πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” London Hospitals Cancel Operations Following Ransomware Incident πŸ“”

A ransomware attack on a supplier of pathology services has forced leading London hospitals to cancel operations and divert emergency patients.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024 Ransomware: The Key Updates You Need to Know πŸ“”

Organizations need to collaborate to bolster their defenses in the face of new and emerging threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧨 How Data Brokers Sell Your Identity 🧨

Data brokers gather hundreds, sometimes thousands, of data points on individuals. The question is, how do they round it up?... The post How Data Brokers Sell Your Identity appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'Fog' Ransomware Rolls in to Target Education, Recreation Sectors πŸ•΅οΈβ€β™‚οΈ

A new group of hackers is encrypting data in virtual machines, leaving ransom notes, and calling it a day.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ukrainian Systems Hit by Cobalt Strike Via a Malicious Excel File πŸ•΅οΈβ€β™‚οΈ

The campaign uses a multistage payloaddelivery process and various mechanisms for evasion and persistence.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISOs are facing a β€˜tsunami of regulations’ β€” here’s why it’s crucial they focus on quantifying cyber risk πŸ“’

Identifying and addressing cyber risk is a key challenge for CISOs, and with an onslaught of pending regulation it's critical that security leaders sharpen up.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Africa Ranks Low on Phishing Cyber Resilience πŸ•΅οΈβ€β™‚οΈ

As threats to Africa's cybersphere continue to grow, the continent faces high risks to its society and economy with a growing cyber skills gap and lack of preparedness.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Celebrity TikTok Accounts Compromised Using Zero-Click Attack via DMs πŸ–‹οΈ

Popular videosharing platform TikTok has acknowledged a security issue that has been exploited by threat actors to take control of highprofile accounts on the platform. The development was first reported by Semafor and Forbes, which detailed a zeroclick account takeover campaign that allows malware propagated via direct messages to compromise brand and celebrity accounts without having to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cisco: β€œAI is changing everything” – including security πŸ“’

Cisco has unveiled a series of updates to its security and monitoring software.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Zyxel Releases Patches for Firmware Vulnerabilities in EoL NAS Models πŸ–‹οΈ

Zyxel has released security updates to address critical flaws impacting two of its networkattached storage NAS devices that have currently reached endoflife EoL status. Successful exploitation of three of the five vulnerabilities could permit an unauthenticated attacker to execute operating system OS commands and arbitrary code on affected installations. Impacted models include NAS326.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Tackling Cyber Challenges of AI-Generated Code πŸ“”

If software developers want to benefit from AIgenerated code tools, they must mitigate some of the risks they could bring first, Synopsys Lucas von Stockhausen said at Infosecurity Europe.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Sophos Firewall Virtual review: Affordable network protection for those that like it virtualized πŸ“’

Extreme network security that's cheaper than a hardware appliance and just as easy to deploy.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Data Security Needs to Catch Up With Growing Threats πŸ“”

Organizations need to be aware of the threats to their missioncritical data and take urgent steps to protect their data assets.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Organizations Urged to Adopt Safeguards Before AI Adoption πŸ“”

Security leaders at Infosecurity Europe 2024 said organizations must establish security controls prior to AI adoption to mitigate very real risks to their business.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese Threat Clusters Triple-Team a High-Profile Asia Government Org πŸ•΅οΈβ€β™‚οΈ

A trio of Chineseaffiliated clusters performed specialized tasks in a broader attack chain, likely under the watch of a single organization.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Rebranded Knight Ransomware Targeting Healthcare and Businesses Worldwide πŸ–‹οΈ

An analysis of a nascent ransomware strain called RansomHub has revealed it to be an updated and rebranded version of Knight ransomware, itself an evolution of another ransomware known as Cyclops. Knight aka Cyclops 2.0 ransomware first arrived in May 2023, employing double extortion tactics to steal and encrypt victims' data for financial gain. It's operational across multiple platforms,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Are Password Managers Safe to Use? (Benefits, Risks & Best Practices) 🦿

Are password managers safe to use? Find out if they are really secure and discover the benefits and risks of using password managers.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Chinese State-Backed Cyber Espionage Targets Southeast Asian Government πŸ–‹οΈ

An unnamed highprofile government organization in Southeast Asia emerged as the target of a "complex, longrunning" Chinese statesponsored cyber espionage operation codenamed Crimson Palace. "The overall goal behind the campaign was to maintain access to the target network for cyberespionage in support of Chinese state interests," Sophos researchers Paul Jaramillo, Morgan Demboski, Sean.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Unpacking 2024's SaaS Threat Predictions πŸ–‹οΈ

Early in 2024, Wing Security released its State of SaaS Security report, offering surprising insights into emerging threats and best practices in the SaaS domain. Now, halfway through the year, several SaaS threat predictions from the report have already proven accurate. Fortunately, SaaS Security Posture Management SSPM solutions have prioritized mitigation capabilities to address many of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Infosec24: Go Back to Basics With Risk Management to Tackle AI Risk πŸ“”

Experts suggest that accountability, training and updated policies can go a long way to help mitigate AI risk.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Remote Work's Hidden Dangers πŸ•΅οΈβ€β™‚οΈ

Ten cybersecurity strategies for enterprises to keep remote work safer.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity