π΅οΈββοΈ Permira to Acquire Majority Position in BioCatch at $1.3B Valuation π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Permira to Acquire Majority Position in BioCatch at $1.3B Valuation
β€1
π΅οΈββοΈ Permira to Acquire Majority Position in BioCatch at $1.3B Valuation π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Permira to Acquire Majority Position in BioCatch at $1.3B Valuation
β€1
π΅οΈββοΈ CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included a Tech Tip on setting up DMARC, a DNS mystery from Muddling Meerkat, and a cybersecurity checklist for MA transitions.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: a Tech Tip on setting up DMARC, a DNS mystery from Muddling Meerkat, and a cybersecurity checklist forβ¦
β€1
π½ Box Opened, Customer Data Compromised π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Dropbox, a popular cloud storage and collaboration platform, recently disclosed a security breach impacting its eSignature service,Dropbox Sign. On May 2, 2024, the company revealed that hackers successfully infiltrated the platform, gaining access to sensitive customer information. The stolen data includes customer emails, usernames, phone numbers, and hashed passwords. Additionally,.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Be4Sec
Box Opened, Customer Data Compromised
Dropbox, a popular cloud storage and collaboration platform, recently disclosed a security breach impacting its eSignature service,Dropbox Sign. On May 2, 2024, the company revealed that hackers suβ¦
ποΈ Microsoft Outlook Flaw Exploited by Russia's APT28 to Hack Czech, German Entities ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Czechia and Germany on Friday revealed that they were the target of a longterm cyber espionage campaign conducted by the Russialinked nationstate actor known as APT28, drawing condemnation from the European Union E.U., the North Atlantic Treaty Organization NATO, the U.K., and the U.S. The Czech Republic's Ministry of Foreign Affairs MFA, in a statement, said some unnamed.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ Amnesty International Cites Indonesia as a Spyware Hub π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The growing amount of surveillance technology being deployed in the country is concerning due to Indonesia's increasing blows to citizens' civil rights.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Amnesty International Cites Indonesia as a Spyware Hub
The growing amount of surveillance technology being deployed in the country is concerning due to Indonesia's increasing blows to civic rights.
𧨠McAfee and Intel Collaborate to Combat Deepfakes with AI-Powered Deepfake Detection π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
In a world where deepfake scams and misinformation are on the rise, McAfee has announced significant enhancements to its AIpowered... The post McAfee and Intel Collaborate to Combat Deepfakes with AIPowered Deepfake Detection appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
McAfee and Intel Collaborate to Combat Deepfakes with AI-Powered Deepfake Detection | McAfee Blog
In a world where deepfake scams and misinformation are on the rise, McAfee has announced significant enhancements to its AI-powered deepfake detection
π’ The encryption stand-off is getting weirder π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Opinion Governments have the powers they said they wanted, so why wont they use them?.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
The encryption stand-off is getting weirder
Opinion: Governments have the powers they said they wanted, so why wonβt they use them?
ποΈ Xiaomi Android Devices Hit by Multiple Flaws Across Apps and System Components ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi devices running Android. "The vulnerabilities in Xiaomi led to access to arbitrary activities, receivers and services with system privileges, theft of arbitrary files with system privileges, and disclosure of phone, settings and Xiaomi account data," mobile security firm.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ New 'Cuckoo' Persistent macOS Spyware Targeting Intel and Arm Macs ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered a new information stealer targeting Apple macOS systems that's designed to set up persistence on the infected hosts and act as a spyware. Dubbed Cuckoo by Kandji, the malware is a universal MachO binary that's capable of running on both Intel and Armbased Macs. The exact distribution vector is currently unclear, although there are.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π½ Is Indonesia Ready for Microsoftβs AI Takeover? π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Indonesia and Microsoft announced a strategic partnership that will see the tech giant invest 1.7 billion in the country over the next four years. This is the largest investment Microsoft has ever made in Indonesia, and it reflects the companys belief in the countrys potential as a leader in artificial.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Be4Sec
Is Indonesia Ready for Microsoftβs AI Takeover?
Indonesia and Microsoft announced a strategic partnership that will see the tech giant invest $1.7 billion in the country over the next four years. This is the largest investment Microsoft has everβ¦
ποΈ It Costs How Much?!? The Financial Pitfalls of Cyberattacks on SMBs ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybercriminals are vipers. Theyre like snakes in the grass, hiding behind their keyboards, waiting to strike. And if you're a small and mediumsized business SMB, your organization is the ideal lair for these serpents to slither into. With cybercriminals becoming more sophisticated, SMBs like you must do more to protect themselves. But at what price? Thats the daunting question.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ The Psychological Underpinnings of Modern Hacking Techniques π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The tactics employed by hackers today aren't new they're simply adapted for the digital age, exploiting the same human weaknesses that have always existed.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
The Psychological Underpinnings of Modern Hacking Techniques
The tactics employed by hackers today aren't new; they're simply adapted for the digital age, exploiting the same human weaknesses that have always existed.
π΅οΈββοΈ AT&T Splits Cybersecurity Services Business, Launches LevelBlue π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The new company will focus on cybersecurity services as a top10 managed security service provider, but must expand outside the lowmargin managing of security into detection and response.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
AT&T Splits Cybersecurity Services Business, Launches LevelBlue
The new company will focus on cybersecurity services as a top 10 managed security service provider, but must expand outside the low-margin management of security into detection and response.
π΅οΈββοΈ Anetac Targets Service Account Security π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The new startup's identity and access management platform uncovers poorly monitored service accounts and secures them from abuse.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Anetac Targets Service Account Security
The startup's new identity and access management platform uncovers poorly monitored service accounts and secures them from abuse.
π AIDE 0.18.7 π
π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
AIDE Advanced Intrusion Detection Environment is a free replacement for Tripwiretm. It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Packetstormsecurity
AIDE 0.18.7 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
βοΈ Why Your VPN May Not Be As Secure As It Claims βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Virtual private networking VPN companies market their services as a way to prevent anyone from snooping on your Internet usage. But new research suggests this is a dangerous assumption when connecting to a VPN via an untrusted network, because attackers on the same network could force a target's traffic off of the protection provided by their VPN without triggering any alerts to the user.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Why Your VPN May Not Be As Secure As It Claims
Virtual private networking (VPN) companies market their services as a way to prevent anyone from snooping on your Internet usage. But new research suggests this is a dangerous assumption when connecting to a VPN via an untrusted network, because attackersβ¦
ποΈ Critical Tinyproxy Flaw Opens Over 50,000 Hosts to Remote Code Execution ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
More than 50 of the 90,310 hosts have been found exposing a Tinyproxy service on the internet that's vulnerable to a critical unpatched security flaw in the HTTPHTTPS proxy tool. The issue, tracked as CVE202349606, carries a CVSS score of 9.8 out of a maximum of 10, per Cisco Talos, which described it as a useafterfree bug impacting versions 1.10.0 and 1.11.1, which is the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The recently uncovered cyber espionage campaign targeting perimeter network devices from several vendors, including Cisco, may have been the work of Chinalinked actors, according to new findings from attack surface management firm Censys. Dubbed ArcaneDoor, the activity is said to have commenced around July 2023, with the first confirmed attack against an unnamed victim.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π½ The End of βPasswordβ as a Password? π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
The UKs National Cyber Security Centre NCSC has called for a ban on commonly used and easily guessable passwords, citing the alarming rise in cybercrime. The agency highlights the vulnerability of users who rely on weak passwords, making them prime targets for cybercriminals. The NCSC emphasizes that passwords like 123456,.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Be4Sec
The End of βPasswordβ as a Password?
The UKβs National Cyber Security Centre (NCSC) has called for a ban on commonly used and easily guessable passwords, citing the alarming rise in cybercrime. The agency highlights the vulnerabβ¦
π #RSAC: 70% of Businesses Prioritize Innovation Over Security in Generative AI Projects π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
An IBM report found that most organizations are exposing themselves to security risks when implementing generative AI tools.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
RSAC: 70% of Businesses Prioritize Innovation Over Security in Generative AI Projects
An IBM report found that most organizations are exposing themselves to security risks when implementing generative AI tools