πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Expert-Led Webinar - Uncovering Latest DDoS Tactics and Learn How to Fight Back πŸ–‹οΈ

In today's rapidly evolving digital landscape, the threat of Distributed Denial of Service DDoS attacks looms more significant than ever. As these cyber threats grow in sophistication, understanding and countering them becomes crucial for any business seeking to protect its online presence. To address this urgent need, we are thrilled to announce our upcoming webinar, "Uncovering Contemporary.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications πŸ–‹οΈ

Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection. This is done to "facilitate communications with commandandcontrol CC infrastructure hosted on Microsoft cloud services," the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical GitLab Bug Under Exploit Enables Account Takeover, CISA Warns πŸ•΅οΈβ€β™‚οΈ

Patch now Cyberattackers are exploiting CVE20237028 CVSS 10 to take over and lock users out of GitLab accounts, steal source code, and more.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How Are APAC Tech Salaries Faring in 2024? 🦿

The year 2024 is bringing a return to stable tech salary growth in APAC, with AI and data jobs leading the way. This follows downward salary pressure in 2023, after steep increases in previous years.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Top 5 Global Cyber Security Trends of 2023, According to Google Report 🦿

According to the MTrends report, the average time it takes for an organisation to detect an attacker in their environment has decreased from 16 days in 2022 to 10 days in 2023.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 U.K., U.S. and Canadian Cyber Authorities Warn of Pro-Russia Hacktivist Attacks on Operational Technology Systems 🦿

The U.K.'s National Cyber Security Centre, along with U.S. and Canadian cyber authorities, has identified a rise in attacks against OT operators since 2022.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ•΅οΈβ€β™‚οΈ REvil Affiliate Off to Jail for Multimillion-Dollar Ransomware Scheme πŸ•΅οΈβ€β™‚οΈ

Charges against the ransomware gang member included damage to computers, conspiracy to commit fraud, and conspiracy to commit money laundering.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ GAO: NASA Faces 'Inconsistent' Cybersecurity Across Spacecraft πŸ•΅οΈβ€β™‚οΈ

The space agency needs to implement stricter policies and standards when it comes to its cybersecurity practices, but doing so the wrong way would put machinery at risk, a federal review found.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Paris Olympics Cybersecurity at Risk via Attack Surface Gaps πŸ•΅οΈβ€β™‚οΈ

Though Olympics officials appear to have better secured their digital footprint than other major sporting events have, significant risks remain for the Paris Games.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dazz Unveils AI-Powered Automated Remediation for Application Security Posture Management πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dazz Unveils AI-Powered Automated Remediation for Application Security Posture Management πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Palo Alto Networks Delivers Comprehensive SASE Capabilities πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Palo Alto Networks Delivers Comprehensive SASE Capabilities πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Permira to Acquire Majority Position in BioCatch at $1.3B Valuation πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ Permira to Acquire Majority Position in BioCatch at $1.3B Valuation πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs πŸ•΅οΈβ€β™‚οΈ

Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included a Tech Tip on setting up DMARC, a DNS mystery from Muddling Meerkat, and a cybersecurity checklist for MA transitions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ‘½ Box Opened, Customer Data Compromised πŸ‘½

Dropbox, a popular cloud storage and collaboration platform, recently disclosed a security breach impacting its eSignature service,Dropbox Sign. On May 2, 2024, the company revealed that hackers successfully infiltrated the platform, gaining access to sensitive customer information. The stolen data includes customer emails, usernames, phone numbers, and hashed passwords. Additionally,.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Outlook Flaw Exploited by Russia's APT28 to Hack Czech, German Entities πŸ–‹οΈ

Czechia and Germany on Friday revealed that they were the target of a longterm cyber espionage campaign conducted by the Russialinked nationstate actor known as APT28, drawing condemnation from the European Union E.U., the North Atlantic Treaty Organization NATO, the U.K., and the U.S. The Czech Republic's Ministry of Foreign Affairs MFA, in a statement, said some unnamed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Amnesty International Cites Indonesia as a Spyware Hub πŸ•΅οΈβ€β™‚οΈ

The growing amount of surveillance technology being deployed in the country is concerning due to Indonesia's increasing blows to citizens' civil rights.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 McAfee and Intel Collaborate to Combat Deepfakes with AI-Powered Deepfake Detection 🧨

In a world where deepfake scams and misinformation are on the rise, McAfee has announced significant enhancements to its AIpowered... The post McAfee and Intel Collaborate to Combat Deepfakes with AIPowered Deepfake Detection appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The encryption stand-off is getting weirder πŸ“’

Opinion Governments have the powers they said they wanted, so why wont they use them?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity