πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” #RSAC: CISA Launches Vulnrichment Program to Address NVD Challenges πŸ“”

CISA launched a new software vulnerability enrichment program to fill the gap left by NISTs National Vulnerability Database backlog.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Researchers Share Lessons from the World's First AI Security Incident Response Team πŸ“”

Researchers from Carnegie Mellon University have shared an overview of their new AI Security Incident Response Team AISIRT.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats 🧨

Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as Asynchronous Remote Access Trojan, represents a highly sophisticated malware... The post From Spam to AsyncRAT Tracking the Surge in NonPE Cyber Threats appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Netcraft Announces New AI-Powered Innovations to Disrupt and Expose Criminal Financial Infrastructure πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ runZero Research Explores Unexpected Exposures in Enterprise Infrastructure πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISOs Are Worried About Their Jobs & Dissatisfied With Their Incomes πŸ•΅οΈβ€β™‚οΈ

The research shows a significant drop in the number of tech CISOs that got a base salary increase in the past year roughly 18 yearoveryear.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #RSAC: Three Strategies to Boost Open-Source Security πŸ“”

Experts at the RSA Conference discussed how governments, the opensource community and end users can work together to drastically improve the security of opensource software.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cyolo Partners With Dragos to Unveil Holistic Secure Remote Access Solution for Critical Infrastructure πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 3-Year Iranian Influence Op Preys on Divides in Israeli Society πŸ•΅οΈβ€β™‚οΈ

Iran follows in Russia's disinformation footsteps but with a different, more economical, and potentially higherimpact model.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ UK Military Data Breach a Reminder of Third-Party Risk in Defense Sector πŸ•΅οΈβ€β™‚οΈ

An attacker accessed personal information of over 225,000 active, reserve, and former UK military members from thirdparty payroll processing system.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ 'You need your own bots' to wage war against rogue AI, warns Varonis VP πŸ“’

Infosec pros are urged to get serious about data access control and automation to thwart AI breaches.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CrowdStrike CEO: Embrace AI or be crushed by cyber crooks πŸ“’

Exec urges infosec bods to adopt nextgen SIEM driven by AI or risk being outpaced by criminals.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover πŸ–‹οΈ

Two security vulnerabilities have been discovered in F5 Next Central Manager that could be exploited by a threat actor to seize control of the devices and create hidden rogue administrator accounts for persistence. The remotely exploitable flaws "can give attackers full administrative control of the device, and subsequently allow attackers to create accounts on any F5 assets managed by the Next.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fake Online Stores Scam Over 850,000 Shoppers πŸ“”

Researchers discover 75,000 domains hosting fraudulent ecommerce sites, in a campaign dubbed BogusBazaar.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Data Classification Policy 🦿

In many ways, data has become the primary currency of modern organizations. It doesnt matter whether you are a large business enterprise, SMB, government or nonprofit, the collection, management, protection and analysis of data is a determining factor in your overall success. This policy, written by Mark W. Kaelin for TechRepublic Premium, establishes an enterprisewide ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What is hackbot as a service and are malicious LLMs a risk? πŸ“’

As threat actors begin to use malicious chatbots, hackbot as a service groups are helping affiliates launch tailored attacks via subscription.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Nearly 70 software vendors sign up to CISA’s cyber resilience program πŸ“’

Major software manufacturers pledge to a voluntary framework aimed at boosting cyber resilience of customers across the US.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Guide: How to Scale Your vCISO Services Profitably πŸ–‹οΈ

Cybersecurity and compliance guidance are in high demand among SMEs. However, many of them cannot afford to hire a fulltime CISO. A vCISO can answer this need by offering ondemand access to toptier cybersecurity expertise. This is also an opportunity for MSPs and MSSPs to grow their business and bottom line. MSPs and MSSPs that expand their offerings and provide vCISO services.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery πŸ–‹οΈ

Two recently disclosed security flaws in Ivanti Connect Secure ICS devices are being exploited to deploy the infamous Mirai botnet. That's according to findings from Juniper Threat Labs, which said the vulnerabilities CVE202346805 and CVE202421887 have been leveraged to deliver the botnet payload. While CVE202346805 is an authentication bypass flaw,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI-Powered Russian Network Pushes Fake Political News πŸ“”

Researchers discover largescale Russian influence operation using GenAI to influence voters.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Latest NICE Framework Update Offers Improvements for the Cybersecurity Workforce πŸͺ–

I joined NIST as the first fulltime manager of the NICE Framework in October 2020, just one short month before NICE published the first revision NIST Special Publication 800181, the NICE Workforce Framework for Cybersecurity NICE Framework. That revision far from finalizing work was the starting point that led us to a complete refresh of the NICE Framework components, which includes Revised Work Role Categories and Work Roles including one new Work Role. Eleven new Competency Areas that extend the Frameworks cybersecurity knowledge and skills. Updated Task, Knowledge, and Skill.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity