πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Dell hacker claims they had access to systems for nearly three weeks πŸ“’

The hacker trying to sell a Dell database containing 49 million customer records claims he was able to persist on the companys systems for several weeks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Best Encryption Software and Tools 🦿

This is a comprehensive list of best encryption software and tools, covering their features, pricing and more. Use this guide to determine your best fit.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices πŸ–‹οΈ

The MITRE Corporation has officially made available a new threatmodeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. "The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them," the nonprofit said.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Mallox Ransomware Deployed Via MS-SQL Honeypot Attack πŸ“”

Analyzing Mallox samples, Sekoia identified two distinct affiliates using different approaches.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Critical Vulnerabilities in Cinterion Modems Exposed πŸ“”

The flaws include CVE202347610, a security weaknesses within the modems SUPL message handlers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ IntelBroker Nabs Europol Info; Agency Investigating πŸ•΅οΈβ€β™‚οΈ

Europe's crossborder law enforcement agency says the wellknown hacking outfit, contrary to claims, did not access operational data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Stop Phone Spoofing 🧨

From impersonating police officers in Pennsylvania to employees of the City of San Antonio, scammers have been impersonating officials nationwide... The post How to Stop Phone Spoofing appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Report: Organisations Have Endpoint Security Tools But Are Still Falling Short on the Basics 🦿

AI PCs could soon see organisations invest in whole fleets of new managed devices, but Absolute Security data shows they are failing to maintain endpoint protection and patching the devices they have.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Ukrainian, Latvian TV Hijacked to Broadcast Russian Celebrations πŸ•΅οΈβ€β™‚οΈ

At least 15 television channels were interrupted in Ukraine alone, which, reportedly, is not out of the norm in this "information war.".

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ•΅οΈβ€β™‚οΈ 500 Victims In, Black Basta Reinvents With Novel Vishing Strategy πŸ•΅οΈβ€β™‚οΈ

Ransomware groups have always created problems for their victims that only they could solve. Black Basta is taking that core idea in a creative, new direction.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘3
πŸ–‹οΈ Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices πŸ–‹οΈ

Apple and Google on Monday officially announced the rollout of a new feature that notifies users across both iOS and Android if a Bluetooth tracking device is being used to stealthily keep tabs on them without their knowledge or consent. "This will help mitigate the misuse of devices designed to help keep track of belongings," the companies said in a joint statement, adding it aims to address ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 3 recommendations for adopting generative AI for cyber defense 🧠

In the past eighteen months, generative AI gen AI has gone from being the source of jawdropping demos to a top strategic priority in nearly every industry. A majority of CEOs report feeling under pressure to invest in gen AI. Product teams are now scrambling to build gen AI into their solutions and services. The The post 3 recommendations for adopting generative AI for cyber defense appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Claiming Access to Coinbase πŸ‘½

A threat actor claimed that they have an access to Coinbase with ability to check the balance of any account. The advertisement shared in Telegram group. Coinbase is a leading cryptocurrency exchange platform founded in 2012, headquartered in the United States. It allows users to buy, sell, and store various.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Hackers Use DNS Tunneling to Scan and Track Victims πŸ“”

Palo Alto Networks warns threat actors are using DNS tunneling techniques to probe for network vulnerabilities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FCC Names and Shames First Robocall Threat Actor πŸ“”

In a first, the FCC has designated Royal Tiger as a malicious robocall threat group.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Scattered Spider, the ransomware group behind the MGM cyber attack, is still on a rampage – and authorities are ramping up efforts to catch them πŸ“’

Scattered Spider brought MGM Resorts to its knees in late 2023, and despite a law enforcement crackdown, its still highly active.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Insurance and NCSC Join Forces to Fight Ransomware Payments πŸ“”

UK insurers and the National Cybersecurity Centre release new guidance to discourage ransomware payments by businesses.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 6 Mistakes Organizations Make When Deploying Advanced Authentication πŸ–‹οΈ

Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link their human users. Having some form of 2factor authentication in place is a great start, but many organizations may not yet be in that spot or have the needed level of authentication sophistication to adequately safeguard organizational data. When deploying.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ongoing Campaign Bombarded Enterprises with Spam Emails and Phone Calls πŸ–‹οΈ

Cybersecurity researchers have uncovered an ongoing social engineering campaign that bombards enterprises with spam emails with the goal of obtaining initial access to their environments for followon exploitation. "The incident involves a threat actor overwhelming a user's email with junk and calling the user, offering assistance," Rapid7 researchers Tyler McGraw, Thomas Elkins, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The HSE cyber attack was a "landmark event" in Ireland - has it learned from the experience? πŸ“’

The HSE cyber attack in 2021 was one of the worst security incidents in Irish history, but three years on, has the health service learned from its mistakes?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Heartbleed: When Is It Good to Name a Vulnerability? πŸ•΅οΈβ€β™‚οΈ

Ten years have passed since Heartbleed was first identified, but the security industry is still grappling with the question of branded vulnerabilities and naming vulnerabilities appropriately.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity