πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Rebranded Knight Ransomware Targeting Healthcare and Businesses Worldwide πŸ–‹οΈ

An analysis of a nascent ransomware strain called RansomHub has revealed it to be an updated and rebranded version of Knight ransomware, itself an evolution of another ransomware known as Cyclops. Knight aka Cyclops 2.0 ransomware first arrived in May 2023, employing double extortion tactics to steal and encrypt victims' data for financial gain. It's operational across multiple platforms,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Are Password Managers Safe to Use? (Benefits, Risks & Best Practices) 🦿

Are password managers safe to use? Find out if they are really secure and discover the benefits and risks of using password managers.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Chinese State-Backed Cyber Espionage Targets Southeast Asian Government πŸ–‹οΈ

An unnamed highprofile government organization in Southeast Asia emerged as the target of a "complex, longrunning" Chinese statesponsored cyber espionage operation codenamed Crimson Palace. "The overall goal behind the campaign was to maintain access to the target network for cyberespionage in support of Chinese state interests," Sophos researchers Paul Jaramillo, Morgan Demboski, Sean.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Unpacking 2024's SaaS Threat Predictions πŸ–‹οΈ

Early in 2024, Wing Security released its State of SaaS Security report, offering surprising insights into emerging threats and best practices in the SaaS domain. Now, halfway through the year, several SaaS threat predictions from the report have already proven accurate. Fortunately, SaaS Security Posture Management SSPM solutions have prioritized mitigation capabilities to address many of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Infosec24: Go Back to Basics With Risk Management to Tackle AI Risk πŸ“”

Experts suggest that accountability, training and updated policies can go a long way to help mitigate AI risk.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Remote Work's Hidden Dangers πŸ•΅οΈβ€β™‚οΈ

Ten cybersecurity strategies for enterprises to keep remote work safer.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Incident Response Plan Template – Free PDF 🌊

A cyberattack is a WHEN, not an IF. Don't waste time scrambling... The post Incident Response Plan Template Free PDF appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec24: 104 EU Laws Have Different Definitions of Cybersecurity πŸ“”

Top lawyer outlines how firms can better manage legal risk amid complex regulatory landscape.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024 Spyware: A Threat to Civil Society and a Threat to Business πŸ“”

Commercial spyware poses a threat to enterprises, and CISOs need to consider its impact and how to mitigate it.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top Tech Conferences & Events to Add to Your Calendar in 2024 🦿

A great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our 2024 tech events guide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FBI Warns of Rise in Work-From-Home Scams πŸ“”

One key tactic these scammers employ is a convoluted payment structure to access additional earnings or unlock access to work.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ransomware Attack Disrupts Operations Across London Hospitals πŸ•΅οΈβ€β™‚οΈ

The incident affecting pathologyservices provider Synnovis demonstrates the ripple effect that cyberattacks have on healthcare systems, and demands immediate security response.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Cisco Live 2024: New Unified Observability Experience Packages Cisco & Splunk Insight Tools 🦿

The observability suite is the first major overhaul for Splunk products since the Cisco acquisition. Plus, Mistral AI makes a deal with Ciscos incubator.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec 2024: Small Firms Need to Work Smarter to Stretch Security Budgets πŸ“”

Lack of budgets and resources need not be a barrier to improving security for SMEs, according to industry experts.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese State-Sponsored Operation β€œCrimson Palace” Revealed πŸ“”

Sophos said the campaign aimed to maintain prolonged network access for espionage purposes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hijacking Scheme Takes Over High-Profile TikTok Accounts πŸ•΅οΈβ€β™‚οΈ

Hijacking malware gets spread through TikTok's direct messaging and doesn't require the victim to click links or download anything.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Cisco Talos: LilacSquid Threat Actor Targets Multiple Sectors Worldwide With PurpleInk Malware 🦿

Find out how the cyberespionage threat actor LilacSquid operates, and then learn how to protect your business from this security risk.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🧨 How To Prevent Your Emails From Being Hacked 🧨

My mother recently turned 80, so of course a large celebration was in order. With 100 plus guests, entertainment, and... The post How To Prevent Your Emails From Being Hacked appeared first on McAfee Blog.

πŸ“– Read more.

πŸ”— Via "McAfee"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ RansomHub Actors Exploit ZeroLogon Vuln in Recent Ransomware Attacks πŸ•΅οΈβ€β™‚οΈ

CVE20201472 is a privilege escalation flaw that allows an attacker to take over an organization's domain controllers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Target Python Developers with Fake "Crytic-Compilers" Package on PyPI πŸ–‹οΈ

Cybersecurity researchers have discovered a malicious Python package uploaded to the Python Package Index PyPI repository that's designed to deliver an information stealer called Lumma aka LummaC2. The package in question is cryticcompilers, a typosquatted version of a legitimate library named cryticcompile. The rogue package was downloaded 441 times before it was taken down by PyPI.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Slack Security Best Practices 🌊

Slack is a powerful collaboration tool, but security becomes a top priority when sensitive data is involved. For organizations bound by regulations like PCI DSS and HIPAA, using Slack securely requires extra vigilance. Following best practices, you can leverage Slacks power while keeping your organizations sensitive data safe and secure. Why security matters on Slack The post Slack Security Best Practices appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity