πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ LockBit Claims Wichita as Its Victim 2 Days After Ransomware Attack πŸ•΅οΈβ€β™‚οΈ

The city is still investigating the attack, and neither the group nor city officials have offered details about the ransomware demands.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation πŸ–‹οΈ

Researchers have detailed a Virtual Private Network VPN bypass technique dubbed TunnelVision that allows threat actors to snoop on victim's network traffic by just being on the same local network. The "decloaking" method has been assigned the CVE identifier CVE20243661 CVSS score 7.6. It impacts all operating systems that implement a DHCP client and has.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'The Mask' Espionage Group Resurfaces After 10-Year Hiatus πŸ•΅οΈβ€β™‚οΈ

Researchers recently spotted the Spanishspeaking threat actor with nearly 400 previous victims under its belt in a new campaign in Latin America and Central Africa.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 2 (or 5) Bugs in F5 Asset Manager Allow Full Takeover, Hidden Accounts πŸ•΅οΈβ€β™‚οΈ

F5 customers should patch immediately, though even that won't protect them from every problem with their networked devices.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ•΅οΈβ€β™‚οΈ 87% of DDoS Attacks Targeted Windows OS Devices in 2023 πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CyberProof Announces Strategic Partnership With Google Cloud πŸ•΅οΈβ€β™‚οΈ



πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Aggressive Cloud-Security Player Wiz Scores $1B in Funding Round πŸ•΅οΈβ€β™‚οΈ

The latest round of investment prices the fastgrowing cloud native application protection platform CNAPP at 12 billion with a simple mandate Grow quickly through acquisition.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISA Courts Private Sector to Get Behind CIRCIA Reporting Rules πŸ•΅οΈβ€β™‚οΈ

New regulations will require the private sector to turn over incident data to CISA within three days or face enforcement. Here's how the agency is presenting this as a benefit to the entire private sector.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸš€ RSAC 2024: AI hype overload πŸš€

Can AI effortlessly thwart all sorts of cyberattacks? Lets cut through the hyperbole surrounding the tech and look at its actual strengths and limitations.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover 'LLMjacking' Scheme Targeting Cloud-Hosted AI Models πŸ–‹οΈ

Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target cloudhosted large language model LLM services with the goal of selling access to other threat actors. The attack technique has been codenamed LLMjacking by the Sysdig Threat Research Team. "Once initial access was obtained, they exfiltrated cloud credentials and gained.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Google + Mandiant + Virus Total + AI πŸ‘½

At the RSA Conference in San Francisco, Google announced the launch of Google Threat Intelligence, a groundbreaking new offering that leverages the companys vast resources and expertise in cybersecurity to provide actionable threat intelligence at an unprecedented scale. Unparalleled Depth and Breadth of Intelligence This new platform combines the frontline.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Dell says data breach affecting 49 million customers poses no 'significant risk’ πŸ“’

Dell claims customers arent exposed to significant risk in the wake of a major breach, but customers should beware of targeted social engineering attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ UK’s first national security center to open in Wales πŸ“’

CymruSOC will work to protect the country's key public organizations from cyber attack.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chrome Zero-Day Alert β€” Update Your Browser to Patch New Vulnerability πŸ–‹οΈ

Google on Thursday released security updates to address a zeroday flaw in Chrome that it said has been actively exploited in the wild. Tracked as CVE20244671, the highseverity vulnerability has been described as a case of useafterfree in the Visuals component. It was reported by an anonymous researcher on May 7, 2024. Useafterfree bugs, which arise when a program.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ What's the Right EDR for You? πŸ–‹οΈ

A guide to finding the right endpoint detection and response EDR solution for your business unique needs. Cybersecurity has become an ongoing battle between hackers and small and midsized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted to endpoints. This is why endpoint.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious Android Apps Pose as Google, Instagram, WhatsApp, Spread via Smishing πŸ–‹οΈ

Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X formerly Twitter have been observed to steal users' credentials from compromised devices. "This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices," the SonicWall Capture Labs threat research team said in a recent report. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” RSAC: Experts Highlight Novel Cyber Threats and Tactics πŸ“”

Wellfunded cybercriminals are adopting more sophisticated techniques, creating a need for defenders to stay informed about the evolving threat landscape.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Develop Valuable Cyber Security Skills Over a Lifetime for Only $56 🦿

Not only do you get access to over 90 courses, but also career mentoring, skills evaluation, training on real cyber security projects, and much more.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ You've Been Breached: What Now? πŸ•΅οΈβ€β™‚οΈ

Breaches are inevitable. Here are four steps to recovery and futureproofing your business.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dark Reading Confidential: The CISO and the SEC πŸ•΅οΈβ€β™‚οΈ

Episode 1 of Dark Reading Confidential brings Frederick Flee Lee, CISO of Reddit, Beth Burgin Waller, a practicing cyber attorney who represents many CISOs, and Ben Lee, Chief Legal Officer of Reddit, to the table.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity in a Race to Unmask a New Wave of AI-Borne Deepfakes πŸ•΅οΈβ€β™‚οΈ

Kevin Mandia, CEO of Mandiant at Google Cloud, calls for content "watermarks" as the industry braces for a barrage of mindbending AIgenerated fake audio and video traffic.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity