πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Paris Olympics Cybersecurity at Risk via Attack Surface Gaps πŸ•΅οΈβ€β™‚οΈ

Though Olympics officials appear to have better secured their digital footprint than other major sporting events have, significant risks remain for the Paris Games.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dazz Unveils AI-Powered Automated Remediation for Application Security Posture Management πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dazz Unveils AI-Powered Automated Remediation for Application Security Posture Management πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Palo Alto Networks Delivers Comprehensive SASE Capabilities πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Palo Alto Networks Delivers Comprehensive SASE Capabilities πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Permira to Acquire Majority Position in BioCatch at $1.3B Valuation πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ Permira to Acquire Majority Position in BioCatch at $1.3B Valuation πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs πŸ•΅οΈβ€β™‚οΈ

Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included a Tech Tip on setting up DMARC, a DNS mystery from Muddling Meerkat, and a cybersecurity checklist for MA transitions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ‘½ Box Opened, Customer Data Compromised πŸ‘½

Dropbox, a popular cloud storage and collaboration platform, recently disclosed a security breach impacting its eSignature service,Dropbox Sign. On May 2, 2024, the company revealed that hackers successfully infiltrated the platform, gaining access to sensitive customer information. The stolen data includes customer emails, usernames, phone numbers, and hashed passwords. Additionally,.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Outlook Flaw Exploited by Russia's APT28 to Hack Czech, German Entities πŸ–‹οΈ

Czechia and Germany on Friday revealed that they were the target of a longterm cyber espionage campaign conducted by the Russialinked nationstate actor known as APT28, drawing condemnation from the European Union E.U., the North Atlantic Treaty Organization NATO, the U.K., and the U.S. The Czech Republic's Ministry of Foreign Affairs MFA, in a statement, said some unnamed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Amnesty International Cites Indonesia as a Spyware Hub πŸ•΅οΈβ€β™‚οΈ

The growing amount of surveillance technology being deployed in the country is concerning due to Indonesia's increasing blows to citizens' civil rights.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 McAfee and Intel Collaborate to Combat Deepfakes with AI-Powered Deepfake Detection 🧨

In a world where deepfake scams and misinformation are on the rise, McAfee has announced significant enhancements to its AIpowered... The post McAfee and Intel Collaborate to Combat Deepfakes with AIPowered Deepfake Detection appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The encryption stand-off is getting weirder πŸ“’

Opinion Governments have the powers they said they wanted, so why wont they use them?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Xiaomi Android Devices Hit by Multiple Flaws Across Apps and System Components πŸ–‹οΈ

Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi devices running Android. "The vulnerabilities in Xiaomi led to access to arbitrary activities, receivers and services with system privileges, theft of arbitrary files with system privileges, and disclosure of phone, settings and Xiaomi account data," mobile security firm.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New 'Cuckoo' Persistent macOS Spyware Targeting Intel and Arm Macs πŸ–‹οΈ

Cybersecurity researchers have discovered a new information stealer targeting Apple macOS systems that's designed to set up persistence on the infected hosts and act as a spyware. Dubbed Cuckoo by Kandji, the malware is a universal MachO binary that's capable of running on both Intel and Armbased Macs. The exact distribution vector is currently unclear, although there are.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Is Indonesia Ready for Microsoft’s AI Takeover? πŸ‘½

Indonesia and Microsoft announced a strategic partnership that will see the tech giant invest 1.7 billion in the country over the next four years. This is the largest investment Microsoft has ever made in Indonesia, and it reflects the companys belief in the countrys potential as a leader in artificial.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ It Costs How Much?!? The Financial Pitfalls of Cyberattacks on SMBs πŸ–‹οΈ

Cybercriminals are vipers. Theyre like snakes in the grass, hiding behind their keyboards, waiting to strike. And if you're a small and mediumsized business SMB, your organization is the ideal lair for these serpents to slither into.  With cybercriminals becoming more sophisticated, SMBs like you must do more to protect themselves. But at what price? Thats the daunting question.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Psychological Underpinnings of Modern Hacking Techniques πŸ•΅οΈβ€β™‚οΈ

The tactics employed by hackers today aren't new they're simply adapted for the digital age, exploiting the same human weaknesses that have always existed.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ AT&T Splits Cybersecurity Services Business, Launches LevelBlue πŸ•΅οΈβ€β™‚οΈ

The new company will focus on cybersecurity services as a top10 managed security service provider, but must expand outside the lowmargin managing of security into detection and response.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Anetac Targets Service Account Security πŸ•΅οΈβ€β™‚οΈ

The new startup's identity and access management platform uncovers poorly monitored service accounts and secures them from abuse.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  AIDE 0.18.7 πŸ› 

AIDE Advanced Intrusion Detection Environment is a free replacement for Tripwiretm. It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity