πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ 'Fog' Ransomware Rolls in to Target Education, Recreation Sectors πŸ•΅οΈβ€β™‚οΈ

A new group of hackers is encrypting data in virtual machines, leaving ransom notes, and calling it a day.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ukrainian Systems Hit by Cobalt Strike Via a Malicious Excel File πŸ•΅οΈβ€β™‚οΈ

The campaign uses a multistage payloaddelivery process and various mechanisms for evasion and persistence.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISOs are facing a β€˜tsunami of regulations’ β€” here’s why it’s crucial they focus on quantifying cyber risk πŸ“’

Identifying and addressing cyber risk is a key challenge for CISOs, and with an onslaught of pending regulation it's critical that security leaders sharpen up.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Africa Ranks Low on Phishing Cyber Resilience πŸ•΅οΈβ€β™‚οΈ

As threats to Africa's cybersphere continue to grow, the continent faces high risks to its society and economy with a growing cyber skills gap and lack of preparedness.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Celebrity TikTok Accounts Compromised Using Zero-Click Attack via DMs πŸ–‹οΈ

Popular videosharing platform TikTok has acknowledged a security issue that has been exploited by threat actors to take control of highprofile accounts on the platform. The development was first reported by Semafor and Forbes, which detailed a zeroclick account takeover campaign that allows malware propagated via direct messages to compromise brand and celebrity accounts without having to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cisco: β€œAI is changing everything” – including security πŸ“’

Cisco has unveiled a series of updates to its security and monitoring software.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Zyxel Releases Patches for Firmware Vulnerabilities in EoL NAS Models πŸ–‹οΈ

Zyxel has released security updates to address critical flaws impacting two of its networkattached storage NAS devices that have currently reached endoflife EoL status. Successful exploitation of three of the five vulnerabilities could permit an unauthenticated attacker to execute operating system OS commands and arbitrary code on affected installations. Impacted models include NAS326.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Tackling Cyber Challenges of AI-Generated Code πŸ“”

If software developers want to benefit from AIgenerated code tools, they must mitigate some of the risks they could bring first, Synopsys Lucas von Stockhausen said at Infosecurity Europe.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Sophos Firewall Virtual review: Affordable network protection for those that like it virtualized πŸ“’

Extreme network security that's cheaper than a hardware appliance and just as easy to deploy.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Data Security Needs to Catch Up With Growing Threats πŸ“”

Organizations need to be aware of the threats to their missioncritical data and take urgent steps to protect their data assets.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Organizations Urged to Adopt Safeguards Before AI Adoption πŸ“”

Security leaders at Infosecurity Europe 2024 said organizations must establish security controls prior to AI adoption to mitigate very real risks to their business.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese Threat Clusters Triple-Team a High-Profile Asia Government Org πŸ•΅οΈβ€β™‚οΈ

A trio of Chineseaffiliated clusters performed specialized tasks in a broader attack chain, likely under the watch of a single organization.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Rebranded Knight Ransomware Targeting Healthcare and Businesses Worldwide πŸ–‹οΈ

An analysis of a nascent ransomware strain called RansomHub has revealed it to be an updated and rebranded version of Knight ransomware, itself an evolution of another ransomware known as Cyclops. Knight aka Cyclops 2.0 ransomware first arrived in May 2023, employing double extortion tactics to steal and encrypt victims' data for financial gain. It's operational across multiple platforms,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Are Password Managers Safe to Use? (Benefits, Risks & Best Practices) 🦿

Are password managers safe to use? Find out if they are really secure and discover the benefits and risks of using password managers.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Chinese State-Backed Cyber Espionage Targets Southeast Asian Government πŸ–‹οΈ

An unnamed highprofile government organization in Southeast Asia emerged as the target of a "complex, longrunning" Chinese statesponsored cyber espionage operation codenamed Crimson Palace. "The overall goal behind the campaign was to maintain access to the target network for cyberespionage in support of Chinese state interests," Sophos researchers Paul Jaramillo, Morgan Demboski, Sean.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Unpacking 2024's SaaS Threat Predictions πŸ–‹οΈ

Early in 2024, Wing Security released its State of SaaS Security report, offering surprising insights into emerging threats and best practices in the SaaS domain. Now, halfway through the year, several SaaS threat predictions from the report have already proven accurate. Fortunately, SaaS Security Posture Management SSPM solutions have prioritized mitigation capabilities to address many of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Infosec24: Go Back to Basics With Risk Management to Tackle AI Risk πŸ“”

Experts suggest that accountability, training and updated policies can go a long way to help mitigate AI risk.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Remote Work's Hidden Dangers πŸ•΅οΈβ€β™‚οΈ

Ten cybersecurity strategies for enterprises to keep remote work safer.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Incident Response Plan Template – Free PDF 🌊

A cyberattack is a WHEN, not an IF. Don't waste time scrambling... The post Incident Response Plan Template Free PDF appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec24: 104 EU Laws Have Different Definitions of Cybersecurity πŸ“”

Top lawyer outlines how firms can better manage legal risk amid complex regulatory landscape.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024 Spyware: A Threat to Civil Society and a Threat to Business πŸ“”

Commercial spyware poses a threat to enterprises, and CISOs need to consider its impact and how to mitigate it.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity