πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Marriott’s FTC charge underlines danger of β€˜inheriting’ data breaches during acquisitions πŸ“’

Experts warn businesses should learn from the hotel chains failure to properly assess the implications of acquiring an entity that has glaring security issues.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ NCSC warns organizations of cyber threat from Russian Foreign Intelligence πŸ“’

Attackers linked to the Russian government are exploiting unpatched vulnerabilities, say UK and US security agencies.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ UK Public sector at risk from supply chain attacks, new report warns πŸ“’

Research from Blackberry suggests that overconfidence and a lack of visibility are leaving healthcare, education, and government organizations exposed.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Amazon Aurora deep dive πŸ“’

Deploy servers with a secure approach.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Marriot & Starwood Face $52M Settlement After Security Breaches πŸ•΅οΈβ€β™‚οΈ

The hotel giant will be held to higher security standards in a series of proposed requirements, including implementing a new annually reviewed security program.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Invisible Army of Non-Human Identities πŸ•΅οΈβ€β™‚οΈ

The future of cybersecurity will be shaped by how well we manage the explosion of NHIs.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Retail CISOs Take on More Risk to Foster Innovation πŸ•΅οΈβ€β™‚οΈ

CISOs in consumer and retail organizations appear to accept greater risks to allow for more innovation, which could be a model for future growth.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Firefox Update Patches Exploited Vulnerability 🦿

Investigation of the useafterfree flaw is ongoing, but organizations and individual users can update Firefox now for a fix.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Deepfakes Can Fool Facial Recognition on Crypto Exchanges 🦿

Creating new accounts under fake identities provides attackers with a way to launder money or commit fraud.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The Internet Archive Breach: Over 31 Million User Accounts Exposed 🦿

Attackers got hold of a 6.4 GB file containing the email addresses and hashed passwords of users registered with The Internet Archive.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Cybersecurity Awareness Lags as Global Workforce Engages in Risky AI Practices 🦿

46 of Gen Z employees are sharing data with AI, according to new research.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 How governance, risk and compliance (GRC) addresses growing data liability concerns 🧠

In an era where businesses increasingly rely on artificial intelligence AI and advanced data capabilities, the effectiveness of IT services is more critical than ever. Yet despite the advancements in technology, business leaders are increasingly dissatisfied with their IT departments. According to a study by IBMs Institute for Business Value, confidence in the effectiveness of The post How governance, risk and compliance GRC addresses growing data liability concerns appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks πŸ–‹οΈ

A new taxthemed malware campaign targeting insurance and finance sectors has been observed leveraging GitHub links in phishing email messages as a way to bypass security measures and deliver Remcos RAT, indicating that the method is gaining traction among threat actors. "In this campaign, legitimate repositories such as the opensource tax filing software, UsTaxes, HMRC, and InlandRevenue were.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How Hybrid Password Attacks Work and How to Defend Against Them πŸ–‹οΈ

Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password attacks merge multiple cracking techniques to amplify their effectiveness. These combined approaches exploit the strengths of various methods, accelerating the passwordcracking process.  In this post, well explore hybrid attacks what they are.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA is warning that it has observed threat actors leveraging unencrypted persistent cookies managed by the F5 BIGIP Local Traffic Manager LTM module to conduct reconnaissance of target networks. It said the module is being used to enumerate other noninternetfacing devices on the network. The agency, however, did not disclose who.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ Telekopye transitions to targeting tourists via hotel booking scam πŸš€

ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NHS England Warns of Critical Veeam Vulnerability Under Active Exploitation πŸ“”

NHS England has issued an alert regarding a critical Veeam Backup Replication vulnerability that is being actively exploited, potentially leading to remote code execution.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Border Agency Under Fire for App's Handling of Personal Data πŸ“”

Access Now announced that the US Customs and Border Protection agency released records on its app following the NGOs lawsuit.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Sonatype Reports 156% Increase in OSS Malicious Packages πŸ“”

A new Sonatype report reveals a 156 surge in open source malware, with over 704,102 malicious packages identified since 2019, as OSS adoption continues to skyrocket.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russia's SVR Targets Zimbra, TeamCity Servers for Cyber Espionage πŸ“”

Russianbacked APT29 has been spying on US and European organizations since at least 2021, a USUK joint advisory said.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ SOC Teams: Threat Detection Tools Are Stifling Us πŸ•΅οΈβ€β™‚οΈ

Threat detection tools yield too many false positives, security pros say, leading to burnout and resentment.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity