πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Firms have paid out more than $4.8 billion in GDPR fines since 2018 πŸ“’

Tech giants headquartered in Ireland attract the biggest GDPR fines.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Persistent Burnout Is Still a Crisis in Cybersecurity πŸ•΅οΈβ€β™‚οΈ

Burnout has been an oftreported problem among security professionals for years. Are there any new ideas for supporting mental health in the industry?.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NVD Leaves Exploited Vulnerabilities Unchecked πŸ“”

Over half of CISAs known exploited vulnerabilities disclosed since February 2024 have not yet been analyzed by NISTs National Vulnerability Database.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Building a new approach to security with the next generation of penetration testing πŸ“’

Combining humanled testing with continuous automated scanning can elevate your security regime.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Mindset Needed for Large Language Models πŸ•΅οΈβ€β™‚οΈ

With the right mix of caution, creativity, and commitment, we can build a future where LLMs are not just powerful, but also fundamentally trustworthy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical Flaw in Replicate AI Platform Exposes Proprietary Data πŸ•΅οΈβ€β™‚οΈ

The finding underscores the challenges of protecting data from multiple customers across AIasaservice solutions, especially in environments that run AI models from untrusted sources.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 8 Best Penetration Testing Tools and Software 🦿

Penetration testing is vital in keeping an organizations digital assets secure. Here are the top picks among the latest pen testing tools and software.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Global Socket 1.4.43 πŸ› 

Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has endtoend encryption using OpenSSL's SRP RFC5054, AES256 and key exchange using 4096bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Frontiers, Old Tactics: Chinese Espionage Group Targets Africa & Caribbean Govts πŸ–‹οΈ

The Chinalinked threat actor known as Sharp Panda has expanded their targeting to include governmental organizations in Africa and the Caribbean as part of an ongoing cyber espionage campaign. "The campaign adopts Cobalt Strike Beacon as the payload, enabling backdoor functionalities like C2 communication and command execution while minimizing the exposure of their custom tools," Check Point.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 What is Doxing? 🧨

Imagine someone putting your personal information out online for thousands of strangers to seeyour home address, phone number, even details... The post What is Doxing? appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Indian Election Faces Cyber-Attacks, Data Leaks on Dark Web πŸ“”

Resecurity reported a 300 spike in cyberattacks postOpIsrael, intensifying since OpIndia last year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The Gorilla Guide To… How HPE ProLiant Gen11 servers powered by Intel deliver trusted security πŸ“’

How systems, software, and connections are protected.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 How I got started: AI security researcher 🧠

For the enterprise, theres no escape from deploying AI in some form. Careers focused on AI are proliferating, but one you may not be familiar with is AI security researcher. These AI specialists are cybersecurity professionals who focus on the unique vulnerabilities and threats that arise from the use of AI and machine learning ML The post How I got started AI security researcher appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybercriminals Exploit Cloud Storage For SMS Phishing Scams πŸ“”

According to Enea, these campaigns use cloud storage platforms to host malicious websites, sending links via SMS to bypass firewalls.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Gift Card Scam Targets Retailers, Not Buyers, to Print Endless $$$ πŸ•΅οΈβ€β™‚οΈ

Microsoft researchers discover an oldtimey scam with a facelift for the cloud era hacking retailers' portals to make it rain gift cards.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 IBM X-Force Report: Grandoreiro Malware Targets More Than 1,500 Banks in 60 Countries 🦿

Find out how Grandoreiro banking trojan campaigns work and the countries targeted, as well as how to mitigate this malware threat.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern πŸ–‹οΈ

Ransomware attacks targeting VMware ESXi infrastructure following an established pattern regardless of the fileencrypting malware deployed. "Virtualization platforms are a core component of organizational IT infrastructure, yet they often suffer from inherent misconfigurations and vulnerabilities, making them a lucrative and highly effective target for threat actors to abuse,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Warns of Actively Exploited Apache Flink Security Vulnerability πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday added a security flaw impacting Apache Flink, the opensource, unified streamprocessing and batchprocessing framework, to the Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. Tracked as CVE202017519, the issue relates to a case of improper access control that.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Anthropic’s Generative AI Research Reveals More About How LLMs Affect Security and Bias 🦿

Anthropic opened a window into the black box where features steer a large language models output.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Stalkerware App With Security Bug Discovered on Hotel Systems πŸ•΅οΈβ€β™‚οΈ

The spyware is able to capture screenshots of a user's device every few seconds from any location globally.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Seizing Control of the Cloud Security Cockpit πŸ•΅οΈβ€β™‚οΈ

Much like an airplane's dashboard, configurations are the way we control cloud applications and SaaS tools. It's also the entry point for too many security threats. Here are some ideas for making the configuration process more secure.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity