πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🧨 What You Need to Know About Election Security 🧨

As election season approaches, the importance of safeguarding our democratic processes has never been more critical. Ensuring election security is... The post What You Need to Know About Election Security appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ AI in HR: Is artificial intelligence changing how we hire employees forever? πŸš€

Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OpenAI, Meta, TikTok Disrupt Multiple AI-Powered Disinformation Campaigns πŸ–‹οΈ

OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations IO originating from China, Iran, Israel, and Russia that sought to abuse its artificial intelligence AI tools to manipulate public discourse or political outcomes online while obscuring their true identity. These activities, which were detected over the past three months, used its AI models to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” #Infosec2024: Why Cybersecurity is Critical for the 2024 Paris Olympics πŸ“”

The large volume of attendees mixed with interconnected infrastructure provides opportunities for threat actors to wreak havoc during the Paris Olympics.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” BBC Pension Scheme Breached, Exposing Employee Data πŸ“”

The BBC said that personally identifiable information of current and former employees has been breached following an incident affecting its pension scheme.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Mass exploitation of edge services could become the defacto attack vector for hackers in 2024 - research πŸ“’

The start of 2024 saw a relative decline in phishing attacks as security hygiene and endpoint defenses broadly improve.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hackers Target Europe with HeadLace Malware and Credential Harvesting πŸ–‹οΈ

The Russian GRUbacked threat actor APT28 has been attributed as behind a series of campaigns targeting networks across Europe with the HeadLace malware and credentialharvesting web pages. APT28, also known by the names BlueDelta, Fancy Bear, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422, is an advanced persistent threat APT group affiliated with.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Beyond Threat Detection – A Race to Digital Security πŸ–‹οΈ

Digital content is a doubleedged sword, providing vast benefits while simultaneously posing significant threats to organizations across the globe. The sharing of digital content has increased significantly in recent years, mainly via email, digital documents, and chat. In turn, this has created an expansive attack surface and has made digital content the preferred carrier for cybercriminals.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Data Privacy in the Age of GenAI πŸ•΅οΈβ€β™‚οΈ

Consumer data is still a prime target for threat actors, and organizational consumption of data must be aligned to protecting it. The new rights act seeks to do some of this, but it still needs tweaking.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Warns of Surge in Cyber Attacks Targeting Internet-Exposed OT Devices πŸ–‹οΈ

Microsoft has emphasized the need for securing internetexposed operational technology OT devices following a spate of cyber attacks targeting such environments since late 2023. "These repeated attacks against OT devices emphasize the crucial need to improve the security posture of OT devices and prevent critical systems from becoming easy targets," the Microsoft Threat Intelligence team said.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top Tech Conferences & Events to Add to Your Calendar in 2024 🦿

A great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our 2024 tech events guide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FlyingYeti APT Serves Up Cookbox Malware Using WinRAR πŸ•΅οΈβ€β™‚οΈ

The Russiaaligned FlyingYeti's phishing campaign exploited Ukrainian citizens' financial stress to spread Cookbox malware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Banking details of 30 million Santander customers exposed during breach allegedly up for sale on the dark web πŸ“’

The ShinyHunters threat group claims to have financial data stolen during a data breach on 14 May after an attack on an unknown third party.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  RansomLord Anti-Ransomware Exploit Tool 3.1 πŸ› 

RansomLord is a proofofconcept tool that automates the creation of PE files, used to compromise ransomware preencryption. This tool uses dll hijacking to defeat ransomware by placing PE files in the x32 or x64 directories where the program is run from.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ›  jSQL Injection 0.97 πŸ› 

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S. πŸ–‹οΈ

More than 600,000 small officehome office SOHO routers are estimated to have been bricked and taken offline following a destructive cyber attack staged by unidentified cyber actors, disrupting users' access to the internet. The mysterious event, which took place between October 25 and 27, 2023, and impacted a single internet service provider ISP in the U.S., has been codenamed Pumpkin.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OpenAI Disrupts 5 AI-Powered, State-Backed Influence Ops πŸ•΅οΈβ€β™‚οΈ

Most of the operations were feckless efforts with little impact, but they illustrate how AI is changing the game for inauthentic content on both the adversary and defense sides.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ BBC Breach Puts 25K Pension Scheme Members at Risk πŸ•΅οΈβ€β™‚οΈ

Though information such as dates of birth, email addresses, and home addresses were compromised, "the Beeb" assures individuals that financial information is still protected.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🀯1
πŸ•΅οΈβ€β™‚οΈ LilacSquid APT Employs Open Source Tools, QuasarRAT πŸ•΅οΈβ€β™‚οΈ

The previously unknown threat actor uses tools similar to those used by North Korean APT groups, according to Cisco Talos.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 International Malware Takedown Seized 100+ Servers 🦿

Operation Endgame is an ongoing effort to disrupt botnets, malware droppers and malwareasaservice.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud 🧨

Authored by Dexter Shin Many government agencies provide their services online for the convenience of their citizens. Also, if this... The post Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity