πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Permira to Acquire Majority Position in BioCatch at $1.3B Valuation πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ Permira to Acquire Majority Position in BioCatch at $1.3B Valuation πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs πŸ•΅οΈβ€β™‚οΈ

Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included a Tech Tip on setting up DMARC, a DNS mystery from Muddling Meerkat, and a cybersecurity checklist for MA transitions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ‘½ Box Opened, Customer Data Compromised πŸ‘½

Dropbox, a popular cloud storage and collaboration platform, recently disclosed a security breach impacting its eSignature service,Dropbox Sign. On May 2, 2024, the company revealed that hackers successfully infiltrated the platform, gaining access to sensitive customer information. The stolen data includes customer emails, usernames, phone numbers, and hashed passwords. Additionally,.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Outlook Flaw Exploited by Russia's APT28 to Hack Czech, German Entities πŸ–‹οΈ

Czechia and Germany on Friday revealed that they were the target of a longterm cyber espionage campaign conducted by the Russialinked nationstate actor known as APT28, drawing condemnation from the European Union E.U., the North Atlantic Treaty Organization NATO, the U.K., and the U.S. The Czech Republic's Ministry of Foreign Affairs MFA, in a statement, said some unnamed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Amnesty International Cites Indonesia as a Spyware Hub πŸ•΅οΈβ€β™‚οΈ

The growing amount of surveillance technology being deployed in the country is concerning due to Indonesia's increasing blows to citizens' civil rights.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 McAfee and Intel Collaborate to Combat Deepfakes with AI-Powered Deepfake Detection 🧨

In a world where deepfake scams and misinformation are on the rise, McAfee has announced significant enhancements to its AIpowered... The post McAfee and Intel Collaborate to Combat Deepfakes with AIPowered Deepfake Detection appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The encryption stand-off is getting weirder πŸ“’

Opinion Governments have the powers they said they wanted, so why wont they use them?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Xiaomi Android Devices Hit by Multiple Flaws Across Apps and System Components πŸ–‹οΈ

Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi devices running Android. "The vulnerabilities in Xiaomi led to access to arbitrary activities, receivers and services with system privileges, theft of arbitrary files with system privileges, and disclosure of phone, settings and Xiaomi account data," mobile security firm.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New 'Cuckoo' Persistent macOS Spyware Targeting Intel and Arm Macs πŸ–‹οΈ

Cybersecurity researchers have discovered a new information stealer targeting Apple macOS systems that's designed to set up persistence on the infected hosts and act as a spyware. Dubbed Cuckoo by Kandji, the malware is a universal MachO binary that's capable of running on both Intel and Armbased Macs. The exact distribution vector is currently unclear, although there are.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Is Indonesia Ready for Microsoft’s AI Takeover? πŸ‘½

Indonesia and Microsoft announced a strategic partnership that will see the tech giant invest 1.7 billion in the country over the next four years. This is the largest investment Microsoft has ever made in Indonesia, and it reflects the companys belief in the countrys potential as a leader in artificial.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ It Costs How Much?!? The Financial Pitfalls of Cyberattacks on SMBs πŸ–‹οΈ

Cybercriminals are vipers. Theyre like snakes in the grass, hiding behind their keyboards, waiting to strike. And if you're a small and mediumsized business SMB, your organization is the ideal lair for these serpents to slither into.  With cybercriminals becoming more sophisticated, SMBs like you must do more to protect themselves. But at what price? Thats the daunting question.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Psychological Underpinnings of Modern Hacking Techniques πŸ•΅οΈβ€β™‚οΈ

The tactics employed by hackers today aren't new they're simply adapted for the digital age, exploiting the same human weaknesses that have always existed.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ AT&T Splits Cybersecurity Services Business, Launches LevelBlue πŸ•΅οΈβ€β™‚οΈ

The new company will focus on cybersecurity services as a top10 managed security service provider, but must expand outside the lowmargin managing of security into detection and response.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Anetac Targets Service Account Security πŸ•΅οΈβ€β™‚οΈ

The new startup's identity and access management platform uncovers poorly monitored service accounts and secures them from abuse.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  AIDE 0.18.7 πŸ› 

AIDE Advanced Intrusion Detection Environment is a free replacement for Tripwiretm. It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Why Your VPN May Not Be As Secure As It Claims β™ŸοΈ

Virtual private networking VPN companies market their services as a way to prevent anyone from snooping on your Internet usage. But new research suggests this is a dangerous assumption when connecting to a VPN via an untrusted network, because attackers on the same network could force a target's traffic off of the protection provided by their VPN without triggering any alerts to the user.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Tinyproxy Flaw Opens Over 50,000 Hosts to Remote Code Execution πŸ–‹οΈ

More than 50 of the 90,310 hosts have been found exposing a Tinyproxy service on the internet that's vulnerable to a critical unpatched security flaw in the HTTPHTTPS proxy tool. The issue, tracked as CVE202349606, carries a CVSS score of 9.8 out of a maximum of 10, per Cisco Talos, which described it as a useafterfree bug impacting versions 1.10.0 and 1.11.1, which is the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices πŸ–‹οΈ

The recently uncovered cyber espionage campaign targeting perimeter network devices from several vendors, including Cisco, may have been the work of Chinalinked actors, according to new findings from attack surface management firm Censys. Dubbed ArcaneDoor, the activity is said to have commenced around July 2023, with the first confirmed attack against an unnamed victim.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ The End of β€˜Password’ as a Password? πŸ‘½

The UKs National Cyber Security Centre NCSC has called for a ban on commonly used and easily guessable passwords, citing the alarming rise in cybercrime. The agency highlights the vulnerability of users who rely on weak passwords, making them prime targets for cybercriminals. The NCSC emphasizes that passwords like 123456,.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: 70% of Businesses Prioritize Innovation Over Security in Generative AI Projects πŸ“”

An IBM report found that most organizations are exposing themselves to security risks when implementing generative AI tools.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity