πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Google Announces Passkeys Adopted by Over 400 Million Accounts πŸ–‹οΈ

Google on Thursday announced that passkeys are being used by over 400 million Google accounts, authenticating users more than 1 billion times over the past two years. "Passkeys are easy to use and phishing resistant, only relying on a fingerprint, face scan or a pin making them 50 faster than passwords," Heather Adkins, vice president of security engineering at Google, said.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are exploiting critical GitLab password reset vulnerability β€” here’s what you need to know πŸ“’

GitLab accounts are at serious risk of a maximum severity vulnerability that is already being exploited in the wild, according to CISA.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Security agencies warn of heightened threat to critical national infrastructure πŸ“’

The NCSC and CISA say that proRussia hacktivists are targeting underprotected industrial control systems.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 4 IoT Trends U.K. Businesses Should Watch in 2024 🦿

TechRepublic identified the top four trends emerging in IoT that businesses in the U.K. should be aware of.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data πŸ–‹οΈ

SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of technology and business. At the same time, these applications also pose a new security risk that security leaders need to address, since the existing security stack does not enable complete control or comprehensive monitoring of their usage.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources πŸ–‹οΈ

The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean threat actors' attempts to send emails in a manner that makes them appear like they are from legitimate and trusted parties. The joint bulletin was published by the National Security Agency NSA, the Federal Bureau of Investigation FBI, and the Department of State. "The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Indonesia is a Spyware Haven, Amnesty International Finds πŸ“”

Amnesty International found in Indonesia a murky ecosystem of surveillance suppliers, brokers and resellers that obscures the sale and transfer of surveillance technology.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Three million Docker Hub repositories are being used to spread malware πŸ“’

Hackers have been uploading malicious content to Docker Hub via millions of imageless containers over the last three years, researchers found, prompting an alert for users of the service.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 Why Do I Need a Password Manager? 🧨

In todays digital age, we know the importance of online privacy and security. However, with an increasing number of websites requiring passwords, it becomes tough to remember them all. This is where a password manager comes into play. The post Why Do I Need a Password Manager? appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Mimic Launches With New Ransomeware Defense Platform πŸ•΅οΈβ€β™‚οΈ

The new startups SaaS platform claims to help organizations detect ransomware attacks faster than traditional methods and to recover within 24 hours.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 What we can learn from the best collegiate cyber defenders 🧠

This year marked the 19th season of the National Collegiate Cyber Defense Competition NCCDC. For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario a merger. Ten finalist teams The post What we can learn from the best collegiate cyber defenders appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” North Korean Hackers Spoofing Journalist Emails to Spy on Policy Experts πŸ“”

The US warns that the North Korealinked Kimsuky group is exploiting poorly configured DMARC protocols to spoof legitimate domains in espionage phishing campaigns.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Innovation, Not Regulation, Will Protect Corporations From Deepfakes πŸ•΅οΈβ€β™‚οΈ

If CEOs want to prevent their firm from being the next victim of a highprofile deepfake scam, they need to double cybersecurity funding immediately.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New AI Security Startup Apex Secures AI Models, Apps πŸ•΅οΈβ€β™‚οΈ

The AI security startups platform will allow organizations to define appropriate AI usage and enforce security policies.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Expert-Led Webinar - Uncovering Latest DDoS Tactics and Learn How to Fight Back πŸ–‹οΈ

In today's rapidly evolving digital landscape, the threat of Distributed Denial of Service DDoS attacks looms more significant than ever. As these cyber threats grow in sophistication, understanding and countering them becomes crucial for any business seeking to protect its online presence. To address this urgent need, we are thrilled to announce our upcoming webinar, "Uncovering Contemporary.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications πŸ–‹οΈ

Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection. This is done to "facilitate communications with commandandcontrol CC infrastructure hosted on Microsoft cloud services," the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical GitLab Bug Under Exploit Enables Account Takeover, CISA Warns πŸ•΅οΈβ€β™‚οΈ

Patch now Cyberattackers are exploiting CVE20237028 CVSS 10 to take over and lock users out of GitLab accounts, steal source code, and more.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How Are APAC Tech Salaries Faring in 2024? 🦿

The year 2024 is bringing a return to stable tech salary growth in APAC, with AI and data jobs leading the way. This follows downward salary pressure in 2023, after steep increases in previous years.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Top 5 Global Cyber Security Trends of 2023, According to Google Report 🦿

According to the MTrends report, the average time it takes for an organisation to detect an attacker in their environment has decreased from 16 days in 2022 to 10 days in 2023.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 U.K., U.S. and Canadian Cyber Authorities Warn of Pro-Russia Hacktivist Attacks on Operational Technology Systems 🦿

The U.K.'s National Cyber Security Centre, along with U.S. and Canadian cyber authorities, has identified a rise in attacks against OT operators since 2022.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ•΅οΈβ€β™‚οΈ REvil Affiliate Off to Jail for Multimillion-Dollar Ransomware Scheme πŸ•΅οΈβ€β™‚οΈ

Charges against the ransomware gang member included damage to computers, conspiracy to commit fraud, and conspiracy to commit money laundering.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity