πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🧠 Working in the security clearance world: How security clearances impact jobs 🧠

We recently published an article about the importance of security clearances for roles across various sectors, particularly those associated with national security and defense. But obtaining a clearance is only part of the journey. Maintaining and potentially expanding your clearance over time requires continued diligence and adherence to stringent guidelines. This brief explainer discusses the The post Working in the security clearance world How security clearances impact jobs appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure πŸ–‹οΈ

The persistent threat actors behind the SolarMarker informationstealing malware have established a multitiered infrastructure to complicate law enforcement takedown efforts, new findings from Recorded Future show. "The core of SolarMarker's operations is its layered infrastructure, which consists of at least two clusters a primary one for active operations and a secondary one likely.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🧨 What is Artificial Intelligence? 🧨

At the beginning of the year, the Associated Press described artificial intelligence AI as easily the biggest buzzword for world... The post What is Artificial Intelligence? appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Can Cybersecurity Be a Unifying Factor in Digital Trade Negotiations? πŸ•΅οΈβ€β™‚οΈ

As we face continued headwinds on provisions like data flows and ecustoms duties, further progress is both needed and achievable in digital trade policy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware and AI-Powered Hacks Drive Cyber Investment πŸ“”

The rise in ransomware and AI generated attacks has contributed to accelerate investment into cyber defenses, Infosecurity Europe found in a new study.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Russia's Turla APT Abuses MSBuild to Deliver TinyTurla Backdoor πŸ•΅οΈβ€β™‚οΈ

A threat campaign luring users with malicious documents related to human rights and public notices is aimed at giving the Russiabacked threat group access to victims' systems for cyberespionage purposes.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI Seoul Summit: 16 AI Companies Sign Frontier AI Safety Commitments πŸ“”

The signatories of these new commitments in safe AI developments include Chinese and Emirati organizations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malware Delivery via Cloud Services Exploits Unicode Trick to Deceive Users πŸ–‹οΈ

A new attack campaign dubbed CLOUDREVERSER has been observed leveraging legitimate cloud storage services like Google Drive and Dropbox to stage malicious payloads. "The VBScript and PowerShell scripts in the CLOUDREVERSER inherently involves commandandcontrollike activities by using Google Drive and Dropbox as staging platforms to manage file uploads and downloads," Securonix.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ EPA Puts Teeth Into Water Sector Cyber Efforts πŸ•΅οΈβ€β™‚οΈ

The agency plans to get more serious about enforcement as Iran and Russia step up the volume of cyberattacks on water systems nationwide.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Name That Toon: Buzz Kill πŸ•΅οΈβ€β™‚οΈ

Feeling creative? Submit your caption and our panel of experts will reward the winner with a 25 Amazon gift card.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Why Your Wi-Fi Router Doubles as an Apple AirTag β™ŸοΈ

Apple and the satellitebased broadband service Starlink each recently took steps to address new research into the potential security and privacy implications of how their services geolocate devices. Researchers from the University of Maryland say they relied on publicly available data from Apple to track the location of billions of devices globally including nonApple devices like Starlink systems and found they could use this data to monitor the destruction of Gaza, as well as the movements and in many cases identities of Russian and Ukrainian troops.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical GitHub Enterprise Server Flaw Allows Authentication Bypass πŸ–‹οΈ

GitHub has rolled out fixes to address a maximum severity flaw in the GitHub Enterprise Server GHES that could allow an attacker to bypass authentication protections. Tracked as CVE20244985 CVSS score 10.0, the issue could permit unauthorized access to an instance without requiring prior authentication. "On instances that use SAML single signon SSO authentication with the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russia’s DoppelGΓ€nger Campaign Manipulates Social Media πŸ“”

Operation Matriochka has been challenging the credibility of journalists and factcheckers since May 2022.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 70% of CISOs Expect Cyber-Attacks in Next Year, Report Finds πŸ“”

Proofpoint said the shift to remote and hybrid work has expanded the attack surface for many businesses.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 UnderDefense MAXI wins Cybersecurity Excellence Award for β€œBest MDR Solution”! 🌊

Were excited to announce a major win for UnderDefense! Weve been awarded the Cybersecurity Excellence Award in the category of Best MDR Solution for our very own UnderDefense MAXI. Competing against an array of the worlds leading MDR solutions, our holistic approach to MDR that helps security leaders cut through the noise, maximize their efforts The post UnderDefense MAXI wins Cybersecurity Excellence Award for Best MDR Solution! appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Iran APTs Tag Team Espionage, Wiper Attacks Against Israel & Albania πŸ•΅οΈβ€β™‚οΈ

Scarred Manticore is the smart, sophisticated one. But when Iran needs something destroyed, it hands the keys over to Void Manticore.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ YouTube Becomes Latest Battlefront for Phishing, Deepfakes πŸ•΅οΈβ€β™‚οΈ

Personalized phishing emails with fake collaboration opportunities and compromised video descriptions linking to malware are just some of the new tricks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ WitnessAI Launches With Guardrails for AI πŸ•΅οΈβ€β™‚οΈ

AI safety platform startup WitnessAI claims to help enterprises use AI safely and effectively with its platform addressing AI privacy, governance, and security.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ QNAP Patches New Flaws in QTS and QuTS hero Impacting NAS Appliances πŸ–‹οΈ

Taiwanese company QNAP has rolled out fixes for a set of mediumseverity flaws impacting QTS and QuTS hero, some of which could be exploited to achieve code execution on its networkattached storage NAS appliances. The issues, which impact QTS 5.1.x and QuTS hero h5.1.x, are listed below CVE202421902  An incorrect permission assignment for critical resource.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Zoom Adopts NIST-Approved Post-Quantum End-to-End Encryption for Meetings πŸ–‹οΈ

Popular enterprise services provider Zoom has announced the rollout of postquantum endtoend encryption E2EE for Zoom Meetings, with support for Zoom Phone and Zoom Rooms coming in the future. "As adversarial threats become more sophisticated, so does the need to safeguard user data," the company said in a statement. "With the launch of postquantum E2EE, we are doubling down on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Veeam Backup Enterprise Manager Flaw Allows Authentication Bypass πŸ–‹οΈ

Users of Veeam Backup Enterprise Manager are being urged to update to the latest version following the discovery of a critical security flaw that could permit an adversary to bypass authentication protections. Tracked as CVE202429849 CVSS score 9.8, the vulnerability could allow an unauthenticated attacker to log in to the Veeam Backup Enterprise Manager web interface as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity