πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 How to Set Up & Use a VPN on Android (A Step-by-Step Guide) 🦿

Trying to configure or set up a VPN on your Android? Learn how to get started with our stepbystep guide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ebury Botnet Malware Compromises 400,000 Linux Servers Over Past 14 Years πŸ–‹οΈ

A malware botnet called Ebury is estimated to have compromised 400,000 Linux servers since 2009, out of which more than 100,000 were still compromised as of late 2023. The findings come from Slovak cybersecurity firm ESET, which characterized it as one of the most advanced serverside malware campaigns for financial gain. "Ebury actors have been pursuing monetization activities ...,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ It's Time to Master the Lift & Shift: Migrating from VMware vSphere to Microsoft Azure πŸ–‹οΈ

While cloud adoption has been top of mind for many IT professionals for nearly a decade, its only in recent months, with industry changes and announcements from key players, that many recognize the time to make the move is now. It may feel like a daunting task, but tools exist to help you move your virtual machines VMs to a public cloud provider like Microsoft Azure.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Santander Customer Data Compromised Following Third-Party Breach πŸ“”

Santander has warned that customer and employee data has been breached following unauthorized access to a database held by a thirdparty provider.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Security leaders report pressure from boards to downplay cyber risks πŸ“’

Senior cyber security professionals said they are feeling pressure from boards to downplay the severity of cyber risks, but how can CISOs respond?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Westcon-Comstor and Vector AI expand European distribution agreement πŸ“’

The specialist distributor is looking to drive adoption of Vectras AIdriven security platform in the UK, Ireland, and Nordic countries.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ (Cyber) Risk = Probability of Occurrence x Damage πŸ–‹οΈ

Heres How to Enhance Your Cyber Resilience with CVSS In late 2023, the Common Vulnerability Scoring System CVSS v4.0 was unveiled, succeeding the eightyearold CVSS v3.0, with the aim to enhance vulnerability assessment for both industry and the public. This latest version introduces additional metrics like safety and automation to address criticism of lacking granularity.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Expands Synthetic Content Watermarking Tool to AI-Generated Text πŸ“”

Google DeepMinds SynthID can now be used to watermark AIgenerated images, audio, text and video.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 New cybersecurity sheets from CISA and NSA: An overview 🧠

The Cybersecurity and Infrastructure Security Agency CISA and National Security Agency NSA have recently released new CSI Cybersecurity Information sheets aimed at providing information and guidelines to organizations on how to effectively secure their cloud environments. This new release includes a total of five CSI sheets, covering various aspects of cloud security such as threat The post New cybersecurity sheets from CISA and NSA An overview appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How To Spot A Fake Facebook Account 🧨

How do you manage your Facebook friends? Do you keep your list really tight and only include active pals? Or... The post How To Spot A Fake Facebook Account appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions πŸ–‹οΈ

An unnamed European Ministry of Foreign Affairs MFA and its three diplomatic missions in the Middle East were targeted by two previously undocumented backdoors tracked as LunarWeb and LunarMail. ESET, which identified the activity, attributed it with medium confidence to the Russiaaligned cyberespionage group Turla aka Iron Hunter, Pensive Ursa, Secret Blizzard, Snake, Uroburos, and Venomous.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NCSC Expands Election Cybersecurity to Safeguard Candidates and Officials πŸ“”

The National Cyber Security Centre launches an optin Personal Internet Protection service to safeguard individuals from cyber threats during the upcoming election.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 3 Tips for Becoming the Champion of Your Organization's AI Committee πŸ•΅οΈβ€β™‚οΈ

CISOs are now considered part of the organizational executive leadership and have both the responsibility and the opportunity to drive not just security but business success.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Philippines National Police Cyberattack πŸ‘½

A threat actor claimed that they have data from Philippines National Police, and advertised the data in breachforums.vc. It is claimed that the data is belonging to Philippines National Police Logistics Data Information and Management System. Some sample data also shared by the threat actor. Breachforums.vc is an Englishlanguage forum.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Christie's response to cyber attack underscores the fine art of resilience πŸ“’

Christies suffered a technology security incident that shut down its website ahead of what was projected to be a lucrative week of sales.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ D-Link Routers Vulnerable to Takeover Via Exploit for Zero-Day πŸ•΅οΈβ€β™‚οΈ

A vulnerability in the HNAP login request protocol that affects a family of devices gives unauthenticated users root access for command execution.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cyber-Attack Disrupts Christie’s $840M Art Auctions πŸ“”

Despite this setback, the auction house said bids can still be placed by phone and inperson.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” PDF Exploitation Targets Foxit Reader Users πŸ“”

CPR said exploit builders in .NET and Python have been employed to deploy this malware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Launches AI-Powered Theft and Data Protection Features for Android Devices πŸ–‹οΈ

Google has announced a slew of privacy and security features in Android, including a suite of advanced protection features to help secure users' devices and data in the event of a theft. These features aim to help protect data before, during and after a theft attempt, the tech giant said, adding they are expected to be available via an update to Google Play services for devices running.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Android 15 Rolls Out Advanced Features to Protect Users from Scams and Malicious Apps πŸ–‹οΈ

Google is unveiling a set of new features in Android 15 to prevent malicious apps installed on the device from capturing sensitive data. This constitutes an update to the Play Integrity API that thirdparty app developers can take advantage of to secure their applications against malware. "Developers can check if there are other apps running that could be capturing the screen, creating.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity πŸ–‹οΈ

Law enforcement agencies have officially seized control of the notorious BreachForums platform, an online bazaar known for peddling stolen data, for the second time within a year. The website "breachforums.st" has been replaced by a seizure banner stating the clearnet cybercrime forum is under the control of the Federal Bureau of Investigation FBI.  The operation is the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1🀬1