πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Get 9 Courses on Ethical Hacking for Just $50 🦿

Kickstart a lucrative career in pentesting and ethical hacking with this ninecourse bundle from IDUNOVA, now on sale for just 49.99 for a limited time.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ WithSecure Sphere 2024 live: All the news and updates as they happen πŸ“’

ITPro is live on the ground in Helsinki for WithSecure SPHERE 2024 follow all the news, updates, and announcements as they happen.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ–‹οΈ WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites πŸ–‹οΈ

Unknown threat actors are abusing lesserknown code snippet plugins for WordPress to insert malicious PHP code in victim sites that are capable of harvesting credit card data. The campaign, observed by Sucuri on May 11, 2024, entails the abuse of a WordPress plugin called Dessky Snippets, which allows users to add custom PHP code. It has over 200 active installations.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks πŸ–‹οΈ

A maximumseverity security flaw has been disclosed in the TPLink Archer C5400X gaming router that could lead to remote code execution on susceptible devices by sending specially crafted requests. The vulnerability, tracked as CVE20245035, carries a CVSS score of 10.0. It impacts all versions of the router firmware including and prior to 11.1.6. It has .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Why Human Risk Management is Cybersecurity's Next Step for Awareness πŸ“”

With most cyberattacks still involving a nonmalicious human element, it is clear that awareness training alone is insufficient, this is where human risk management comes into play.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Charity Bridges Digital Divide and Fuels New Cyber Talent πŸ“”

Every Child Online, a UK charity, tackles the digital divide and potential cybersecurity skills gap by offering free refurbished IT equipment to underprivileged children.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How identity theft makes a mockery of traditional antivirus – and exposes your business to unnecessary risk πŸ“’

Pinning your businesss cyber resilience on traditional antivirus software is no longer a viable security strategy, heres how identitybased attacks are rewriting cyber security.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Why embracing Endpoint Security and Identity Protection could be the most important security decision you take in 2024 and beyond πŸ“’

Leaders can use EPP and IDP to combine disparate security solutions in the cloud and shore up the most common routes for attack.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Christie’s given Friday ransom deadline after threat group claims responsibility for cyber attack πŸ“’

Christie's has been handed an ultimatum by RansomHub.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 6 Best VPNs for Canada in 2024 (Free & Paid VPNs) 🦿

What is the best VPN provider in Canada? Use our guide to compare the pricing and features of our recommended VPNs for Canada.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 4-Step Approach to Mapping and Securing Your Organization's Most Critical Assets πŸ–‹οΈ

Youre probably familiar with the term critical assets. These are the technology assets within your company's IT infrastructure that are essential to the functioning of your organization. If anything happens to these assets, such as application servers, databases, or privileged identities, the ramifications to your security posture can be severe.  But is every technology asset considered.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique πŸ–‹οΈ

The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in various software over the past three months to infiltrate vulnerable devices and coopt them into a botnet for conducting distributed denialofservice DDoS attacks. "CatDDoSrelated gangs' samples have used a large number of known vulnerabilities to deliver samples," the QiAnXin XLab team .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” TeaBot Banking Trojan Activity on the Rise, Zscaler Observes πŸ“”

Researchers from Zscaler ThreatLabz observed an uptick in the TeaBot Andoird banking Trojan, also known as Anatsa.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Courtroom Recording Software Vulnerable to Backdoor Attacks πŸ“”

Rapid7 warned that users of Justice AV Solutions JAVS Viewer v8.3.7 recording software are at high risk of stolen credentials and having malware installed.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: What to Expect at Infosecurity Europe 2024 πŸ“”

Get ready for Infosecurity Europe 2024 with these top five picks from Infosecurity Magazine to help you plan your visit.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Looking to Leverage Generative AI? Prep for Success With These 4 Tips πŸ•΅οΈβ€β™‚οΈ

There's plenty of upside to this emerging technology, especially if organizations smartly plan for GenAI's rollout and longterm management.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top 5 Cloud Trends U.K. Businesses Should Watch in 2024 🦿

TechRepublic identified the top five emerging cloud technology trends that businesses in the U.K. should be aware of this year.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Get 3 Years of Rock-Solid Protection With Surfshark VPN for $67.20 by 5/31 🦿

Find out more about why Surfshark VPN is a great choice for your digital privacy. Get advantage of this limited time offer by using code ENJOY20 at checkout.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme πŸ–‹οΈ

An Indian national has pleaded guilty in the U.S. over charges of stealing more than 37 million by setting up a website that impersonated the Coinbase cryptocurrency exchange platform. Chirag Tomar, 30, pleaded guilty to wire fraud conspiracy, which carries a maximum sentence of 20 years in prison and a 250,000 fine. He was arrested on December 20, 2023, upon entering the country. "Tomar and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Will Australia Ever Dig Itself Out of the Cybersecurity Skills Shortage? 🦿

Australia is grappling with this cyber security challenge that is resulting in frequent breaches across large companies. Here are possible solutions, including how cyber security pros can help.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Protect your attack vectors from emerging threats πŸ“’

Discover an effective way to reduce your attack surface.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity