π¦Ώ 7 Security and Compliance Tips From ISC2 Security Congress π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
An IT and security compliance analyst distilled seven ways to forge effective synergies between IT and broader business goals.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
7 Security and Compliance Tips From ISC2 Security Congress
An IT and security compliance analyst distilled seven ways to forge effective synergies between IT and broader business goals.
π΅οΈββοΈ Hybrid Work Exposes New Vulnerabilities in Print Security π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The shift to a distributed work model has exposed organizations to new threats, and a low but continuing stream of printerrelated vulnerabilities isn't helping.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Hybrid Work Exposes New Vulnerabilities in Print Security
The shift to a distributed work model has exposed organizations to new threats, and a low but continuing stream of printer-related vulnerabilities isn't helping.
π΅οΈββοΈ Bad Actors Manipulate Red-Team Tools to Evade Detection π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
By using EDRSilencer, threat actors are able to prevent security alerts and reports getting generated.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Bad Actors Manipulate Red-Team Tools to Evade Detection
By using EDRSilencer, threat actors are able to prevent security alerts and reports getting generated.
π΅οΈββοΈ Chinese Researchers Tap Quantum to Break Encryption π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
But the time when quantum computers pose a tangible threat to modern encryption is likely still several years away.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Chinese Researchers Tap Quantum to Break Encryption
But the time when quantum computers pose a tangible threat to modern encryption is likely still several years away.
π΅οΈββοΈ Iran's APT34 Abuses MS Exchange to Spy on Gulf Gov'ts π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
A MOISaligned threat group has been using Microsoft Exchange servers to exfiltrate sensitive data from Gulfstate government agencies.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Iran's APT34 Abuses MS Exchange
A MOIS-aligned threat group has been using Microsoft Exchange servers to exfiltrate sensitive data.
ποΈ Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be abused to gain root access under certain circumstances. The vulnerability, tracked as CVE20249486 CVSS score 9.8, has been addressed in version 0.1.38. The project maintainers acknowledged Nicolai Rybnikar for discovering and reporting the vulnerability. "A security issue.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π NIS2 Confusion: Concerns Over Readiness as Deadline Reached π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
NIS2 will be enforced as of October 17, yet many organizations and even EU member states appear completely unprepared for implementation.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
NIS2 Confusion: Concerns Over Readiness as Deadline Reached
NIS2 will be enforced as of October 17, yet many organizations and even EU member states appear completely unprepared for implementation
π CISA Seeks Feedback on Upcoming Product Security Flaws Guidance π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
CISA is asking for feedback on future guidance outlining bad security practices in product development as part of its Secure by Design initiative.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
CISA Seeks Feedback on Upcoming Product Security Flaws Guidance
CISA is asking for feedback on future guidance outlining bad security practices in product development as part of its Secure by Design initiative
π’ 96% of SMBs are missing critical cybersecurity skills β here's why π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The skills shortage hits SMBs worse as they often suffer from a lack of budget and resources.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
96% of SMBs are missing critical cybersecurity skills β here's why
The skills shortage hits SMBs worse as they often suffer from a lack of budget and resources
ποΈ U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denialofservice DDoS botnet for hire that conducted a record 35,000 DDoS attacks in a single year, including those that targeted Microsoft's services in June 2023. The attacks, which were facilitated by Anonymous Sudan's "powerful DDoS tool," singled out critical infrastructure, corporate networks,.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π RansomHub Overtakes LockBit as Most Prolific Ransomware Group π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Symantec data reveals RansomHub claimed more attacks than any other group in Q3 2024.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
RansomHub Overtakes LockBit as Most Prolific Ransomware Group
Symantec data reveals RansomHub claimed more attacks than any other group in Q3 2024
π Two-thirds of Attributable Malware Linked to Nation States π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Netskope claims 66 of malware attacks last year were backed by nation states.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Two-thirds of Attributable Malware Linked to Nation States
Netskope claims 66% of malware attacks last year were backed by nation states
π΅οΈββοΈ Is a CPO Still a CPO? The Evolving Role of Privacy Leadership π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Has the role of chief privacy officer become something more than it was? And is it still a role that just one person can handle?.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Is a CPO Still a CPO? Privacy Leadership's Evolving Role
Has the role of chief privacy officer become something more than it was? And is it still a role that just one person can handle?
β€1π1
π¦Ώ NIS 2 Compliance Deadline Arrives: What You Need to Know π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
The NIS 2 compliance deadline is Oct. 17. Discover essential insights on requirements, impacts, and what organisations must do now.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
NIS 2 Compliance Deadline Arrives: What You Need to Know
The NIS 2 compliance deadline is Oct. 17. Discover essential insights on requirements, impacts, and what organisations must do now.
π’ Fortify your future with HPE ProLiant Servers powered by Intel π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Enhance your security and manage your servers more effectively.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Fortify your future with HPE ProLiant Servers powered by Intel
Enhance your security and manage your servers more effectively
π1
π΅οΈββοΈ 4 Ways to Address Zero-Days in AI/ML Security π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
As the unique challenges of AI zerodays emerge, the approach to managing the accompanying risks needs to follow traditional security best practices but be adapted for AI.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
4 Ways to Address Zero-Days in AI/ML Security
As the unique challenges of AI zero-days emerge, the approach to managing the accompanying risks needs to follow traditional security best practices but be adapted for AI.
π΅οΈββοΈ Anonymous Sudan Unmasked as Leaders Face Life in Prison π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
US officials disrupted the group's DDoS operation and arrested two individuals behind it, who turned out to be far less intimidating than they were made out to be in the media.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Anonymous Sudan Unmasked as Leader Faces Life in Prison
US officials disrupted the cyber threat group's DDoS operation and arrested two individuals behind it, who turned out to be far less intimidating than they were made out to be in the media.
π¦Ώ Number of Active Ransomware Groups Highest on Record, Cyberintβs Report Finds π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
This indicates that the most prominent ransomware groups are succumbing to law enforcement takedowns, according to researchers from Cyberint.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Number of Active Ransomware Groups Highest on Record, Cyberintβs Report Finds
In the third quarter of 2024, the 10 most prominent ransomware groups were responsible for only 58.3% of attacks, according to Cyberint.
βοΈ Sudanese Brothers Arrested in βAnonSudanβ Takedown βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
The U.S. government on Wednesday announced the arrest and charging of two Sudanese brothers accused of running Anonymous Sudan a.k.a. AnonSudan, a cybercrime business known for launching powerful distributed denialofservice DDoS attacks against a range of targets, including dozens of hospitals, news websites and cloud providers. One of the brothers is facing life in prison for allegedly seeking to kill people with his attacks.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Sudanese Brothers Arrested in βAnonSudanβ Takedown
The U.S. government on Wednesday announced the arrest and charging of two Sudanese brothers accused of running Anonymous Sudan (a.k.a. AnonSudan), a cybercrime business known for launching powerful distributed denial-of-service (DDoS) attacks against a rangeβ¦
π§ The cybersecurity skills gap contributed to a $1.76 million increase in average breach costs π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Understaffing in cybersecurity the skills gap is driving up the cost of data breaches in recent years, according to a decade of reports by IBM. The 2024 IBM Data Breach Report found that more than half of breached organizations experienced severe security staffing shortages, a 26.2 increase from the previous year. They found The post The cybersecurity skills gap contributed to a 1.76 million increase in average breach costs appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
The cybersecurity skills gap contributed to a $1.76 million increase in average breach costs
Understaffing in cybersecurity β the "skills gap" β is driving up the cost of data breaches in recent years, according to a decade of reports by IBM.
ποΈ Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks aimed at Ukrainian government agencies and unknown Polish entities since at least late 2023. The intrusions are characterized by the use of a variant of the RomCom RAT dubbed SingleCamper aka SnipBot or RomCom 5.0, said Cisco Talos, which is monitoring the activity cluster under the moniker UAT5647. "This.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity