πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Disgruntled ex-employees are using β€˜weaponized’ data subject access requests to pester firms πŸ“’

Some disgruntled staff are using DSARs as a means to pressure former employers into a financial settlement.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 6 Best VPNs for the UK in 2024 🦿

VPN capabilities and performance levels differ from place to place. Which VPNs are best for U.K. users and expats?.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How to Start a Career in Cybersecurity 🦿

Cybersecurity is a booming career path for professionals looking to enhance the value of their skillsets in the 2020s. This guide, written by Madeline Clarke for TechRepublic Premium, highlights the methods people can take to begin a career in cybersecurity, provides expert insights from industry professionals and discusses the varying factors surrounding this lucrative area ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Snowflake Warns: Targeted Credential Theft Campaign Hits Cloud Customers πŸ–‹οΈ

Cloud computing and analytics company Snowflake said a "limited number" of its customers have been singled out as part of a targeted campaign. "We have not identified evidence suggesting this activity was caused by a vulnerability, misconfiguration, or breach of Snowflakes platform," the company said in a joint statement along with CrowdStrike and Googleowned Mandiant. "We have not identified.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec24: Deepfake Expert Warns of β€œAI Tax Havens” πŸ“”

Keynote speaker Henry Ajder warns that regulatory measures may be undermined if some countries ignore global rules.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Next Generation of RBI (Remote Browser Isolation) πŸ–‹οΈ

The landscape of browser security has undergone significant changes over the past decade. While Browser Isolation was once considered the gold standard for protecting against browser exploits and malware downloads, it has become increasingly inadequate and insecure in today's SaaScentric world. The limitations of Browser Isolation, such as degraded browser performance and inability to tackle.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Use MS Excel Macro to Launch Multi-Stage Malware Attack in Ukraine πŸ–‹οΈ

A new sophisticated cyber attack has been observed targeting endpoints geolocated to Ukraine with an aim to deploy Cobalt Strike and seize control of the compromised hosts. The attack chain, per Fortinet FortiGuard Labs, involves a Microsoft Excel file that carries an embedded VBA macro to initiate the infection, "The attacker uses a multistage malware strategy to deliver the notorious 'Cobalt.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ NIST Commits to Vulnerability Plan, But Researchers' Concerns Remain πŸ•΅οΈβ€β™‚οΈ

The agency aims to burn down the backlog of vulnerabilities that need enrichment using additional funding and a thirdparty contract, but what's the longterm solution?.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec24: Enterprise Browser Touted as Solution to GenAI Privacy Risks πŸ“”

Island Technologies discusses the security and user experience benefits of the enterprise browser.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… UNC1151 Strikes Again: Unveiling Their Tactics Against Ukraine’s Ministry of Defence πŸ¦…

Key Takeaways  Cyble Research and Intelligence Labs CRIL recently encountered a campaign using a malicious Excel document linked to the UNC1151 APT group.   The UNC1151 APT group, originating from Belarus, is notorious for targeting Eastern European countries, including Ukraine, Lithuania, Latvia, Poland, and others.  In the recent campaign, there are indications that the group is possibly targeting Ukraine, with a potential focus on the Ministry of Defence based on the lure document.  Upon execution of the lure Excel document, which contains an embedded VBA Macro content that drops an LNK and a DLL loader file. Subsequently, running the LNK file initiates the DLL loader, potentially leading to a final payload infection.  In last year's campaign, the Threat Actor TA obtaine...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Perfecting the Proactive Security Playbook πŸ•΅οΈβ€β™‚οΈ

It's more important than ever for organizations to prepare themselves and their cybersecurity postures against known and unknown threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Multi-Stage Malware Targets Windows Users in Ukraine πŸ“”

Discovered by FortiGuard Labs, the attack leverages an Excel file embedded with a VBA macro.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cox Biz Auth-Bypass Bug Exposes Millions of Devices to Takeover πŸ•΅οΈβ€β™‚οΈ

The US broadband provider fixed an issue that allowed attackers to gain access to business customers modems, and then access info and execute commands with the same permissions of an ISP support team.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: How to Develop Your Future Team πŸ“”

Expert panel advises CISOs to look beyond pay and at career progression and worklife balance to fill skills gaps.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber attacks force London hospital trusts to suspend non-emergency operations πŸ“’

The cyber attacks have caused widespread disruption for patients and staff.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Telerik Report Server Flaw Could Let Attackers Create Rogue Admin Accounts πŸ–‹οΈ

Progress Software has rolled out updates to address a critical security flaw impacting the Telerik Report Server that could be potentially exploited by a remote attacker to bypass authentication and create rogue administrator users. The issue, tracked as CVE20244358, carries a CVSS score of 9.8 out of a maximum of 10.0. "In Progress Telerik Report Server, version 2024 Q1 10.0.24.305 or.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Account Takeovers Outpace Ransomware as Top Security Concern πŸ“”

The latest Abnormal Security report shows 83 of firms faced at least one account takeover in the past year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ticketmaster Breach Showcases SaaS Data Security Risks πŸ•΅οΈβ€β™‚οΈ

MFA and other mechanisms are critical to protect against unauthorized access to data in cloud application environments, but businesses still fall down on the job.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Cisco Live 2024: Cisco Unveils AI Deployment Solution With NVIDIA 🦿

A 1 billion commitment will send Cisco money to Cohere, Mistral AI and Scale AI.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Paris Olympics 2024: Cyber Attackers are Targeting Companies Associated With Games, Report Finds 🦿

The authors of the report also say that attendees will almost certainly be targeted with Olympicsrelated phishing schemes.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Power Companies, IT Firms, and Govt Agencies Hit by Decoy Dog Trojan πŸ–‹οΈ

Russian organizations are at the receiving end of cyber attacks that have been found to deliver a Windows version of a malware called Decoy Dog. Cybersecurity company Positive Technologies is tracking the activity cluster under the name Operation Lahat, attributing it to an advanced persistent threat APT group called HellHounds. "The Hellhounds group compromises organizations they select and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity