πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Optimizing AppSec in the financial services sector πŸ“’

A buyer's guide for meeting the unprecedented speed and complexity of today's development practices.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Developer security best practices for FinServ πŸ“’

Developer security in a financial services institution.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Building a world-class security champions program πŸ“’

The first point of contact for securityrelated questions.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ From basics to best practices: Building a strong AppSec program πŸ“’

Make it harder for attackers to exploit vulnerabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Bridging the gap: How security teams can engage developers in security programs πŸ“’

How security teams can engage developers in security programs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ The blind spots: five critical mistakes cybersecurity channel leaders must avoid πŸ“’

Threat actors continue to innovate their TTPs relentlessly, here's five key areas the security channel needs to be aware of to help there customers stay protected.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Supply Chain Cybersecurity Beyond Traditional Vendor Risk Management πŸ•΅οΈβ€β™‚οΈ

Traditional practices are no longer sufficient in today's threat landscape. It's time for cybersecurity professionals to rethink their approach.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 What’s behind the 51% drop in ransomware attacks? 🧠

In a world where cyber threats feel omnipresent, a recent report has revealed some unexpected good news ransomware attacks on state and local governments have dropped by 51 in 2024. Still, this decline does not signal the end of the ransomware threat, nor should it lead to complacency. As the nature of ransomware evolves, so The post Whats behind the 51 drop in ransomware attacks? appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data πŸ–‹οΈ

North Korean information technology IT workers who obtain employment under false identities in Western companies are not only stealing intellectual property, but are also stepping up by demanding ransoms in order to not leak it, marking a new twist to their financially motivated attacks. "In some instances, fraudulent workers demanded ransom payments from their former employers after gaining.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Internet Archive and Wayback Machine Resurrect After DDoS Wave πŸ“”

Internet Archive founder confirmed the allegedly exposed data was safe.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” macOS Vulnerability Could Expose User Data, Microsoft Warns πŸ“”

Microsoft urges macOS users to apply a fix for the vulnerability, which it believes may be under active exploitation by the Adload malware family.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Vulnerabilities, AI Compete for Software Developers' Attention πŸ•΅οΈβ€β™‚οΈ

This year, the majority of developers have adopted AI assistants to help with coding and improve code output, but most are also creating more vulnerabilities that take longer to remediate.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ MacOS Safari 'HM Surf' Exploit Exposes Camera, Mic, Browser Data πŸ•΅οΈβ€β™‚οΈ

Microsoft researchers toyed with app permissions to uncover CVE202444133, using it to access sensitive user data. Adware merchants may have as well.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Time to Get Strict With DMARC πŸ•΅οΈβ€β™‚οΈ

Adoption of the email authentication and policy specification remains low, and only about a tenth of DMARCenabled domains enforce policies. Everyone is waiting for major email providers to get strict.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ ESET-Branded Wiper Attack Targets Israel; Firm Denies Compromise πŸ•΅οΈβ€β™‚οΈ

The security firm is denying an assessment that its systems were compromised in Israel by proPalestinian cyberattackers, but acknowledged an attack on one of its partners.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISOs: Throwing Cash at Tools Isn't Helping Detect Breaches πŸ•΅οΈβ€β™‚οΈ

A survey shows threequarters of CISOs are drowning in threat detections put out by a sprawling stack of tools, yet still lack the basic visibility necessary to identify breaches.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Can You Fax a Check? Yes. Follow These Steps to Do it Safely 🦿

Discover how to legally, securely, and quickly fax a check whether you're using a traditional fax machine or an online faxing service.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ–‹οΈ Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks πŸ–‹οΈ

A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting Russian businesses and government agencies with ransomware with the twin goals of disrupting business operations and financial gain. "The group under review has a toolkit that includes utilities such as Mimikatz, XenAllPasswordPro, PingCastle, Localtonet, resocks, AnyDesk, PsExec, and others,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Acronym Overdose – Navigating the Complex Data Security Landscape πŸ–‹οΈ

In the modern enterprise, data security is often discussed using a complex lexicon of acronymsDLP, DDR, DSPM, and many others. While these acronyms represent critical frameworks, architectures, and tools for protecting sensitive information, they can also overwhelm those trying to piece together an effective security strategy. This article aims to demystify some of the most important acronyms.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ‘½ Microsoft Loses Critical Security Logs, Raising Concerns Over Cloud Security πŸ‘½

Microsoft has admitted to a significant lapse in its cloud security logging, leaving customers vulnerable to undetected intrusions for over two weeks. A bug in the companys internal monitoring system resulted in the loss of critical security logs between September 2nd and 19th. This incident affects several key Microsoft cloud.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
😱2
πŸš€ Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe πŸš€

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 20182019 to just five days last year.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity