πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Does CISA's KEV Catalog Speed Up Remediation? πŸ•΅οΈβ€β™‚οΈ

Vulnerabilities added to the CISA known exploited vulnerability KEV list do indeed get patched faster, but not fast enough.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ What's the Future Path for CISOs? πŸ•΅οΈβ€β™‚οΈ

A panel of former CISOs will lead the closing session of this week's RSA Conference to discuss challenges and opportunities.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese Hackers Deployed Backdoor Quintet to Down MITRE πŸ•΅οΈβ€β™‚οΈ

MITRE's hackers made use of at least five different Web shells and backdoors as part of their attack chain.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Two-Thirds of Organizations Failing to Address AI Risks, ISACA Finds πŸ“”

An ISACA survey found that just a third of organizations are adequately addressing security, privacy and ethical risks with AI.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ LockBit Honcho Faces Sanctions, With Aussie Org Ramifications πŸ•΅οΈβ€β™‚οΈ

Australian businesses and individuals now face government fines and consequences for paying ransoms or interacting with assets owned by LockBitSupp, aka Dmitry Yuryevich Khoroshev.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ APIcalypse Now: Akamai CSO warns of surging attacks and backdoored open source components πŸ“’

Apps and APIs bear the brunt as threat actors pivot to living off the land.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Microsoft security boss warns AI insecurity 'unprecedented' as tech goes mainstream πŸ“’

RSA keynote paints a terrifying picture of billionplus GenAI users facing innovative criminal tactics.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ How to inspire the next generation of scientists | Unlocked 403: Cybersecurity podcast πŸš€

As Starmus Earth draws near, we caught up with Dr. Garik Israelian to celebrate the fusion of science and creativity and venture where imagination flourishes and groundbreaking ideas take flight.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites πŸ–‹οΈ

A highseverity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat actors to create rogue admin accounts on susceptible websites. The findings come from WPScan, which said that the vulnerability CVE202340000, CVSS score 8.3 has been leveraged to set up bogus admin users with the names wpsuppuser .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Price Drop: This Complete Ethical Hacking Bundle is Now $40 🦿

Get a comprehensive, potentially lucrative ethical hacking education with 18 courses on today's top tools and tech. This bundle is just 39.97 through 512.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” MedStar Health and DocGo Reveal Data Breaches πŸ“”

MedStar Health and DocGo have become the latest US healthcare providers to announce cybersecurity incidents.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Combatting Deepfakes in Australia: Content Credentials is the Start 🦿

The production of deepfakes is accelerating at more than 1,500 in Australia, forcing organisations to create and adopt standards like Content Credentials.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Stephen Khan Receives Infosecurity Europe Hall of Fame Award, to Deliver Keynote on Four Essential Attributes CISOs Need to Succeed πŸ“”

The award recognises Khan's outstanding contributions to the field and his role in shaping the cybersecurity industry.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” A Third of Tech CISOs Are Unhappy With Their Income πŸ“”

IANS Research data finds many tech CISOs are concerned about their compensation as salaries stagnate.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Uninterrupted Power Supply (UPS): A Silent Threat to Critical Infrastructure Resilience πŸ¦…

Multiple Vulnerabilities Disclosed in CyberPower UPS Management Software  Executive Summary  UPS management software is employed by a broad spectrum of users, encompassing data centers, critical manufacturing sectors, healthcare facilities, educational institutions, government agencies, and beyond, to maintain uninterrupted missioncritical operations.  The recent disclosure of multiple vulnerabilities within CyberPower PowerPanel Business Software has raised significant concerns regarding the security of critical infrastructure CI sectors. These vulnerabilities pose a serious risk to the integrity and reliability of CI systems, potentially exposing them to exploitation by malicious actors.  The Cybersecurity and Infrastructure Security Agency CISA, a key entity within the Unit...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Fundamentals of Cloud Security Stress Testing πŸ–‹οΈ

Defenders think in lists, attackers think in graphs, said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to compromise them. The traditional approach for defenders is to list security gaps directly related to their assets in the network and eliminate as many as possible, starting with the most critical.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version πŸ–‹οΈ

A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of antianalysis techniques to fly under the radar. "These enhancements aim to increase the malware's stealthiness, thereby remaining undetected for longer periods of time," Zscaler ThreatLabz researcher Muhammed Irfan V A said in a technical report. "Hijack.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Medical equipment supplier NRS Healthcare confirms ransomware attack πŸ“’

The RansomHub group has threatened to release thousands of NRS Healthcare documents if demands arent met.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Will Hold Executives Accountable for Cybersecurity πŸ•΅οΈβ€β™‚οΈ

At least a portion of executive compensation going forward will be tied to meeting security goals and metrics.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Security Teams & SREs Want the Same Thing: Let's Make It Happen πŸ•΅οΈβ€β™‚οΈ

Site reliability engineers SREs and security teams are more powerful when they work together, and being able to combine our efforts can make or break our teams' experiences and outputs.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ A SaaS Security Challenge: Getting Permissions All in One Place πŸ–‹οΈ

Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. They spell out exactly which users have access to which data sets. The terminology differs between apps, but each users base permission is determined by their role, while additional permissions may be granted based on tasks or projects they are involved with. Layered on top of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity