πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ LLMs & Malicious Code Injections: 'We Have to Assume It's Coming' πŸ•΅οΈβ€β™‚οΈ

Large language models promise to enhance secure software development life cycles, but there are unintended risks as well, CISO warns at RSAC.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Threat Actors Weaponizing Hacktivism for Financial Gain πŸ“”

Recorded Futures Alexander Leslie highlights the increasingly blurred lines between hacktivism, financial cybercrime and nationstate activities during the RSA Conference 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Supply Chain Breaches Up 68% Year Over Year, According to DBIR πŸ•΅οΈβ€β™‚οΈ

As Verizon Business redefines "supply chain breach," it could either help organizations address thirdparty risk holistically or just conflate and confuse.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Citrix Addresses High-Severity Flaw in NetScaler ADC and Gateway πŸ•΅οΈβ€β™‚οΈ

The flaw was nearly identical to last year's CitrixBleed flaw, though not as severe.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” RSAC: Securing Foundational Tech Critical to Upholding Democratic Values, Says Blinken πŸ“”

US Secretary of State Antony Blinken said that the US and its allies must work together to ensure foundational technologies are used for the betterment of humanity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ The hacker’s toolkit: 4 gadgets that could spell security trouble πŸš€

Their innocuous looks and endearing names mask their true power. These gadgets are designed to help identify and prevent security woes, but what if they fall into the wrong hands?.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 What to Do If You’re Caught Up in a Data Breach 🧨

It happens with more regularity than any of us like to see. Theres either a headline in your news feed... The post What to Do If Youre Caught Up in a Data Breach appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC Chairman urges collaboration to ensure collective defense in security πŸ“’

Chairman emphasizes the critical need for cooperation among cybersecurity experts.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ AI is changing the game when it comes to security πŸ“’

With AI becoming more of an everyday reality, innovative strategies are needed to counter increasingly sophisticated threats.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Is Cyberwar the New Cold War? πŸ‘½

Recent developments in the cyber landscape have raised concerns over escalating tensions between Germany and Russia. A cyberattack on the Bundestag, the German parliament, has been attributed to Russia by German Foreign Minister Annalena Baerbock. Condemning the attack as intolerable, Baerbock vowed consequences for those responsible. This incident marks a.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ China blamed for Ministry of Defence attack that exposed military personnel data πŸ“’

The Ministry of Defence has contacted those affected by a data breach that's being attributed to Chinaaffiliated actors.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ransomware group publishes stolen NHS Scotland data to dark web πŸ“’

NHS Dumfries and Galloway said it is working with the NCSC and Police Scotland to support those affected by the cyber attack.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Simplifies 2-Factor Authentication Setup (It's More Important Than Ever) πŸ–‹οΈ

Google on Monday announced that it's simplifying the process of enabling twofactor authentication 2FA for users with personal and Workspace accounts. Also called, 2Step Verification 2SV, it aims to add an extra layer of security to users' accounts to prevent takeover attacks in case the passwords are stolen. The new change entails adding a second step method, such as an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Operator of BTC-e Crypto Exchange Pleads Guilty to Money Laundering πŸ–‹οΈ

A Russian operator of a nowdismantled BTCe cryptocurrency exchange has pleaded guilty to money laundering charges from 2011 to 2017. Alexander Vinnik, 44, was charged in January 2017 and taken into custody in Greece in July 2017. He was subsequently extradited to the U.S. in August 2022. Vinnik and his coconspirators have been accused of owning and managing.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” China Suspected After Major MoD Payroll Breach πŸ“”

Reports claim statebacked hackers accessed sensitive personal and financial information on UK military personnel.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” BTC-e $9bn Crypto-Money Launderer Pleads Guilty πŸ“”

Russian national Alexander Vinnik has pleaded guilty to his role in a multibilliondollar money laundering conspiracy.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Can VPNs Be Tracked by the Police? 🦿

VPNs are popular due to the fact they add security and privacy to what are otherwise daily open WiFi and public internet channels. But can VPNs be tracked by the police?.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Case Study: The Malicious Comment πŸ–‹οΈ

How safe is your comments section? Discover how a seemingly innocent 'thank you' comment on a product page concealed a malicious vulnerability, underscoring the necessity of robust security measures. Read the full reallife case study here.  When is a Thank you not a Thank you? When its a sneaky bit of code thats been hidden inside a Thank You.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Blinken: Digital Solidarity Is 'North Star' for US Policy πŸ•΅οΈβ€β™‚οΈ

The four goals of the US International Cyberspace and Digital Policy Strategy are to advance economic prosperity enhance security and combat cybercrime promote human rights, democracy, and the rule of law and address other transnational challenges.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The Australian Government’s Manufacturing Objectives Rely on IT Capabilities 🦿

The intent of the Future Made in Australia Act is to build manufacturing capabilities across all sectors, which will likely lead to more demand for IT skills and services.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Remote access risks on the rise with CVE-2024-1708 and CVE-2024-1709 🧠

On February 19, ConnectWise reported two vulnerabilities in its ScreenConnect product, CVE20241708 and 1709. The first is an authentication bypass vulnerability, and the second is a path traversal vulnerability. Both made it possible for attackers to bypass authentication processes and execute remote code. While ConnectWise initially reported that the vulnerabilities had proofofconcept but hadnt been The post Remote access risks on the rise with CVE20241708 and CVE20241709 appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity