πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.2K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Third-Party Cyber Attacks: The Threat No One Sees Coming – Here's How to Stop Them πŸ–‹οΈ

Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgills threat experts. Each story shines a light on underground activities, the threat actors involved, and why you should care, along with what you can do to mitigate risk.  In an increasingly interconnected world, supply chain attacks have emerged as a formidable threat, compromising.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Mandatory Ransomware Reporting Would Be Positive Move, Say Experts πŸ“”

Police, insurance and private sector security experts argue UK government proposals on ransomware payments could benefit the community.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Trend Micro, Nvidia Partner to Secure AI Data Centers πŸ•΅οΈβ€β™‚οΈ

With companies pouring billions into AI software and hardware, these installations need to be protected from cybersecurity threats and other security lapses.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: How to Change Security Behaviors Beyond Awareness Training πŸ“”

Experts at Infosecurity Europe 2024 advised on how to ensure meaningful behavioral change in employees, moving beyond awareness training.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” #Infosec2024: Third of Web Traffic Comes from Malicious Bots, Veracity Says πŸ“”

Malicious bots keep growing, now accounting for over 30 of the global web traffic, the CEO of Veracity Trust Network said during Infosecurity Europe.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 AI-driven compliance: The key to cloud security 🧠

The growth of cloud computing continues unabated, but it has also created security challenges. The acceleration of cloud adoption has created greater complexity, with limited cloud technical expertise available in the market, an explosion in connected and Internet of Things IoT devices and a growing need for multicloud environments. When clients migrate to the cloud, The post AIdriven compliance The key to cloud security appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Protecting Kubernetes on AWS from Exploits 🌊

The post Protecting Kubernetes on AWS from Exploits appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How to implement identity and access management (IAM) effectively in your business πŸ“’

With pressure from the board and a new wave of threats, security leaders looking to implement IAM should start small and lean on the data.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Inside Baseball: The Red Sox Cloud Security Game πŸ•΅οΈβ€β™‚οΈ

Inside the baseball team's strategy for building nextgen security operations through zero trust and a raft of future initiatives aiming to safeguard team data, fan info, and the iconic Fenway Park which, by the way, is now a smart stadium.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ“” #Infosec2024: Experts Share How CISOs Can Manage Change as the Only Constant πŸ“”

CISOs explain how to build highperforming teams, communicate with the business and manage security amid constant volatility.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Understanding Security's New Blind Spot: Shadow Engineering πŸ•΅οΈβ€β™‚οΈ

In the rush to digital transformation, many organizations are exposed to security risks associated with citizen developer applications without even knowing it.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Some Generative AI Company Employees Pen Letter Wanting β€˜Right to Warn’ About Risks 🦿

Both the promise and the risk of "humanlevel" AI has always been part of OpenAIs makeup. What should business leaders take away from this letter?.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Muhstik Botnet Exploiting Apache RocketMQ Flaw to Expand DDoS Attacks πŸ–‹οΈ

The distributed denialofservice DDoS botnet known as Muhstik has been observed leveraging a nowpatched security flaw impacting Apache RocketMQ to coopt susceptible servers and expand its scale. "Muhstik is a wellknown threat targeting IoT devices and Linuxbased servers, notorious for its ability to infect devices and utilize them for cryptocurrency mining and launching Distributed Denial.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: CISOs Need to Move Beyond Passwords to Keep Up With Security Threats πŸ“”

Experts at Infosecurity Europe 2024 advised organizations to move away from passwords for greater security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: Ransomware Ecosystem Transformed, New Groups β€œChanging the Rules” πŸ“”

Significant changes to the ransomware ecosystem were discussed at Infosecurity Europe 2024, with new groups changing the rules of the game.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: AI Red Teaming Provider Mindgard Named UK's Most Innovative Cyber SME πŸ“”

Mingard provides a continuous AI red teaming and vulnerability remediation platform.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Mallox Ransomware Variant Targets Privileged VMWare ESXi Environments πŸ•΅οΈβ€β™‚οΈ

Novel attack vector uses a custom shell for payload delivery and execution and only goes after systems with administrative privileges.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Interpol, FBI Disrupt Moldova-Based Cyber Ring πŸ•΅οΈβ€β™‚οΈ

Four suspects were taken into custody, accused of paying intermediaries in Moldova to inform criminals of their Red Notice status and wipe lawenforcement flags from the system.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Technology, Regulations Can't Save Orgs From Deepfake Harm πŸ•΅οΈβ€β™‚οΈ

Monetary losses, reputational damage, share price declines it's hard to counter, much less try to stay ahead of, AIbased attacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  OpenSSL Toolkit 3.3.1 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with fullstrength cryptography worldwide.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  OpenSSL Toolkit 3.2.2 πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols with fullstrength cryptography worldwide.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity