessed emails, usernames, phone numbers, hashed passwords and authentication information.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million πŸ–‹οΈ

A Ukrainian national has been sentenced to more than 13 years in prison and ordered to pay 16 million in restitution for carrying out thousands of ransomware attacks and extorting victims. Yaroslav Vasinskyi aka Rabotnik, 24, along with his coconspirators part of the REvil ransomware group orchestrated more than 2,500 ransomware attacks and demanded ransom payments in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why Haven't You Set Up DMARC Yet? πŸ•΅οΈβ€β™‚οΈ

DMARC adoption is more important than ever following Google's and Yahoo's latest mandates for large email senders. This Tech Tip outlines what needs to be done to enable DMARC on your domain.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Name That Edge Toon: Puppet Master πŸ•΅οΈβ€β™‚οΈ

Feeling creative? Submit your caption and our panel of experts will reward the winner with a 25 Amazon gift card.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Safeguarding Your Mobile Workforce πŸ•΅οΈβ€β™‚οΈ

Establishing a robust BYOD security strategy is imperative for organizations aiming to leverage the benefits of a mobilefirst workforce while mitigating associated risks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 5 Best Password Managers Built for Teams in 2024 (Free & Paid) 🦿

Explore the top password managers that offer secure and efficient password management solutions for teams.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw πŸ–‹οΈ

Several popular Android applications available in Google Play Store are susceptible to a path traversalaffiliated vulnerability that could be exploited by a malicious app to overwrite arbitrary files in the vulnerable app's home directory. "The implications of this vulnerability pattern include arbitrary code execution and token theft, depending on an applications .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Android Flaw Affected Apps With 4 Billion Installs πŸ“”

Microsoft illustrated the severity of the issue via a case study involving Xiaomis File Manager.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Hackers Target New NATO Member Sweden with Surge of DDoS Attacks πŸ“”

Sweden experienced a wave of DDoS attacks as the country was working towards joining NATO, Netscout found.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Protect Yourself from Bank Fraud 🧨

More and more transactions occur over the internet rather than at a tellers window, and nearly every account has a username, password, and PIN associated with it. Whether you use online banking regularly or sparingly, you can protect yourself from being the victim of fraud by following a few straightforward steps. The post How to Protect Yourself from Bank Fraud appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Protecting Model Updates in Privacy-Preserving Federated Learning: Part Two πŸͺ–

The problem The previous post in our series discussed techniques for providing input privacy in PPFL systems where data is horizontally partitioned. This blog will focus on techniques for providing input privacy when data is vertically partitioned . As described in our third post , vertical partitioning is where the training data is divided across parties such that each party holds different columns of the data. In contrast to horizontally partitioned data, training a model on vertically partitioned data is more challenging as it is generally not possible to train separate models on different.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Preventing deepfake attacks: How businesses can stay protected πŸ“’

Innovative deepfake technology is powering the next generation of social engineering attacks, preventing deepfake attacks should be a priority for any security team.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ DPRK's Kimsuky APT Abuses Weak DMARC Policies, Feds Warn πŸ•΅οΈβ€β™‚οΈ

Organizations can go a long way toward preventing spoofing attacks by changing one basic parameter in their DNS settings.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Software Security: Too Little Vendor Accountability, Experts Say πŸ•΅οΈβ€β™‚οΈ

Actual legislation is a long shot and a decade away, but policy experts are looking to jumpstart the conversation around greater legal liability for insecure software products.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hacker Sentenced After Years of Extorting Psychotherapy Patients πŸ•΅οΈβ€β™‚οΈ

Two years after a warrant went out for his arrest, Aleksanteri Kivimki finally has been found guilty of thousands of counts of aggravated attempted blackmail, among other charges.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dropbox Breach Exposes Customer Credentials, Authentication Data πŸ•΅οΈβ€β™‚οΈ

Threat actor dropped in to Dropbox Sign production environment and accessed emails, passwords, and other PII, along with APIs, OAuth, and MFA info.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 4 IoT Trends U.K. Businesses Should Watch in 2024 🦿

TechRepublic identified the top four trends emerging in IoT that businesses in the U.K. should be aware of.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top Tech Conferences & Events to Add to Your Calendar in 2024 🦿

A great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our 2024 tech events guide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Billions of Android Devices Open to 'Dirty Stream' Attack πŸ•΅οΈβ€β™‚οΈ

Microsoft has uncovered a common vulnerability pattern in several apps allowing code execution at least four of the apps have more than 500 million installations each and one, Xiaomi's File Manager, has at least 1 billion installations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 McAfee Dominates AV-Comparatives PC Performance Test 🧨

In our digital age, a computer is not just a tool its a gateway to a world of possibilities, entertainment,... The post McAfee Dominates AVComparatives PC Performance Test appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks πŸ–‹οΈ

HPE Aruba Networking formerly Aruba Networks has released security updates to address critical flaws impacting ArubaOS that could result in remote code execution RCE on affected systems. Of the 10 security defects, four are rated critical in severity CVE202426304 CVSS score 9.8 Unauthenticated Buffer Overflow Vulnerability in the L2L3 Management Service Accessed via.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity