πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ CatDDOS Threat Groups Sharply Ramp Up DDoS Attacks πŸ•΅οΈβ€β™‚οΈ

In attacks over the past three months, threat actors have exploited more than 80 vulnerabilities to accelerate distribution of the Mirai variant.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Treasury Sanctions Creators of 911 S5 Proxy Botnet β™ŸοΈ

The U.S. Department of the Treasury today unveiled sanctions against three Chinese nationals for allegedly operating 911 S5, an online anonymity service that for many years was the easiest and cheapest way to route one's Web traffic through malwareinfected computers around the globe. KrebsOnSecurity identified one of the three men in a July 2022 investigation into 911 S5, which was massively hacked and then closed ten days later.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Pakistani 'Transparent Tribe' APT Aims for Cross-Platform Impact πŸ•΅οΈβ€β™‚οΈ

Targeting India's government, defense, and aerospace sectors, the cyberthreat group now attacks Linux as well as Windows in its quest to compromise the Indian military's homegrown MayaOS Linux systems.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ WithSecure Sphere 2024 live: All the news and announcements from day-two πŸ“’

Stay up to date with the latest updates and announcements from the daytwo keynote at WithSecure SPHERE24, live from Helsinki.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ Beyond the buzz: Understanding AI and its role in cybersecurity πŸš€

A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyberdefenders.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ BreachForums Returns Just Weeks After FBI Seizure - Honeypot or Blunder? πŸ–‹οΈ

The online criminal bazaar BreachForums has been resurrected merely two weeks after a U.S.led coordinated law enforcement action dismantled and seized control of its infrastructure. Cybersecurity researchers and dark web trackers Brett Callow, Dark Web Informer, and FalconFeeds revealed the site's online return at breachforums.st one of the dismantled sites by a user named ShinyHunters,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Your Guide to MDR Services 🌊

Everything you need to know about MDR services, benefits, specifics, pricing, and vendors. Whether youre beginning to enhance your defenses or already seeking a solution, this overview is for you. How does MDR work? Managed Detection and Response MDR combines advanced technology, expert human analysis, and proactive threat hunting to detect, respond to, and mitigate The post Your Guide to MDR Services appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What is the National Cyber Security Centre (NCSC) and what does it do? πŸ“’

The NCSC plays a critical role in keeping the UK safe from cyber attacks, but can also help businesses get ahead of attacks through strategic changes.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ MSPs are struggling with cyber security skills shortages πŸ“’

A shortage of tools and difficulties keeping pace with solutions were also ranked as key issues for MSPs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Generative AI security tools are a risky enterprise investment – WithSecure wants to change that πŸ“’

WithSecure sets its sights on the vast array of security copilot offerings with its new generative AI experience Luminen, which promises to make prompt engineering a thing of the past.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 10 Best SIEM Tools for 2024 🦿

Looking for the best SIEM tool? Check out our list and find the security information and event management solution that fits your business needs.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Price Drop: This Complete Ethical Hacking Bundle is Now $40 🦿

Get a comprehensive, potentially lucrative ethical hacking education with 18 courses on today's top tools and tech. This bundle is just 39.97 through 531.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Hiring Kit: Cryptography Engineer 🦿

Cryptography engineers often collaborate with cybersecurity teams to integrate robust cryptographic solutions into software, hardware and network infrastructure, addressing potential vulnerabilities and mitigating risks associated with data breaches or cyberattacks. This hiring kit, written by Franklin Okeke for TechRepublic Premium, provides a practical framework you can use to hire the ideal cryptography engineer for your ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Sentences 31-Year-Old to 10 Years for Laundering $4.5M in Email Scams πŸ–‹οΈ

The U.S. Department of Justice DoJ has sentenced a 31yearold to 10 years in prison for laundering more than 4.5 million through business email compromise BEC schemes and romance scams. Malachi Mullings, 31, of Sandy Springs, Georgia pleaded guilty to the money laundering offenses in January 2023. According to court documents, Mullings is said to have opened 20 bank accounts in the name of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Research Warns About Weak Offboarding Management and Insider Risks πŸ–‹οΈ

A recent study by Wing Security found that 63 of businesses may have former employees with access to organizational data, and that automating SaaS Security can help mitigate offboarding risks.  Employee offboarding is typically seen as a routine administrative task, but it can pose substantial security risks, if not handled correctly. Failing to quickly and thoroughly remove access for.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Uncovers 'Moonstone Sleet' β€” New North Korean Hacker Group πŸ–‹οΈ

A neverbeforeseen North Korean threat actor codenamed Moonstone Sleet has been attributed as behind cyber attacks targeting individuals and organizations in the software and information technology, education, and defense industrial base sectors with ransomware and bespoke malware previously associated with the infamous Lazarus Group. "Moonstone Sleet is observed to set up fake companies and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: How Williams Racing Relies on Data Security for Peak Performance πŸ“”

Formula One team Williams Racing shares how it prioritizes data security with password management to safeguard sensitive information.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New North Korean Hacking Group Identified by Microsoft πŸ“”

Moonstone Sleet is a newly observed threat group targeting companies for financial and cyber espionage objectives.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” #Infosec2024: Decoding SentinelOne's AI Threat Hunting Assistant πŸ“”

SentinelOne will present a threathunting demonstration during which a security analyst will compete against a nontechnical person using its AI assistant.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Internet Archive Disrupted by Sustained and β€œMean” DDoS Attack πŸ“”

The Internet Archive said sustained DDoS attacks have disrupted access to its preserved web pages and other historical archives.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ This new hacker group is targeting software developers with phony job offers and fake projects πŸ“’

From targeting software developers to infiltrating IT firms, the Moonstone Sleet hacker group has an unusually wide range of attacks and isnt shy about using them.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity