πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Combatting Deepfakes in Australia: Content Credentials is the Start 🦿

The production of deepfakes is accelerating at more than 1,500 in Australia, forcing organisations to create and adopt standards like Content Credentials.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Stephen Khan Receives Infosecurity Europe Hall of Fame Award, to Deliver Keynote on Four Essential Attributes CISOs Need to Succeed πŸ“”

The award recognises Khan's outstanding contributions to the field and his role in shaping the cybersecurity industry.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” A Third of Tech CISOs Are Unhappy With Their Income πŸ“”

IANS Research data finds many tech CISOs are concerned about their compensation as salaries stagnate.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Uninterrupted Power Supply (UPS): A Silent Threat to Critical Infrastructure Resilience πŸ¦…

Multiple Vulnerabilities Disclosed in CyberPower UPS Management Software  Executive Summary  UPS management software is employed by a broad spectrum of users, encompassing data centers, critical manufacturing sectors, healthcare facilities, educational institutions, government agencies, and beyond, to maintain uninterrupted missioncritical operations.  The recent disclosure of multiple vulnerabilities within CyberPower PowerPanel Business Software has raised significant concerns regarding the security of critical infrastructure CI sectors. These vulnerabilities pose a serious risk to the integrity and reliability of CI systems, potentially exposing them to exploitation by malicious actors.  The Cybersecurity and Infrastructure Security Agency CISA, a key entity within the Unit...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Fundamentals of Cloud Security Stress Testing πŸ–‹οΈ

Defenders think in lists, attackers think in graphs, said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to compromise them. The traditional approach for defenders is to list security gaps directly related to their assets in the network and eliminate as many as possible, starting with the most critical.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version πŸ–‹οΈ

A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of antianalysis techniques to fly under the radar. "These enhancements aim to increase the malware's stealthiness, thereby remaining undetected for longer periods of time," Zscaler ThreatLabz researcher Muhammed Irfan V A said in a technical report. "Hijack.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Medical equipment supplier NRS Healthcare confirms ransomware attack πŸ“’

The RansomHub group has threatened to release thousands of NRS Healthcare documents if demands arent met.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Will Hold Executives Accountable for Cybersecurity πŸ•΅οΈβ€β™‚οΈ

At least a portion of executive compensation going forward will be tied to meeting security goals and metrics.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Security Teams & SREs Want the Same Thing: Let's Make It Happen πŸ•΅οΈβ€β™‚οΈ

Site reliability engineers SREs and security teams are more powerful when they work together, and being able to combine our efforts can make or break our teams' experiences and outputs.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ A SaaS Security Challenge: Getting Permissions All in One Place πŸ–‹οΈ

Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. They spell out exactly which users have access to which data sets. The terminology differs between apps, but each users base permission is determined by their role, while additional permissions may be granted based on tasks or projects they are involved with. Layered on top of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Spectre-Style 'Pathfinder' Attack Targets Intel CPU, Leak Encryption Keys and Data πŸ–‹οΈ

Researchers have discovered two novel attack methods targeting highperformance Intel CPUs that could be exploited to stage a key recovery attack against the Advanced Encryption Standard AES algorithm. The techniques have been collectively dubbed Pathfinder by a group of academics from the University of California San Diego, Purdue University, UNC Chapel.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Six Austrians Arrested in Multi-Million Euro Crypto Scheme πŸ“”

Europol and Eurojust targeted the orchestrators of a cryptocurrency scam launched in December 2017.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 10,000 Customers’ Data Exposed in UK Government Breaches πŸ“”

The findings come from Apricorn, based on annual Freedom of Information FOI responses from 2023.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Spot Fake News in Your Social Media Feed 🧨

Spotting fake news in your feed has always been tough. Now it just got tougher, thanks to AI.  Fake news... The post How to Spot Fake News in Your Social Media Feed appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical Bug Could Open 50K+ Tinyproxy Servers to DoS, RCE πŸ•΅οΈβ€β™‚οΈ

Patch now CVE202349606 in the open source, smallfootprint proxy server can potentially lead to remote code execution.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: CISA Launches Vulnrichment Program to Address NVD Challenges πŸ“”

CISA launched a new software vulnerability enrichment program to fill the gap left by NISTs National Vulnerability Database backlog.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Researchers Share Lessons from the World's First AI Security Incident Response Team πŸ“”

Researchers from Carnegie Mellon University have shared an overview of their new AI Security Incident Response Team AISIRT.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats 🧨

Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as Asynchronous Remote Access Trojan, represents a highly sophisticated malware... The post From Spam to AsyncRAT Tracking the Surge in NonPE Cyber Threats appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Netcraft Announces New AI-Powered Innovations to Disrupt and Expose Criminal Financial Infrastructure πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ runZero Research Explores Unexpected Exposures in Enterprise Infrastructure πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISOs Are Worried About Their Jobs & Dissatisfied With Their Incomes πŸ•΅οΈβ€β™‚οΈ

The research shows a significant drop in the number of tech CISOs that got a base salary increase in the past year roughly 18 yearoveryear.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity