π’ UKβs first national security center to open in Wales π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
CymruSOC will work to protect the country's key public organizations from cyber attack.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
UKβs first national security center to open in Wales
CymruSOC will work to protect the country's key public organizations from cyber attack
ποΈ Chrome Zero-Day Alert β Update Your Browser to Patch New Vulnerability ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Google on Thursday released security updates to address a zeroday flaw in Chrome that it said has been actively exploited in the wild. Tracked as CVE20244671, the highseverity vulnerability has been described as a case of useafterfree in the Visuals component. It was reported by an anonymous researcher on May 7, 2024. Useafterfree bugs, which arise when a program.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ What's the Right EDR for You? ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A guide to finding the right endpoint detection and response EDR solution for your business unique needs. Cybersecurity has become an ongoing battle between hackers and small and midsized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted to endpoints. This is why endpoint.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Malicious Android Apps Pose as Google, Instagram, WhatsApp, Spread via Smishing ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X formerly Twitter have been observed to steal users' credentials from compromised devices. "This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices," the SonicWall Capture Labs threat research team said in a recent report. The.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π RSAC: Experts Highlight Novel Cyber Threats and Tactics π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Wellfunded cybercriminals are adopting more sophisticated techniques, creating a need for defenders to stay informed about the evolving threat landscape.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
RSAC: Experts Highlight Novel Cyber Threats and Tactics
Well-funded cybercriminals are adopting more sophisticated techniques, creating a need for defenders to stay informed about the evolving threat landscape
π¦Ώ Develop Valuable Cyber Security Skills Over a Lifetime for Only $56 π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Not only do you get access to over 90 courses, but also career mentoring, skills evaluation, training on real cyber security projects, and much more.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Develop valuable cyber security skills over a lifetime for only $56
Not only do you get access to over 90 courses, but also career mentoring, skills evaluation, training on real cyber security projects, and much more.
β€1
π΅οΈββοΈ You've Been Breached: What Now? π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Breaches are inevitable. Here are four steps to recovery and futureproofing your business.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
You've Been Breached: What Now?
Breaches are inevitable. Here are four steps to recovery and future-proofing your business.
π΅οΈββοΈ Dark Reading Confidential: The CISO and the SEC π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Episode 1 of Dark Reading Confidential brings Frederick Flee Lee, CISO of Reddit, Beth Burgin Waller, a practicing cyber attorney who represents many CISOs, and Ben Lee, Chief Legal Officer of Reddit, to the table.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Dark Reading Confidential: The CISO and the SEC
Dive into the complex relationship between the SEC and the Chief Information Security Officer (CISO) within publicly traded companies.
π΅οΈββοΈ Cybersecurity in a Race to Unmask a New Wave of AI-Borne Deepfakes π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Kevin Mandia, CEO of Mandiant at Google Cloud, calls for content "watermarks" as the industry braces for a barrage of mindbending AIgenerated fake audio and video traffic.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Cybersecurity Races to Unmask New Wave of AI Deepfakes
Kevin Mandia, CEO of Mandiant at Google Cloud, calls for watermarks as the industry braces for a barrage of mind-bending AI-generated fake audio and video.
π¦Ώ How Can Businesses Defend Themselves Against Common Cyberthreats? π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic consolidated expert advice on how businesses can defend themselves against the most common cyberthreats, including zerodays, ransomware and deepfakes.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
How to Protect Against Cyber Threats Before They Hit
Cyber threats are growing. See how exposure management helps businesses stop attacks early and protect critical data before itβs too late.
ποΈ North Korean Hackers Deploy New Golang Malware 'Durian' Against Crypto Firms ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golangbased malware dubbed Durian as part of highlytargeted cyber attacks aimed at South Korean cryptocurrency firms. "Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads and exfiltration of files," Kaspersky.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar) ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Artificial intelligence AI is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, "The Future of Threat Hunting is Powered by Generative AI," where you'll explore how AI tools are shaping the future of cybersecurity defenses. During the session, Censys Security Researcher Aidan Holland will.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π UK's AI Safety Institute Unveils Platform to Accelerate Safe AI Development π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The UK's open source AI safety evaluation platform, Inspect, is set to empower global collaboration for safer AI development.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
UK's AI Safety Institute Unveils Platform to Accelerate Safe AI Development
The UK's open source AI safety evaluation platform, Inspect, is set to empower global collaboration for safer AI development
π¦
In the Shadow of Venus: Trinity Ransomwareβs Covert Ties π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways CRIL Cyble Research and Intelligence Labs has discovered a new ransomware variant named Trinity. This variant employs a double extortion technique to target victims. The Threat Actors TA behind Trinity ransomware utilize both victim support and data leak sites. CRIL's analysis unveiled that a ransomware called "2023Lock" shares a similar ransom note format and underlying codebase with Trinity, indicating it could be a new variant of 2023Lock. CRIL also observed similarities between Trinity and Venus ransomware, such as registry value usage and mutex naming conventions. This suggests a potential connection or common threat actor behind the Trinity and Venus ransomware. Venus ransomware, operational since 2022, has conducted widespread attacks globally in ...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Trinity Ransomware: Covert Ties In Venus' Shadow
Explore the newly discovered Trinity ransomware, its ties to Venus, and insights from Cyble's analysis of its double extortion tactics.
𧨠How Do Hackers Hack Phones and How Can I Prevent It? π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
The threat of having your phone hacked has become a common fear. The truth is that it is possible to hack any phone. With the advancement of technology, where discovery of knowledge and information advances the understanding of technology, hackers are able to hack even the most sophisticated phone software. But how? The post How Do Hackers Hack Phones and How Can I Prevent It? appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
How Do Hackers Hack Phones and How Can I Prevent It? | McAfee Blog
Understand common hacker attack methods and how to prevent and protect your data. Stay safe from phishing, malware, and other mobile security threats.
π1
π΅οΈββοΈ CISO as a CTO: When and Why It Makes Sense π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Enterprises are increasingly recognizing that a CISO's skills and experience building riskbased cyber programs translate well to other Csuite positions.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
CISO as a CTO: When and Why It Makes Sense
Enterprises are increasingly recognizing that the CISO's skills and experience building risk-based cyber programs translate well to other C-suite positions.
π΅οΈββοΈ Is CISA's Secure by Design Pledge Toothless? π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
CISA's agreement is voluntary and, frankly, basic. Signatories say that's a good thing.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Is CISA's Secure by Design Pledge Toothless?
CISA's agreement is voluntary and, frankly, basic. Signatories say that's a good thing.
π΅οΈββοΈ Reality Defender Wins RSAC Innovation Sandbox Competition π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for its tool for detecting and labeling deepfakes and other artificial content.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Reality Defender Wins RSAC Innovation Sandbox Competition
In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for its tool for detecting and labeling deepfakes and other artificial content.
π΅οΈββοΈ Ascension Healthcare Suffers Major Cyberattack π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The attack cut off access to electronic healthcare records EHRs and ordering systems, plunging the organization and its health services into chaos.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Ascension Healthcare Suffers Major Cyberattack
The attack cut off access to electronic healthcare records (EHRs) and ordering systems, plunging the organization and its health services into chaos.
π΅οΈββοΈ Millions of IoT Devices at Risk from Flaws in Integrated Cellular Modem π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Researchers discovered seven vulnerabilities including an unauthenticated RCE issue in widely deployed Telit Cinterion modems.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Millions of IoT Devices at Risk From Integrated Modem
Researchers discovered seven vulnerabilities β including an unauthenticated RCE issue β in widely deployed Telit Cinterion modems.
π It's a wrap! RSA Conference 2024 highlights β Week in security with Tony Anscombe π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
More than 40,000 security experts descended on San Francisco this week. Let's now look back on some of the event's highlights including the CISAled 'Secure by Design' pledge also signed by ESET.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
What was hot at RSAC 2024? β Week in security with Tony Anscombe
That's a wrap on this year's RSA Conference! Let's now look back on some of its highlights β including the 'Secure by Design' pledge led by CISA and also signed by ESET
π1