πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸš€ What happens when facial recognition gets it wrong – Week in security with Tony Anscombe πŸš€

A woman in London has been misidentified as a shoplifter by a facial recognition system amid fresh concerns over the technology's accuracy and reliability.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI Company Hugging Face Notifies Users of Suspected Unauthorized Access πŸ–‹οΈ

Artificial Intelligence AI company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform earlier this week. "We have suspicions that a subset of Spaces secrets could have been accessed without authorization," it said in an advisory. Spaces offers a way for users to create, host, and share AI and machine learning ML applications. It also functions as a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ As Allies, Kenya & US Aim to Bolster Digital Security in Africa πŸ•΅οΈβ€β™‚οΈ

Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect the country's fastgrowing digital economy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Beware: Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware πŸ–‹οΈ

Fake web browser updates are being used to deliver remote access trojans RATs and information stealer malware such as BitRAT and Lumma Stealer aka LummaC2. "Fake browser updates have been responsible for numerous malware infections, including those of the wellknown SocGholish malware," cybersecurity firm eSentire said in a new report. "In April 2024, we observed FakeBat being distributed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ 97% of FTSE 100 firms suffered supply chain breaches last year πŸ“’

Large enterprises across Europe were plagued by third and fourth party breaches last year, prompting calls for a more robust approach to supply chain security.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 TechRepublic Premium Editorial Calendar: Policies, Checklists, Hiring Kits and Glossaries for Download 🦿

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Andariel Hackers Target South Korean Institutes with New Dora RAT Malware πŸ–‹οΈ

The North Korealinked threat actor known as Andariel has been observed using a new Golangbased backdoor called Dora RAT in its attacks targeting educational institutes, manufacturing firms, and construction businesses in South Korea. "Keylogger, Infostealer, and proxy tools on top of the backdoor were utilized for the attacks," the AhnLab Security Intelligence Center ASEC said in a report.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Nearly All of FTSE 100 Exposed to Third and Fourth-Party Breaches πŸ“”

SecurityScorecard estimates 97 of UK FTSE 100 firms are at risk from supply chain breaches.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ticketmaster Confirms Breach Potentially Impacting 560 Million Users πŸ“”

Ticketing giant Live Nation has confirmed a May data breach involving tech supplier Snowflake.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 The Introduction to External Attack Surface Management: Find & Fix Hidden Threats 🌊

Cloud adoption, hybrid work, and interconnected IT ecosystems create a spreading external attack surface. This includes everything from web applications to public cloud resources, which are becoming a growing challenge for security teams. External Attack Surface Management EASM is vital in the ongoing fight against cyber threats. It offers comprehensive visibility, proactive vulnerability management, and The post The Introduction to External Attack Surface Management Find Fix Hidden Threats appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Snowflake data breach claims spark war of words over culpability πŸ“’

Snowflake CISO Brad Jones hit back at claims the Ticketmaster and Santander data breaches were caused by platform vulnerabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Price Drop: Learn Cybersecurity Skills From Scratch for Just $35 🦿

Save on tech services or switch to a lucrative new tech career by training at your own pace to develop highdemand cybersecurity skills. Get this bundle at 34.97 through June 9.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researcher Uncovers Flaws in Cox Modems, Potentially Impacting Millions πŸ–‹οΈ

Nowpatched authorization bypass issues impacting Cox modems that could have been abused as a starting point to gain unauthorized access to the devices and run malicious commands. "This series of vulnerabilities demonstrated a way in which a fully external attacker with no prerequisites could've executed commands and modified the settings of millions of modems, accessed any business customer's.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK School Forced to Close Following Cyber-Attack πŸ“”

The Billericay School in Essex informed parents that it is closed to students after its IT systems were compromised and made inaccessible by a cyberattack.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hugging Face issues warning after detecting 'unauthorized access' to its Spaces platform πŸ“’

Machine learning ML development platform Huggin Face has issued a warning to users after it detected unauthorized access to its Spaces platform last week.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISA's Secure by Design Initiative at 1: A Report Card πŸ•΅οΈβ€β™‚οΈ

There is more that needs to be done, but, so far, the initiative is a success.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How Do Password Managers Work and Why Do You Need One? 🦿

Learn how password managers work, their benefits and why your organization needs one to secure sensitive data and prevent security breaches.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 5 Reasons Why You Should Use a Password Manager 🦿

Here are 5 reasons why you should consider using a password manager to protect your data and improve password management.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SASE Threat Report: 8 Key Findings for Enterprise Security πŸ–‹οΈ

Threat actors are evolving, yet Cyber Threat Intelligence CTI remains confined to each isolated point solution. Organizations require a holistic analysis across external data, inbound and outbound threats and network activity. This will enable evaluating the true state of cybersecurity in the enterprise. Catos Cyber Threat Research Lab Cato CTRL, see more details below has recently released.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How to Stay Safe Against Scams While Traveling 🧨

Following a whirlwind year of travel in 2023, 40 of Americans are gearing up for even more adventures in 2024.... The post How to Stay Safe Against Scams While Traveling appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover RAT-Dropping npm Package Targeting Gulp Users πŸ–‹οΈ

Cybersecurity researchers have uncovered a new suspicious package uploaded to the npm package registry that's designed to drop a remote access trojan RAT on compromised systems. The package in question is glupdebuggerlog, which targets users of the gulp toolkit by masquerading as a "logger for gulp and gulp plugins." It has been downloaded 175 times to date. Software supply chain security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity