πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ¦… Ransomware Menace Amplifies for Vulnerable Industrial Control Systems: Heightened Threats to Critical Infrastructure πŸ¦…

Ransomhub Targets SCADA of Spanish Bio Energy Plant  The protection of Industrial Control Systems ICS has emerged as a significant concern across all sectors. The security challenges surrounding ICS environments and the essential measures needed to protect vital operations in every industry are undeniable. Since 2022, numerous cyberattacks exploiting loopholes in ICS environments have led to severe repercussions, impacting not just organizations but also critical national infrastructure. These incidents have disrupted public services and governance, underscoring the urgent need for robust security measures to safeguard against such threats.  In a recent disclosure by a recently emerged ransomware group, Ransomhub, claimed an attack on the Spanish Abattoir, Matadero de Gijn. Consid...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” PSNI Faces Β£750,000 Data Breach Fine After Spreadsheet Leak πŸ“”

The Police Service of Northern Ireland has been fined 750K following a serious data breach last year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” GitHub Fixes Maximum Severity Flaw in Enterprise Server πŸ“”

A newly patched GitHub Enterprise Server bug has a CVSS score of 10.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Ivanti Patches Critical Remote Code Execution Flaws in Endpoint Manager πŸ–‹οΈ

Ivanti on Tuesday rolled out fixes to address multiple critical security flaws in Endpoint Manager EPM that could be exploited to achieve remote code execution under certain circumstances. Six of the 10 vulnerabilities from CVE202429822 through CVE202429827 CVSS scores 9.6 relate to SQL injection flaws that allow an unauthenticated attacker within the same network to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ China APT Stole Geopolitical Secrets From Middle East, Africa & Asia πŸ•΅οΈβ€β™‚οΈ

One of China's biggest espionage operations owes its success to longstanding Microsoft Exchange bugs, open source tools, and old malware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Are Your SaaS Backups as Secure as Your Production Data? πŸ–‹οΈ

Conversations about data security tend to diverge into three main threads How can we protect the data we store on our onpremises or cloud infrastructure? What strategies and tools or platforms can reliably backup and restore data? What would losing all this data cost us, and how quickly could we get it back? All are valid and necessary conversations for technology organizations of all shapes.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Inside Operation Diplomatic Specter: Chinese APT Group's Stealthy Tactics Exposed πŸ–‹οΈ

Governmental entities in the Middle East, Africa, and Asia are the target of a Chinese advanced persistent threat APT group as part of an ongoing cyber espionage campaign dubbed Operation Diplomatic Specter since at least late 2022. "An analysis of this threat actors activity reveals longterm espionage operations against at least seven governmental entities," Palo Alto Networks.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” National Records of Scotland Data Breached in NHS Cyber-Attack πŸ“”

National Records of Scotland said sensitive personal data it holds was part of information stolen and published online by ransomware attackers from NHS Dumfries and Galloway.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Firms have paid out more than $4.8 billion in GDPR fines since 2018 πŸ“’

Tech giants headquartered in Ireland attract the biggest GDPR fines.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Persistent Burnout Is Still a Crisis in Cybersecurity πŸ•΅οΈβ€β™‚οΈ

Burnout has been an oftreported problem among security professionals for years. Are there any new ideas for supporting mental health in the industry?.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NVD Leaves Exploited Vulnerabilities Unchecked πŸ“”

Over half of CISAs known exploited vulnerabilities disclosed since February 2024 have not yet been analyzed by NISTs National Vulnerability Database.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Building a new approach to security with the next generation of penetration testing πŸ“’

Combining humanled testing with continuous automated scanning can elevate your security regime.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Mindset Needed for Large Language Models πŸ•΅οΈβ€β™‚οΈ

With the right mix of caution, creativity, and commitment, we can build a future where LLMs are not just powerful, but also fundamentally trustworthy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical Flaw in Replicate AI Platform Exposes Proprietary Data πŸ•΅οΈβ€β™‚οΈ

The finding underscores the challenges of protecting data from multiple customers across AIasaservice solutions, especially in environments that run AI models from untrusted sources.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 8 Best Penetration Testing Tools and Software 🦿

Penetration testing is vital in keeping an organizations digital assets secure. Here are the top picks among the latest pen testing tools and software.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Global Socket 1.4.43 πŸ› 

Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has endtoend encryption using OpenSSL's SRP RFC5054, AES256 and key exchange using 4096bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Frontiers, Old Tactics: Chinese Espionage Group Targets Africa & Caribbean Govts πŸ–‹οΈ

The Chinalinked threat actor known as Sharp Panda has expanded their targeting to include governmental organizations in Africa and the Caribbean as part of an ongoing cyber espionage campaign. "The campaign adopts Cobalt Strike Beacon as the payload, enabling backdoor functionalities like C2 communication and command execution while minimizing the exposure of their custom tools," Check Point.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 What is Doxing? 🧨

Imagine someone putting your personal information out online for thousands of strangers to seeyour home address, phone number, even details... The post What is Doxing? appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Indian Election Faces Cyber-Attacks, Data Leaks on Dark Web πŸ“”

Resecurity reported a 300 spike in cyberattacks postOpIsrael, intensifying since OpIndia last year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The Gorilla Guide To… How HPE ProLiant Gen11 servers powered by Intel deliver trusted security πŸ“’

How systems, software, and connections are protected.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 How I got started: AI security researcher 🧠

For the enterprise, theres no escape from deploying AI in some form. Careers focused on AI are proliferating, but one you may not be familiar with is AI security researcher. These AI specialists are cybersecurity professionals who focus on the unique vulnerabilities and threats that arise from the use of AI and machine learning ML The post How I got started AI security researcher appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity