πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Security Teams & SREs Want the Same Thing: Let's Make It Happen πŸ•΅οΈβ€β™‚οΈ

Site reliability engineers SREs and security teams are more powerful when they work together, and being able to combine our efforts can make or break our teams' experiences and outputs.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ A SaaS Security Challenge: Getting Permissions All in One Place πŸ–‹οΈ

Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. They spell out exactly which users have access to which data sets. The terminology differs between apps, but each users base permission is determined by their role, while additional permissions may be granted based on tasks or projects they are involved with. Layered on top of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Spectre-Style 'Pathfinder' Attack Targets Intel CPU, Leak Encryption Keys and Data πŸ–‹οΈ

Researchers have discovered two novel attack methods targeting highperformance Intel CPUs that could be exploited to stage a key recovery attack against the Advanced Encryption Standard AES algorithm. The techniques have been collectively dubbed Pathfinder by a group of academics from the University of California San Diego, Purdue University, UNC Chapel.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Six Austrians Arrested in Multi-Million Euro Crypto Scheme πŸ“”

Europol and Eurojust targeted the orchestrators of a cryptocurrency scam launched in December 2017.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 10,000 Customers’ Data Exposed in UK Government Breaches πŸ“”

The findings come from Apricorn, based on annual Freedom of Information FOI responses from 2023.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Spot Fake News in Your Social Media Feed 🧨

Spotting fake news in your feed has always been tough. Now it just got tougher, thanks to AI.  Fake news... The post How to Spot Fake News in Your Social Media Feed appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical Bug Could Open 50K+ Tinyproxy Servers to DoS, RCE πŸ•΅οΈβ€β™‚οΈ

Patch now CVE202349606 in the open source, smallfootprint proxy server can potentially lead to remote code execution.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: CISA Launches Vulnrichment Program to Address NVD Challenges πŸ“”

CISA launched a new software vulnerability enrichment program to fill the gap left by NISTs National Vulnerability Database backlog.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Researchers Share Lessons from the World's First AI Security Incident Response Team πŸ“”

Researchers from Carnegie Mellon University have shared an overview of their new AI Security Incident Response Team AISIRT.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats 🧨

Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as Asynchronous Remote Access Trojan, represents a highly sophisticated malware... The post From Spam to AsyncRAT Tracking the Surge in NonPE Cyber Threats appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Netcraft Announces New AI-Powered Innovations to Disrupt and Expose Criminal Financial Infrastructure πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ runZero Research Explores Unexpected Exposures in Enterprise Infrastructure πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISOs Are Worried About Their Jobs & Dissatisfied With Their Incomes πŸ•΅οΈβ€β™‚οΈ

The research shows a significant drop in the number of tech CISOs that got a base salary increase in the past year roughly 18 yearoveryear.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Three Strategies to Boost Open-Source Security πŸ“”

Experts at the RSA Conference discussed how governments, the opensource community and end users can work together to drastically improve the security of opensource software.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cyolo Partners With Dragos to Unveil Holistic Secure Remote Access Solution for Critical Infrastructure πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 3-Year Iranian Influence Op Preys on Divides in Israeli Society πŸ•΅οΈβ€β™‚οΈ

Iran follows in Russia's disinformation footsteps but with a different, more economical, and potentially higherimpact model.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ UK Military Data Breach a Reminder of Third-Party Risk in Defense Sector πŸ•΅οΈβ€β™‚οΈ

An attacker accessed personal information of over 225,000 active, reserve, and former UK military members from thirdparty payroll processing system.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ 'You need your own bots' to wage war against rogue AI, warns Varonis VP πŸ“’

Infosec pros are urged to get serious about data access control and automation to thwart AI breaches.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CrowdStrike CEO: Embrace AI or be crushed by cyber crooks πŸ“’

Exec urges infosec bods to adopt nextgen SIEM driven by AI or risk being outpaced by criminals.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover πŸ–‹οΈ

Two security vulnerabilities have been discovered in F5 Next Central Manager that could be exploited by a threat actor to seize control of the devices and create hidden rogue administrator accounts for persistence. The remotely exploitable flaws "can give attackers full administrative control of the device, and subsequently allow attackers to create accounts on any F5 assets managed by the Next.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fake Online Stores Scam Over 850,000 Shoppers πŸ“”

Researchers discover 75,000 domains hosting fraudulent ecommerce sites, in a campaign dubbed BogusBazaar.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity