πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Microsoft to Host Windows Security Summit in CrowdStrike Outage Aftermath πŸ•΅οΈβ€β™‚οΈ

The tech giant seeks to work with endpoint security partners, including CrowdStrike, on how to prevent an outage event of such gravity from happening again.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Cybercriminals Tap Greasy Opal to Create 750M Fake Microsoft Accounts πŸ•΅οΈβ€β™‚οΈ

Such cyberattack enablement services let attackers breach security measures, establish new fake accounts, and bruteforce servers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot πŸ–‹οΈ

Details have emerged about a nowpatched vulnerability in Microsoft 365 Copilot that could enable the theft of sensitive user information using a technique called ASCII smuggling. "ASCII Smuggling is a novel technique that uses special Unicode characters that mirror ASCII but are actually not visible in the user interface," security researcher Johann Rehberger said. "This means that an attacker.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation πŸ–‹οΈ

Google has revealed that a security flaw that was patched as part of a security update rolled out last week to its Chrome browser has come under active exploitation in the wild. Tracked as CVE20247965, the vulnerability has been described as an inappropriate implementation bug in the V8 JavaScript and WebAssembly engine. "Inappropriate implementation in V8 in Google Chrome prior to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Australia and Google turn to AI to protect critical infrastructure πŸ“’

Australia's CSIRO partners with Google to develop homegrown AI security tools for infrastructure.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” A Third of Organizations Suffer SaaS Data Breaches πŸ“”

AppOmni report claims number of companies suffering SaaSrelated data breaches has jumped five percentage points over past year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Uber hit with €290m fine for storing European driver data in the US πŸ“’

The fine marks the latest imposed on Uber by the Dutch data protection authority.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Uber Hit With €290m GDPR Fine πŸ“”

The Dutch data protection regulator has imposed a 290m GDPR fine on Uber for storing driver data in the US without adequate safeguards.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ“’ Teleport partners with TD Synnex to tackle identity-focused cyber attacks πŸ“’

The new distribution agreement will enable customers to procure secure infrastructure access solutions from a single source.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ North Korean insider attacks are skyrocketing – dozens of US firms didn't spot the hacker in their midst πŸ“’

A North Korean threat campaign sneaking hackers into US firms as fake IT workers is just the tip of the iceberg, researchers have warned.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why Every Business Should Prioritize Confidential Computing πŸ•΅οΈβ€β™‚οΈ

Confidential computing safeguards data in use, making it a crucial component of cloud security.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 5 Best Free Endpoint Protection Platforms for 2024 🦿

Discover our top picks for reputable free endpoint protection platforms and compare their features, pros and cons in this indepth guide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Cost of data breaches: The business case for security AI and automation 🧠

As Yogi Berra said, Its dj vu all over again. If the idea of the global average costs of data breaches rising year over year feels like more of the same, thats because it is. Data protection solutions get better, but so do threat actors. The other broken record is the underuse or misuse of The post Cost of data breaches The business case for security AI and automation appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CTEM in the Spotlight: How Gartner's New Categories Help to Manage Exposures πŸ–‹οΈ

Want to know whats the latest and greatest in SecOps for 2024? Gartners recently released Hype Cycle for Security Operations report takes important steps to organize and mature the domain of Continuous Threat Exposure Management, aka CTEM. Three categories within this domain are included in this years report Threat Exposure Management, Exposure Assessment Platforms EAP, and Adversarial.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FBI Flawed Data Handling Raises Security Concerns πŸ“”

A US Justice Department watchdog has found significant weaknesses in the FBIs physical and online media storage and disposal processes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Suspected Cyber-Attack Causes Travel Chaos at Seattle Airport πŸ“”

The Port of Seattle revealed system outages at the citys airport may have been caused by a cyberattack, affecting early Labor Day travel.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Chinese Volt Typhoon Exploits Versa Director Flaw, Targets U.S. and Global IT Sectors πŸ–‹οΈ

The Chinanexus cyber espionage group tracked as Volt Typhoon has been attributed with moderate confidence to the zeroday exploitation of a recently disclosed highseverity security flaw impacting Versa Director. The attacks targeted four U.S. victims and one nonU.S. victim in the Internet service provider ISP, managed service provider MSP and information technology IT sectors as early.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… High-Risk CVE-2024-7965 Vulnerability in Chrome’s V8 Engine Requires Quick Fix πŸ¦…

Key Takeaways CISA has included a type of confusion vulnerability affecting Google Chrome and potentially other Chromiumbased browsers in its Known Exploited Vulnerabilities KEV catalog, highlighting its seriousness and potential for exploitation. CVE20247965 affects Chrome's V8 JavaScript engine, allowing attackers to exploit heap corruption through specially crafted HTML pages. Its high CVSS score of 8.8 indicates a severe threat to system confidentiality and integrity. Google has acknowledged that CVE20247965 is actively being exploited. A critical patch has been released in Chrome versions 128.0.6613.84 for Linux and 128.0.6613.84.85 for Windows and Mac. Due to the active exploitation of this vulnerability, it is crucial for all users to update their browsers immediat...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ New 0-Day Attacks Linked to China’s β€˜Volt Typhoon’ β™ŸοΈ

Malicious hackers are exploiting a zeroday vulnerability in Versa Director, a software product used by many Internet and IT service providers. Researchers believe the activity is linked to Volt Typhoon, a Chinese cyber espionage group focused on infiltrating critical U.S. networks and laying the groundwork for the ability to disrupt communications between the United States and Asia during any future armed conflict with China.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” MOVEit Hack Exposed Personal Data of Half Million TDECU Users πŸ“”

The Texas Dow Employees Credit Union told the Maine Attorney General the MOVEit data breach compromised information of over 500,000 members.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Cloud Storage Bucket Security: PII Leak Brings Renewed Focus to Storage Bucket Access Controls πŸ¦…

Key Takeaways News of a Google Cloud Storage bucket data leak has once again drawn public attention to the risks of misconfigured cloud storage buckets, one of the most common cloud security issues and causes of data leaks. Alices Table, a former contestant on ABCs Shark Tank, inadvertently leaked the personally identifiable information PII of more than 83,000 customers from a misconfigured Google Cloud Storage bucket. The leak underscores the importance of cloud storage bucket access controls as well as regularly auditing permissions and monitoring for data leaks. Cloud storage bucket leaks are very common Cyble Odin is presently detecting more than 500,000 such exposures between AWS and Google Cloud Storage. We look at best practices for cloud storage bucket access con...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯2