πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Microsoft: Ransomware Attacks Growing More Dangerous, Complex 🦿

Attackers launched 600 million cybercriminal and nationstate threats on Microsoft customers daily, including ransomware attacks, in the last year, according to the tech giant.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Staff Stories Spotlight Series: Cybersecurity Awareness Month 2024 πŸͺ–

This blog is part of a larger NIST series during the month of October for Cybersecurity Awareness Month , called 'Staff Stories Spotlight.' Throughout the month of October this year, QA style blogs will be published featuring some of our unique staff members who have interesting backgrounds, stories to tell, and projects in the world of cybersecurity. This years Cybersecurity Awareness Month theme is Secure our World. How does this theme resonate with you, as someone working in cybersecurity? Everyone has the power to protect information. Like safety where everyones responsibility is to.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser πŸ–‹οΈ

Microsoft has disclosed details about a nowpatched security flaw in Apple's Transparency, Consent, and Control TCC framework in macOS that has likely come under exploitation to get around a user's privacy preferences and access data. The shortcoming, codenamed HM Surf by the tech giant, is tracked as CVE202444133. It was addressed by Apple as part of macOS Sequoia 15 by removing the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Feeling safe with that complicated password? Think again, security experts say – complexity affects memorability and fosters unsafe practices πŸ“’

Password complexity affects user memorability and can inadvertently foster complacency and unsafe practices.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Top 18 Sophos Competitors & Alternatives in 2025 🌊

If youre familiar with Sophos, you know its a big name in the cybersecurity world, offering everything from endpoint to network and cloud security. But, like any product, its not always the perfect fit for everyone. Thankfully, some strong alternatives might suit your needs even better, depending on your specific security requirements. Let me walk The post Top 18 Sophos Competitors Alternatives in 2025 appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… IT Vulnerability Weekly Report: Cyble Urges Fixes for Fortinet, Palo Alto & More πŸ¦…

Overview Cyble Research and Intelligence Labs CRIL investigated 27 vulnerabilities during the week of October 915 and identified 11 as highpriority fixes for security teams. Cyble researchers also observed 14 vulnerability exploits discussed on dark web and cybercrime forums, raising the likelihood that those vulnerabilities will be exploited more frequently. Of the vulnerabilities highlighted by Cyble threat researchers, two are being actively exploited by statesponsored threat actors, and five could be chained together to hijack Palo Alto Networks firewalls. Among the vulnerabilities investigated by Cyble researchers this week, Cybles Odin vulnerability exposure search tool detected 427,000 vulnerable Fortinet devices exposed to the internet after CVE202423113, a 9.8severi...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Vietnamese Threat Actor’s Multi-Layered Strategy on Digital Marketing Professionals πŸ¦…

Key takeaways Cyble Research and Intelligence Labs CRIL uncovered a sophisticated multistage malware attack originating from an archive file that contains a malicious LNK file. The lure document observed in the campaign indicates that the Threat Actor TA is targeting job seekers and digital marketing professionals, especially those involved with Meta Ads. The malware employs several techniques to detect virtual machine environments, evading detection and analysis in sandboxed or emulated environments. The malware uses multiple antidebugging techniques to detect if it is being debugged, making analysis or reverse engineering more challenging. The malware employs defense evasion techniques, including disabling event tracing and altering inmemory functions, to evade detection ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ NIS2 is now in force around the EU – can business keep up with new compliance obligations? πŸ“’

The EUs flagship cyber resilience framework NIS2 is finally here, but research indicates businesses are not ready, with compliance officers facing a herculean task.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Fortify your future: How HPE ProLiant Servers deliver top-tier cyber security, management, and performance πŸ“’

Deploy servers with a secure approach.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Beware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign πŸ–‹οΈ

Threat actors are leveraging fake Google Meet web pages as part of an ongoing malware campaign dubbed ClickFix to deliver infostealers targeting Windows and macOS systems. "This tactic involves displaying fake error messages in web browsers to deceive users into copying and executing a given malicious PowerShell code, finally infecting their systems," French cybersecurity company Sekoia said in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Instagram Rolls Out New Sextortion Protection Measures πŸ“”

Instagram has announced new security features to protect users from sextortion scams, including hiding follower lists, preventing screenshots, and launching an awareness campaign.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Named Most Imitated Brand in Phishing Attacks πŸ“”

The Redmondbased firm was the most impersonated brand in the third quarter of 2024, while Alibaba entered the Top 10 for the first time.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Arrest Man for SEC X Account Hack πŸ“”

US authorities have charged a man for involvement in the SEC X account hack in January 2024, which falsely announced the approval of Bitcoin Exchange Traded Funds.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture πŸ–‹οΈ

Picture your company's data as a vast, complex jigsaw puzzlescattered across clouds, devices, and networks. Some pieces are hidden, some misplaced, and others might even be missing entirely. Keeping your data secure in todays fastevolving landscape can feel like an impossible challenge. But theres a gamechanging solution Data Security Posture Management DSPM. Think of it as a hightech,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign πŸ–‹οΈ

Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a yearlong campaign undertaken by Iranian cyber actors to infiltrate critical infrastructure organizations via bruteforce attacks. "Since October 2023, Iranian actors have used brute force and password spraying to compromise user accounts and obtain access to organizations in the healthcare and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Brazil Arrests β€˜USDoD,’ Hacker in FBI Infragard Breach β™ŸοΈ

Brazilian authorities reportedly have arrested a 33yearold man on suspicion of being "USDoD," a prolific cybercriminal who rose to infamy in 2022 after infiltrating the FBI's InfraGard program and leaking contact information for 80,000 members. More recently, USDoD was behind a breach at the consumer data broker National Public Data that led to the leak of Social Security numbers and other personal information for a significant portion of the U.S. population.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Optimizing AppSec in the financial services sector πŸ“’

A buyer's guide for meeting the unprecedented speed and complexity of today's development practices.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Developer security best practices for FinServ πŸ“’

Developer security in a financial services institution.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Building a world-class security champions program πŸ“’

The first point of contact for securityrelated questions.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ From basics to best practices: Building a strong AppSec program πŸ“’

Make it harder for attackers to exploit vulnerabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Bridging the gap: How security teams can engage developers in security programs πŸ“’

How security teams can engage developers in security programs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1