πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike πŸ–‹οΈ

In the last decade, there has been a growing disconnect between frontline analysts and senior management in IT and Cybersecurity. Welldocumented challenges facing modern analysts revolve around a high volume of alerts, false positives, poor visibility of technical environments, and analysts spending too much time on manual tasks. The Impact of Alert Fatigue and False Positives  Analysts.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries πŸ–‹οΈ

Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat actors to access sensitive information and achieve code execution. "These vulnerabilities include critical flaws that permit remote code execution and unauthorized privilege escalation, posing substantial risks to integral communication networks and IoT.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia πŸ–‹οΈ

The Black Basta ransomwareasaservice RaaS operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia since its emergence in April 2022. In a joint advisory published by the Cybersecurity and Infrastructure Security Agency CISA, the Federal Bureau of Investigation FBI, the Department of Health and Human Services HHS.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What is a TOAD attack? πŸ“’

Find out what this means for your business, and what you can do to protect it.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield πŸ–‹οΈ

With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From account takeovers to malicious extensions to phishing attacks, the browser is a means for stealing sensitive data and accessing organizational systems. Security leaders who are planning their security architecture.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ascension Ransomware Attack Diverts Ambulances, Delays Appointments πŸ“”

A ransomware attack on US private healthcare provider Ascension has disrupted patient care, with several hospitals currently on diversion.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ How Did Authorities Identify the Alleged Lockbit Boss? β™ŸοΈ

Last week, the United States joined the U.K. and Australia in sanctioning and charging a Russian man named Dmitry Yuryevich Khoroshev as the leader of the infamous LockBit ransomware group. LockBit's leader "LockBitSupp" claims the feds named the wrong guy, saying the charges don't explain how they connected him to Khoroshev. This post examines the activities of Khoroshev's many alter egos on the cybercrime forums, and tracks the career of a gifted malware author who has written and sold malicious code for the past 14 years.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What’s going on with Zscaler? πŸ“’

Zscaler has received praise from cyber professionals for its response to an alleged data breach, but as the saga continues, customer uncertainty remains.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why Tokens Are Like Gold for Opportunistic Threat Actors πŸ•΅οΈβ€β™‚οΈ

When setting authentication token expiry policies, always lean in to security over employee convenience.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Dell hacker claims they had access to systems for nearly three weeks πŸ“’

The hacker trying to sell a Dell database containing 49 million customer records claims he was able to persist on the companys systems for several weeks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Best Encryption Software and Tools 🦿

This is a comprehensive list of best encryption software and tools, covering their features, pricing and more. Use this guide to determine your best fit.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices πŸ–‹οΈ

The MITRE Corporation has officially made available a new threatmodeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. "The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them," the nonprofit said.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Mallox Ransomware Deployed Via MS-SQL Honeypot Attack πŸ“”

Analyzing Mallox samples, Sekoia identified two distinct affiliates using different approaches.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Critical Vulnerabilities in Cinterion Modems Exposed πŸ“”

The flaws include CVE202347610, a security weaknesses within the modems SUPL message handlers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ IntelBroker Nabs Europol Info; Agency Investigating πŸ•΅οΈβ€β™‚οΈ

Europe's crossborder law enforcement agency says the wellknown hacking outfit, contrary to claims, did not access operational data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Stop Phone Spoofing 🧨

From impersonating police officers in Pennsylvania to employees of the City of San Antonio, scammers have been impersonating officials nationwide... The post How to Stop Phone Spoofing appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Report: Organisations Have Endpoint Security Tools But Are Still Falling Short on the Basics 🦿

AI PCs could soon see organisations invest in whole fleets of new managed devices, but Absolute Security data shows they are failing to maintain endpoint protection and patching the devices they have.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Ukrainian, Latvian TV Hijacked to Broadcast Russian Celebrations πŸ•΅οΈβ€β™‚οΈ

At least 15 television channels were interrupted in Ukraine alone, which, reportedly, is not out of the norm in this "information war.".

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ•΅οΈβ€β™‚οΈ 500 Victims In, Black Basta Reinvents With Novel Vishing Strategy πŸ•΅οΈβ€β™‚οΈ

Ransomware groups have always created problems for their victims that only they could solve. Black Basta is taking that core idea in a creative, new direction.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ–‹οΈ Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices πŸ–‹οΈ

Apple and Google on Monday officially announced the rollout of a new feature that notifies users across both iOS and Android if a Bluetooth tracking device is being used to stealthily keep tabs on them without their knowledge or consent. "This will help mitigate the misuse of devices designed to help keep track of belongings," the companies said in a joint statement, adding it aims to address ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 3 recommendations for adopting generative AI for cyber defense 🧠

In the past eighteen months, generative AI gen AI has gone from being the source of jawdropping demos to a top strategic priority in nearly every industry. A majority of CEOs report feeling under pressure to invest in gen AI. Product teams are now scrambling to build gen AI into their solutions and services. The The post 3 recommendations for adopting generative AI for cyber defense appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity