πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ The encryption stand-off is getting weirder πŸ“’

Opinion Governments have the powers they said they wanted, so why wont they use them?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Xiaomi Android Devices Hit by Multiple Flaws Across Apps and System Components πŸ–‹οΈ

Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi devices running Android. "The vulnerabilities in Xiaomi led to access to arbitrary activities, receivers and services with system privileges, theft of arbitrary files with system privileges, and disclosure of phone, settings and Xiaomi account data," mobile security firm.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New 'Cuckoo' Persistent macOS Spyware Targeting Intel and Arm Macs πŸ–‹οΈ

Cybersecurity researchers have discovered a new information stealer targeting Apple macOS systems that's designed to set up persistence on the infected hosts and act as a spyware. Dubbed Cuckoo by Kandji, the malware is a universal MachO binary that's capable of running on both Intel and Armbased Macs. The exact distribution vector is currently unclear, although there are.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Is Indonesia Ready for Microsoft’s AI Takeover? πŸ‘½

Indonesia and Microsoft announced a strategic partnership that will see the tech giant invest 1.7 billion in the country over the next four years. This is the largest investment Microsoft has ever made in Indonesia, and it reflects the companys belief in the countrys potential as a leader in artificial.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ It Costs How Much?!? The Financial Pitfalls of Cyberattacks on SMBs πŸ–‹οΈ

Cybercriminals are vipers. Theyre like snakes in the grass, hiding behind their keyboards, waiting to strike. And if you're a small and mediumsized business SMB, your organization is the ideal lair for these serpents to slither into.  With cybercriminals becoming more sophisticated, SMBs like you must do more to protect themselves. But at what price? Thats the daunting question.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Psychological Underpinnings of Modern Hacking Techniques πŸ•΅οΈβ€β™‚οΈ

The tactics employed by hackers today aren't new they're simply adapted for the digital age, exploiting the same human weaknesses that have always existed.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ AT&T Splits Cybersecurity Services Business, Launches LevelBlue πŸ•΅οΈβ€β™‚οΈ

The new company will focus on cybersecurity services as a top10 managed security service provider, but must expand outside the lowmargin managing of security into detection and response.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Anetac Targets Service Account Security πŸ•΅οΈβ€β™‚οΈ

The new startup's identity and access management platform uncovers poorly monitored service accounts and secures them from abuse.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  AIDE 0.18.7 πŸ› 

AIDE Advanced Intrusion Detection Environment is a free replacement for Tripwiretm. It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Why Your VPN May Not Be As Secure As It Claims β™ŸοΈ

Virtual private networking VPN companies market their services as a way to prevent anyone from snooping on your Internet usage. But new research suggests this is a dangerous assumption when connecting to a VPN via an untrusted network, because attackers on the same network could force a target's traffic off of the protection provided by their VPN without triggering any alerts to the user.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Tinyproxy Flaw Opens Over 50,000 Hosts to Remote Code Execution πŸ–‹οΈ

More than 50 of the 90,310 hosts have been found exposing a Tinyproxy service on the internet that's vulnerable to a critical unpatched security flaw in the HTTPHTTPS proxy tool. The issue, tracked as CVE202349606, carries a CVSS score of 9.8 out of a maximum of 10, per Cisco Talos, which described it as a useafterfree bug impacting versions 1.10.0 and 1.11.1, which is the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices πŸ–‹οΈ

The recently uncovered cyber espionage campaign targeting perimeter network devices from several vendors, including Cisco, may have been the work of Chinalinked actors, according to new findings from attack surface management firm Censys. Dubbed ArcaneDoor, the activity is said to have commenced around July 2023, with the first confirmed attack against an unnamed victim.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ The End of β€˜Password’ as a Password? πŸ‘½

The UKs National Cyber Security Centre NCSC has called for a ban on commonly used and easily guessable passwords, citing the alarming rise in cybercrime. The agency highlights the vulnerability of users who rely on weak passwords, making them prime targets for cybercriminals. The NCSC emphasizes that passwords like 123456,.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: 70% of Businesses Prioritize Innovation Over Security in Generative AI Projects πŸ“”

An IBM report found that most organizations are exposing themselves to security risks when implementing generative AI tools.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Previews Feature to Block Malicious OAuth Apps πŸ•΅οΈβ€β™‚οΈ

Microsoft is previewing new AI and machine learning capabilities in Defender XDR that will help detect and block malicious OAuth applications.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google Steps Up The Battle Against Gmail Spam 🦿

Additional enforcement means noncompliant email may be delivered to spam folders. Heres what Google Workspace administrators and Gmail users need to know.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google Steps Up The Battle Against Gmail Spam 🦿

Additional enforcement means noncompliant email may be delivered to spam folders. Heres what Google Workspace administrators and Gmail users need to know.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top 7 Multicloud Security Providers for 2024 🦿

There are a lot of considerations when adopting a multicloud infrastructure. Use our guide to compare the top multicloud security providers.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top 7 Multicloud Security Providers for 2024 🦿

There are a lot of considerations when adopting a multicloud infrastructure. Use our guide to compare the top multicloud security providers.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 RSA: Google Enhances its Enterprise SecOps Offerings With Gemini AI 🦿

In this RSA roundup, we also cover AI news about IBM, AWS and Proofpoint, as well as details about Cisco Hypershield.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Law Enforcement Takedowns Force Ransomware Affiliates to Diversify πŸ“”

A new Chainalysis report showed that recent law enforcement operations have pushed ransomware affiliates to increasingly use multiple strains in order to stay afloat.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity