πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture πŸ–‹οΈ

Picture your company's data as a vast, complex jigsaw puzzlescattered across clouds, devices, and networks. Some pieces are hidden, some misplaced, and others might even be missing entirely. Keeping your data secure in todays fastevolving landscape can feel like an impossible challenge. But theres a gamechanging solution Data Security Posture Management DSPM. Think of it as a hightech,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign πŸ–‹οΈ

Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a yearlong campaign undertaken by Iranian cyber actors to infiltrate critical infrastructure organizations via bruteforce attacks. "Since October 2023, Iranian actors have used brute force and password spraying to compromise user accounts and obtain access to organizations in the healthcare and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Brazil Arrests β€˜USDoD,’ Hacker in FBI Infragard Breach β™ŸοΈ

Brazilian authorities reportedly have arrested a 33yearold man on suspicion of being "USDoD," a prolific cybercriminal who rose to infamy in 2022 after infiltrating the FBI's InfraGard program and leaking contact information for 80,000 members. More recently, USDoD was behind a breach at the consumer data broker National Public Data that led to the leak of Social Security numbers and other personal information for a significant portion of the U.S. population.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Optimizing AppSec in the financial services sector πŸ“’

A buyer's guide for meeting the unprecedented speed and complexity of today's development practices.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Developer security best practices for FinServ πŸ“’

Developer security in a financial services institution.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Building a world-class security champions program πŸ“’

The first point of contact for securityrelated questions.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ From basics to best practices: Building a strong AppSec program πŸ“’

Make it harder for attackers to exploit vulnerabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Bridging the gap: How security teams can engage developers in security programs πŸ“’

How security teams can engage developers in security programs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ The blind spots: five critical mistakes cybersecurity channel leaders must avoid πŸ“’

Threat actors continue to innovate their TTPs relentlessly, here's five key areas the security channel needs to be aware of to help there customers stay protected.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Supply Chain Cybersecurity Beyond Traditional Vendor Risk Management πŸ•΅οΈβ€β™‚οΈ

Traditional practices are no longer sufficient in today's threat landscape. It's time for cybersecurity professionals to rethink their approach.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 What’s behind the 51% drop in ransomware attacks? 🧠

In a world where cyber threats feel omnipresent, a recent report has revealed some unexpected good news ransomware attacks on state and local governments have dropped by 51 in 2024. Still, this decline does not signal the end of the ransomware threat, nor should it lead to complacency. As the nature of ransomware evolves, so The post Whats behind the 51 drop in ransomware attacks? appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data πŸ–‹οΈ

North Korean information technology IT workers who obtain employment under false identities in Western companies are not only stealing intellectual property, but are also stepping up by demanding ransoms in order to not leak it, marking a new twist to their financially motivated attacks. "In some instances, fraudulent workers demanded ransom payments from their former employers after gaining.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Internet Archive and Wayback Machine Resurrect After DDoS Wave πŸ“”

Internet Archive founder confirmed the allegedly exposed data was safe.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” macOS Vulnerability Could Expose User Data, Microsoft Warns πŸ“”

Microsoft urges macOS users to apply a fix for the vulnerability, which it believes may be under active exploitation by the Adload malware family.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Vulnerabilities, AI Compete for Software Developers' Attention πŸ•΅οΈβ€β™‚οΈ

This year, the majority of developers have adopted AI assistants to help with coding and improve code output, but most are also creating more vulnerabilities that take longer to remediate.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ MacOS Safari 'HM Surf' Exploit Exposes Camera, Mic, Browser Data πŸ•΅οΈβ€β™‚οΈ

Microsoft researchers toyed with app permissions to uncover CVE202444133, using it to access sensitive user data. Adware merchants may have as well.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Time to Get Strict With DMARC πŸ•΅οΈβ€β™‚οΈ

Adoption of the email authentication and policy specification remains low, and only about a tenth of DMARCenabled domains enforce policies. Everyone is waiting for major email providers to get strict.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ ESET-Branded Wiper Attack Targets Israel; Firm Denies Compromise πŸ•΅οΈβ€β™‚οΈ

The security firm is denying an assessment that its systems were compromised in Israel by proPalestinian cyberattackers, but acknowledged an attack on one of its partners.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISOs: Throwing Cash at Tools Isn't Helping Detect Breaches πŸ•΅οΈβ€β™‚οΈ

A survey shows threequarters of CISOs are drowning in threat detections put out by a sprawling stack of tools, yet still lack the basic visibility necessary to identify breaches.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Can You Fax a Check? Yes. Follow These Steps to Do it Safely 🦿

Discover how to legally, securely, and quickly fax a check whether you're using a traditional fax machine or an online faxing service.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ–‹οΈ Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks πŸ–‹οΈ

A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting Russian businesses and government agencies with ransomware with the twin goals of disrupting business operations and financial gain. "The group under review has a toolkit that includes utilities such as Mimikatz, XenAllPasswordPro, PingCastle, Localtonet, resocks, AnyDesk, PsExec, and others,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity