πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ UK’s first national security center to open in Wales πŸ“’

CymruSOC will work to protect the country's key public organizations from cyber attack.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chrome Zero-Day Alert β€” Update Your Browser to Patch New Vulnerability πŸ–‹οΈ

Google on Thursday released security updates to address a zeroday flaw in Chrome that it said has been actively exploited in the wild. Tracked as CVE20244671, the highseverity vulnerability has been described as a case of useafterfree in the Visuals component. It was reported by an anonymous researcher on May 7, 2024. Useafterfree bugs, which arise when a program.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ What's the Right EDR for You? πŸ–‹οΈ

A guide to finding the right endpoint detection and response EDR solution for your business unique needs. Cybersecurity has become an ongoing battle between hackers and small and midsized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted to endpoints. This is why endpoint.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious Android Apps Pose as Google, Instagram, WhatsApp, Spread via Smishing πŸ–‹οΈ

Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X formerly Twitter have been observed to steal users' credentials from compromised devices. "This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices," the SonicWall Capture Labs threat research team said in a recent report. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” RSAC: Experts Highlight Novel Cyber Threats and Tactics πŸ“”

Wellfunded cybercriminals are adopting more sophisticated techniques, creating a need for defenders to stay informed about the evolving threat landscape.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Develop Valuable Cyber Security Skills Over a Lifetime for Only $56 🦿

Not only do you get access to over 90 courses, but also career mentoring, skills evaluation, training on real cyber security projects, and much more.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ You've Been Breached: What Now? πŸ•΅οΈβ€β™‚οΈ

Breaches are inevitable. Here are four steps to recovery and futureproofing your business.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dark Reading Confidential: The CISO and the SEC πŸ•΅οΈβ€β™‚οΈ

Episode 1 of Dark Reading Confidential brings Frederick Flee Lee, CISO of Reddit, Beth Burgin Waller, a practicing cyber attorney who represents many CISOs, and Ben Lee, Chief Legal Officer of Reddit, to the table.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity in a Race to Unmask a New Wave of AI-Borne Deepfakes πŸ•΅οΈβ€β™‚οΈ

Kevin Mandia, CEO of Mandiant at Google Cloud, calls for content "watermarks" as the industry braces for a barrage of mindbending AIgenerated fake audio and video traffic.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How Can Businesses Defend Themselves Against Common Cyberthreats? 🦿

TechRepublic consolidated expert advice on how businesses can defend themselves against the most common cyberthreats, including zerodays, ransomware and deepfakes.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean Hackers Deploy New Golang Malware 'Durian' Against Crypto Firms πŸ–‹οΈ

The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golangbased malware dubbed Durian as part of highlytargeted cyber attacks aimed at South Korean cryptocurrency firms. "Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads and exfiltration of files," Kaspersky.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar) πŸ–‹οΈ

Artificial intelligence AI is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, "The Future of Threat Hunting is Powered by Generative AI," where you'll explore how AI tools are shaping the future of cybersecurity defenses. During the session, Censys Security Researcher Aidan Holland will.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK's AI Safety Institute Unveils Platform to Accelerate Safe AI Development πŸ“”

The UK's open source AI safety evaluation platform, Inspect, is set to empower global collaboration for safer AI development.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… In the Shadow of Venus: Trinity Ransomware’s Covert Ties πŸ¦…

Key Takeaways CRIL Cyble Research and Intelligence Labs has discovered a new ransomware variant named Trinity. This variant employs a double extortion technique to target victims.  The Threat Actors TA behind Trinity ransomware utilize both victim support and data leak sites.   CRIL's analysis unveiled that a ransomware called "2023Lock" shares a similar ransom note format and underlying codebase with Trinity, indicating it could be a new variant of 2023Lock.  CRIL also observed similarities between Trinity and Venus ransomware, such as registry value usage and mutex naming conventions.   This suggests a potential connection or common threat actor behind the Trinity and Venus ransomware. Venus ransomware, operational since 2022, has conducted widespread attacks globally in ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How Do Hackers Hack Phones and How Can I Prevent It? 🧨

The threat of having your phone hacked has become a common fear. The truth is that it is possible to hack any phone. With the advancement of technology, where discovery of knowledge and information advances the understanding of technology, hackers are able to hack even the most sophisticated phone software. But how? The post How Do Hackers Hack Phones and How Can I Prevent It? appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ CISO as a CTO: When and Why It Makes Sense πŸ•΅οΈβ€β™‚οΈ

Enterprises are increasingly recognizing that a CISO's skills and experience building riskbased cyber programs translate well to other Csuite positions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Is CISA's Secure by Design Pledge Toothless? πŸ•΅οΈβ€β™‚οΈ

CISA's agreement is voluntary and, frankly, basic. Signatories say that's a good thing.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Reality Defender Wins RSAC Innovation Sandbox Competition πŸ•΅οΈβ€β™‚οΈ

In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for its tool for detecting and labeling deepfakes and other artificial content.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ascension Healthcare Suffers Major Cyberattack πŸ•΅οΈβ€β™‚οΈ

The attack cut off access to electronic healthcare records EHRs and ordering systems, plunging the organization and its health services into chaos.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Millions of IoT Devices at Risk from Flaws in Integrated Cellular Modem πŸ•΅οΈβ€β™‚οΈ

Researchers discovered seven vulnerabilities including an unauthenticated RCE issue in widely deployed Telit Cinterion modems.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ It's a wrap! RSA Conference 2024 highlights – Week in security with Tony Anscombe πŸš€

More than 40,000 security experts descended on San Francisco this week. Let's now look back on some of the event's highlights including the CISAled 'Secure by Design' pledge also signed by ESET.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1