π΅οΈββοΈ CISO as a CTO: When and Why It Makes Sense π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Enterprises are increasingly recognizing that a CISO's skills and experience building riskbased cyber programs translate well to other Csuite positions.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
CISO as a CTO: When and Why It Makes Sense
Enterprises are increasingly recognizing that the CISO's skills and experience building risk-based cyber programs translate well to other C-suite positions.
π΅οΈββοΈ Is CISA's Secure by Design Pledge Toothless? π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
CISA's agreement is voluntary and, frankly, basic. Signatories say that's a good thing.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Is CISA's Secure by Design Pledge Toothless?
CISA's agreement is voluntary and, frankly, basic. Signatories say that's a good thing.
π΅οΈββοΈ Reality Defender Wins RSAC Innovation Sandbox Competition π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for its tool for detecting and labeling deepfakes and other artificial content.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Reality Defender Wins RSAC Innovation Sandbox Competition
In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for its tool for detecting and labeling deepfakes and other artificial content.
π΅οΈββοΈ Ascension Healthcare Suffers Major Cyberattack π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The attack cut off access to electronic healthcare records EHRs and ordering systems, plunging the organization and its health services into chaos.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Ascension Healthcare Suffers Major Cyberattack
The attack cut off access to electronic healthcare records (EHRs) and ordering systems, plunging the organization and its health services into chaos.
π΅οΈββοΈ Millions of IoT Devices at Risk from Flaws in Integrated Cellular Modem π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Researchers discovered seven vulnerabilities including an unauthenticated RCE issue in widely deployed Telit Cinterion modems.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Millions of IoT Devices at Risk From Integrated Modem
Researchers discovered seven vulnerabilities β including an unauthenticated RCE issue β in widely deployed Telit Cinterion modems.
π It's a wrap! RSA Conference 2024 highlights β Week in security with Tony Anscombe π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
More than 40,000 security experts descended on San Francisco this week. Let's now look back on some of the event's highlights including the CISAled 'Secure by Design' pledge also signed by ESET.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
What was hot at RSAC 2024? β Week in security with Tony Anscombe
That's a wrap on this year's RSA Conference! Let's now look back on some of its highlights β including the 'Secure by Design' pledge led by CISA and also signed by ESET
π1
π How to talk about climate change β and what motivates people to action: An interview with Katharine Hayhoe π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
We spoke to climate scientist Katharine Hayhoe about intersections between climate action, human psychology and spirituality, and how to channel anxiety about the state of our planet into meaningful action.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
How to talk about climate change β and what motivates people to action: An interview with Katharine Hayhoe
We spoke to climate scientist Katharine Hayhoe about climate change, faith and human psychology β and how to channel anxiety about the state of our planet into meaningful action
π In it to win it! WeLiveSecurity shortlisted for European Security Blogger Awards π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Were thrilled to announce that WeLiveSecurity has been named a finalist in the Corporates Best Cybersecurity Vendor Blog category of the European Security Blogger Awards 2024.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
In it to win it! WeLiveSecurity shortlisted for European Security Blogger Awards
Weβre thrilled to announce that WeLiveSecurity has been named a finalist in the Corporates β Best Cybersecurity Vendor Blog category of the European Security Blogger Awards 2024.
π½ Public-Private Partnership for Cybersecurity π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Sixtyeight technology companies have joined the Cybersecurity and Infrastructure Security Agencys CISA Joint Cyber Defense Collaborative JCDC. This publicprivate partnership aims to bolster the nations cyber defenses by fostering collaboration between government agencies and private sector organizations. This significant move comes in response to the increasing frequency and sophistication of.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Be4Sec
Public-Private Partnership for Cybersecurity
Sixty-eight technology companies have joined the Cybersecurity and Infrastructure Security Agencyβs (CISA) Joint Cyber Defense Collaborative (JCDC). This public-private partnership aims to boβ¦
β€1
ποΈ FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver MSIX installers that culminate in the deployment of NetSupport RAT. "The threat actors used malicious websites to impersonate wellknown brands, including AnyDesk, WinSCP, BlackRock, Asana, Concur, The Wall.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
β€2
π½ The Future of Information Warfare: LLMs and the Fight for Truth π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
A recent investigation by Recorded Future, a threat intelligence firm, has raised alarms about the use of Large Language Models LLMs as a powerful tool in information warfare. The company uncovered a network called CopyCop, allegedly linked to Russia, which has been leveraging LLMs to manipulate news from mainstream media.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
be4sec
The Future of Information Warfare: LLMs and the Fight for Truth
A recent investigation by Recorded Future, a threat intelligence firm, has raised alarms about the use of Large Language Models (LLMs) as a powerful tool in information warfare. The company uncoverβ¦
β€1
π½ Claiming Access to Zscaler π½
π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
The Englishspeaking actor named IntelBroker claimed that she gained access to Zscaler and that this access information was for sale in Breachforums. Allegedly, the actor has SMTP, certificate and many other access. BreachForums, also known as Breached, was a notorious Englishlanguage hacking forum launched in March 2022 as a successor.π Read more.
π Via "BE3SEC"
----------
ποΈ Seen on @cibsecurity
Be4Sec
Claiming Access to Zscaler
The English-speaking actor named IntelBroker claimed that she gained access to Zscaler and that this access information was for sale in Breachforums. Allegedly, the actor has SMTP, certificate and β¦
π’ 5 takeaways from RSA Conference 2024 π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
RSA racks up hefty roster of keynote speakers to tout 'Art of Possible'.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Five things we learned from the 2024 RSA Conference
Speakers at the 2024 RSA Conference painted a bleak picture for the future of the cyber security industry
β€1
π’ Identity plays a critical role in protecting your business, how will you respond when compromised? π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Drawing on experiences from a recent data breach, we look at one companys efforts to reform the industry through a strategic approach to fighting cyberthreats.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Identity plays a critical role in protecting your business, how will you respond when compromised?
Drawing on experiences from a recent data breach, we look at one companyβs efforts to reform the industry through a strategic approach to fighting cyberthreats
ποΈ Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golangversion of the Sliver commandandcontrol C2 framework within a PNG image of the project's logo. The package employing this steganographic trickery is requestsdarwinlite, which has been.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Black Basta Ransomware Victim Count Tops 500 π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Affiliates of prolific Black Basta ransomware group have breached over 500 global organizations.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Black Basta Ransomware Victim Count Tops 500
Affiliates of prolific Black Basta ransomware group have breached over 500 global organizations
π Threat Actor Claims Major Europol Data Breach π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A threat actor known as IntelBroker claims to be selling confidential Europol data after a May breach.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Threat Actor Claims Major Europol Data Breach
A threat actor known as IntelBroker claims to be selling confidential Europol data after a May breach
ποΈ SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
In the last decade, there has been a growing disconnect between frontline analysts and senior management in IT and Cybersecurity. Welldocumented challenges facing modern analysts revolve around a high volume of alerts, false positives, poor visibility of technical environments, and analysts spending too much time on manual tasks. The Impact of Alert Fatigue and False Positives Analysts.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat actors to access sensitive information and achieve code execution. "These vulnerabilities include critical flaws that permit remote code execution and unauthorized privilege escalation, posing substantial risks to integral communication networks and IoT.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Black Basta ransomwareasaservice RaaS operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia since its emergence in April 2022. In a joint advisory published by the Cybersecurity and Infrastructure Security Agency CISA, the Federal Bureau of Investigation FBI, the Department of Health and Human Services HHS.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π’ What is a TOAD attack? π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Find out what this means for your business, and what you can do to protect it.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
What is a TOAD attack?
Telephone-oriented attack delivery (TOAD) is on the rise β to protect staff, leaders must deploy robust identity controls