π΅οΈββοΈ You've Been Breached: What Now? π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Breaches are inevitable. Here are four steps to recovery and futureproofing your business.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
You've Been Breached: What Now?
Breaches are inevitable. Here are four steps to recovery and future-proofing your business.
π΅οΈββοΈ Dark Reading Confidential: The CISO and the SEC π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Episode 1 of Dark Reading Confidential brings Frederick Flee Lee, CISO of Reddit, Beth Burgin Waller, a practicing cyber attorney who represents many CISOs, and Ben Lee, Chief Legal Officer of Reddit, to the table.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Dark Reading Confidential: The CISO and the SEC
Dive into the complex relationship between the SEC and the Chief Information Security Officer (CISO) within publicly traded companies.
π΅οΈββοΈ Cybersecurity in a Race to Unmask a New Wave of AI-Borne Deepfakes π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Kevin Mandia, CEO of Mandiant at Google Cloud, calls for content "watermarks" as the industry braces for a barrage of mindbending AIgenerated fake audio and video traffic.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Cybersecurity Races to Unmask New Wave of AI Deepfakes
Kevin Mandia, CEO of Mandiant at Google Cloud, calls for watermarks as the industry braces for a barrage of mind-bending AI-generated fake audio and video.
π¦Ώ How Can Businesses Defend Themselves Against Common Cyberthreats? π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic consolidated expert advice on how businesses can defend themselves against the most common cyberthreats, including zerodays, ransomware and deepfakes.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
How to Protect Against Cyber Threats Before They Hit
Cyber threats are growing. See how exposure management helps businesses stop attacks early and protect critical data before itβs too late.
ποΈ North Korean Hackers Deploy New Golang Malware 'Durian' Against Crypto Firms ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golangbased malware dubbed Durian as part of highlytargeted cyber attacks aimed at South Korean cryptocurrency firms. "Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads and exfiltration of files," Kaspersky.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar) ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Artificial intelligence AI is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, "The Future of Threat Hunting is Powered by Generative AI," where you'll explore how AI tools are shaping the future of cybersecurity defenses. During the session, Censys Security Researcher Aidan Holland will.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π UK's AI Safety Institute Unveils Platform to Accelerate Safe AI Development π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The UK's open source AI safety evaluation platform, Inspect, is set to empower global collaboration for safer AI development.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
UK's AI Safety Institute Unveils Platform to Accelerate Safe AI Development
The UK's open source AI safety evaluation platform, Inspect, is set to empower global collaboration for safer AI development
π¦
In the Shadow of Venus: Trinity Ransomwareβs Covert Ties π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways CRIL Cyble Research and Intelligence Labs has discovered a new ransomware variant named Trinity. This variant employs a double extortion technique to target victims. The Threat Actors TA behind Trinity ransomware utilize both victim support and data leak sites. CRIL's analysis unveiled that a ransomware called "2023Lock" shares a similar ransom note format and underlying codebase with Trinity, indicating it could be a new variant of 2023Lock. CRIL also observed similarities between Trinity and Venus ransomware, such as registry value usage and mutex naming conventions. This suggests a potential connection or common threat actor behind the Trinity and Venus ransomware. Venus ransomware, operational since 2022, has conducted widespread attacks globally in ...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Trinity Ransomware: Covert Ties In Venus' Shadow
Explore the newly discovered Trinity ransomware, its ties to Venus, and insights from Cyble's analysis of its double extortion tactics.
𧨠How Do Hackers Hack Phones and How Can I Prevent It? π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
The threat of having your phone hacked has become a common fear. The truth is that it is possible to hack any phone. With the advancement of technology, where discovery of knowledge and information advances the understanding of technology, hackers are able to hack even the most sophisticated phone software. But how? The post How Do Hackers Hack Phones and How Can I Prevent It? appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
How Do Hackers Hack Phones and How Can I Prevent It? | McAfee Blog
Understand common hacker attack methods and how to prevent and protect your data. Stay safe from phishing, malware, and other mobile security threats.
π1
π΅οΈββοΈ CISO as a CTO: When and Why It Makes Sense π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Enterprises are increasingly recognizing that a CISO's skills and experience building riskbased cyber programs translate well to other Csuite positions.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
CISO as a CTO: When and Why It Makes Sense
Enterprises are increasingly recognizing that the CISO's skills and experience building risk-based cyber programs translate well to other C-suite positions.
π΅οΈββοΈ Is CISA's Secure by Design Pledge Toothless? π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
CISA's agreement is voluntary and, frankly, basic. Signatories say that's a good thing.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Is CISA's Secure by Design Pledge Toothless?
CISA's agreement is voluntary and, frankly, basic. Signatories say that's a good thing.
π΅οΈββοΈ Reality Defender Wins RSAC Innovation Sandbox Competition π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for its tool for detecting and labeling deepfakes and other artificial content.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Reality Defender Wins RSAC Innovation Sandbox Competition
In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for its tool for detecting and labeling deepfakes and other artificial content.
π΅οΈββοΈ Ascension Healthcare Suffers Major Cyberattack π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The attack cut off access to electronic healthcare records EHRs and ordering systems, plunging the organization and its health services into chaos.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Ascension Healthcare Suffers Major Cyberattack
The attack cut off access to electronic healthcare records (EHRs) and ordering systems, plunging the organization and its health services into chaos.
π΅οΈββοΈ Millions of IoT Devices at Risk from Flaws in Integrated Cellular Modem π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Researchers discovered seven vulnerabilities including an unauthenticated RCE issue in widely deployed Telit Cinterion modems.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Millions of IoT Devices at Risk From Integrated Modem
Researchers discovered seven vulnerabilities β including an unauthenticated RCE issue β in widely deployed Telit Cinterion modems.
π It's a wrap! RSA Conference 2024 highlights β Week in security with Tony Anscombe π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
More than 40,000 security experts descended on San Francisco this week. Let's now look back on some of the event's highlights including the CISAled 'Secure by Design' pledge also signed by ESET.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
What was hot at RSAC 2024? β Week in security with Tony Anscombe
That's a wrap on this year's RSA Conference! Let's now look back on some of its highlights β including the 'Secure by Design' pledge led by CISA and also signed by ESET
π1
π How to talk about climate change β and what motivates people to action: An interview with Katharine Hayhoe π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
We spoke to climate scientist Katharine Hayhoe about intersections between climate action, human psychology and spirituality, and how to channel anxiety about the state of our planet into meaningful action.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
How to talk about climate change β and what motivates people to action: An interview with Katharine Hayhoe
We spoke to climate scientist Katharine Hayhoe about climate change, faith and human psychology β and how to channel anxiety about the state of our planet into meaningful action
π In it to win it! WeLiveSecurity shortlisted for European Security Blogger Awards π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Were thrilled to announce that WeLiveSecurity has been named a finalist in the Corporates Best Cybersecurity Vendor Blog category of the European Security Blogger Awards 2024.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
In it to win it! WeLiveSecurity shortlisted for European Security Blogger Awards
Weβre thrilled to announce that WeLiveSecurity has been named a finalist in the Corporates β Best Cybersecurity Vendor Blog category of the European Security Blogger Awards 2024.
π½ Public-Private Partnership for Cybersecurity π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Sixtyeight technology companies have joined the Cybersecurity and Infrastructure Security Agencys CISA Joint Cyber Defense Collaborative JCDC. This publicprivate partnership aims to bolster the nations cyber defenses by fostering collaboration between government agencies and private sector organizations. This significant move comes in response to the increasing frequency and sophistication of.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Be4Sec
Public-Private Partnership for Cybersecurity
Sixty-eight technology companies have joined the Cybersecurity and Infrastructure Security Agencyβs (CISA) Joint Cyber Defense Collaborative (JCDC). This public-private partnership aims to boβ¦
β€1
ποΈ FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver MSIX installers that culminate in the deployment of NetSupport RAT. "The threat actors used malicious websites to impersonate wellknown brands, including AnyDesk, WinSCP, BlackRock, Asana, Concur, The Wall.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
β€2
π½ The Future of Information Warfare: LLMs and the Fight for Truth π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
A recent investigation by Recorded Future, a threat intelligence firm, has raised alarms about the use of Large Language Models LLMs as a powerful tool in information warfare. The company uncovered a network called CopyCop, allegedly linked to Russia, which has been leveraging LLMs to manipulate news from mainstream media.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
be4sec
The Future of Information Warfare: LLMs and the Fight for Truth
A recent investigation by Recorded Future, a threat intelligence firm, has raised alarms about the use of Large Language Models (LLMs) as a powerful tool in information warfare. The company uncoverβ¦
β€1
π½ Claiming Access to Zscaler π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
The Englishspeaking actor named IntelBroker claimed that she gained access to Zscaler and that this access information was for sale in Breachforums. Allegedly, the actor has SMTP, certificate and many other access. BreachForums, also known as Breached, was a notorious Englishlanguage hacking forum launched in March 2022 as a successor.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Be4Sec
Claiming Access to Zscaler
The English-speaking actor named IntelBroker claimed that she gained access to Zscaler and that this access information was for sale in Breachforums. Allegedly, the actor has SMTP, certificate and β¦