πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Mastercard Doubles Speed of Fraud Detection with Generative AI πŸ“”

Mastercard said it is using generative AIbased predictive technology to double the speed at which it can detect potentially compromised cards.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Unveils $50M Program to Help Hospitals Patch Cybersecurity Gaps πŸ“”

The US government UPGRADE program aims to automate vulnerability management in hospital environments, ensuring minimum disruption to services.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 What to Do If Your Email Is Hacked 🧨

I think I could count on my hand the people I know who have NOT had their email hacked. Maybe... The post What to Do If Your Email Is Hacked appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Strengthening channel partnerships and fortifying defenses in the technology sector πŸ“’

Businesses need to be able to rely on every part of their security stack to keep them protected, heres how you can bolster channel satisfaction with a commitment to cyber resilience.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Strengthening channel partnerships and fortifying defenses in the technology sector πŸ“’

Businesses need to be able to rely on every part of their security stack to keep them protected, heres how you can bolster channel satisfaction with a commitment to cyber resilience.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Novel EDR-Killing 'GhostEngine' Malware Is Built for Stealth πŸ•΅οΈβ€β™‚οΈ

The previously unknown malware aka Hidden Shovel is a ghost in the machine It silently attacks kernel drivers to shut down security defense systems and thus evade detection.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Novel EDR-Killing 'GhostEngine' Malware Is Built for Stealth πŸ•΅οΈβ€β™‚οΈ

The previously unknown malware aka Hidden Shovel is a ghost in the machine It silently attacks kernel drivers to shut down security defense systems and thus evade detection.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Preparing Your Organization for Upcoming Cybersecurity Deadlines πŸ•΅οΈβ€β™‚οΈ

Federal and state regulators have introduced new rules and mandates aimed at holding organizations accountable when it comes to cybersecurity. Here's how to get ready.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Preparing Your Organization for Upcoming Cybersecurity Deadlines πŸ•΅οΈβ€β™‚οΈ

Federal and state regulators have introduced new rules and mandates aimed at holding organizations accountable when it comes to cybersecurity. Here's how to get ready.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese 'ORB' Networks Conceal APTs, Render Static IoCs Irrelevant πŸ•΅οΈβ€β™‚οΈ

Mandiant warns that defenders must rethink how to thwart Chinese cyberespionage groups now using professional "infrastructureasaservice" operational relay box networks of virtual private servers as well as hijacked smart devices and routers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese 'ORB' Networks Conceal APTs, Render Static IoCs Irrelevant πŸ•΅οΈβ€β™‚οΈ

Mandiant warns that defenders must rethink how to thwart Chinese cyberespionage groups now using professional "infrastructureasaservice" operational relay box networks of virtual private servers as well as hijacked smart devices and routers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese Hackers Rely on Covert Proxy Networks to Evade Detection πŸ“”

Volt Typhoon and other Chinese cyber espionage actors are relying on operational relay box ORB networks, Mandiant has observed.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  I2P 2.5.2 πŸ› 

I2P is an anonymizing network, offering a simple layer that identitysensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a previously undocumented threat group called Unfading Sea Haze that's believed to have been active since 2018. The intrusion singled out highlevel organizations in South China Sea countries, particularly military and government targets, Bitdefender said in a report shared with The Hacker News. "The investigation revealed a troubling.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UserPro Plugin Vulnerability Allows Account Takeover πŸ“”

The plugin is used by over 20,000 sites and enables users to create customizable community websites.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Report Reveals 341% Rise in Advanced Phishing Attacks πŸ“”

This data comes from SlashNexts midyear State of Phishing 2024 report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Trends at the 2024 RSA Startup Competition πŸ•΅οΈβ€β™‚οΈ

Startups at Innovation Sandbox 2024 brought clarity to artificial intelligence, protecting data from AI, and accomplishing novel security solutions with new models.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ US Pumps $50M Into Better Healthcare Cyber Resilience πŸ•΅οΈβ€β™‚οΈ

Upgrade, an ARPAH program, will focus on automating cybersecurity for healthcare institutions so that providers can focus on patient care.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ GitHub Authentication Bypass Opens Enterprise Server to Attackers πŸ•΅οΈβ€β™‚οΈ

The maxseverity bug affects versions using the SAML single signon mechanism.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Microsoft Build 2024: Copilot AI Will Gain β€˜Personal Assistant’ and Custom Agent Capabilities 🦿

Other announcements included a Snapdragon Dev Kit for Windows, GitHub Copilot Extensions and the general availability of Azure AI Studio.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The End of an Era: Microsoft Phases Out VBScript for JavaScript and PowerShell πŸ–‹οΈ

Microsoft on Wednesday outlined its plans to deprecate Visual Basic Script VBScript in the second half of 2024 in favor of more advanced alternatives such as JavaScript and PowerShell. "Technology has advanced over the years, giving rise to more powerful and versatile scripting languages such as JavaScript and PowerShell," Microsoft Program Manager Naveen Shankar said. "These languages.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity