ποΈ New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered an advanced version of the Qilin ransomware sporting increased sophistication and tactics to evade detection. The new variant is being tracked by cybersecurity firm Halcyon under the moniker Qilin.B. "Notably, Qilin.B now supports AES256CTR encryption for systems with AESNI capabilities, while still retaining Chacha20 for systems that lack this support.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ Critical Bug Exploited in Fortinet's Management Console π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
An attacker compromised one of Fortinet's most sensitive products and mopped up all kinds of reconnaissance data helpful for future mass device attacks.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Critical Bug Exploited in Fortinet's Management Console
An attacker compromised one of Fortinet's most sensitive products and mopped up all kinds of reconnaissance data helpful for future mass device attacks.
π±1
π΅οΈββοΈ AWS's Predictable Bucket Names Make Accounts Easier to Crack π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Amazon's open source Cloud Development Kit generates dangerously predictable naming patterns that could lead to an account takeover.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
AWS's Predictable Bucket Names Make Accounts Insecure
Amazon's open-source Cloud Development Kit generates dangerously predictable naming patterns that could lead to an account takeover.
π΅οΈββοΈ Microsoft: Healthcare Sees 300% Surge in Ransomware Attacks π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Even after the ransom is paid, such attacks lead to spikes in strokes and heart attacks and increased wait times for patients.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Healthcare Sees 300% Surge in Ransomware Attacks
Even after the ransom is paid, such attacks lead to spikes in strokes and heart attacks and increased wait times for patients.
ποΈ Irish Watchdog Imposes Record β¬310 Million Fine on LinkedIn for GDPR Violations ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Irish data protection watchdog on Thursday fined LinkedIn 310 million 335 million for violating the privacy of its users by conducting behavioral analyses of personal data for targeted advertising. "The inquiry examined LinkedIn's processing of personal data for the purposes of behavioral analysis and targeted advertising of users who have created LinkedIn profiles members," the Data.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π2
π vCISO GRC Auditor π
π Read more.
π Via "UnderDefense"
----------
ποΈ Seen on @cibsecurity
The post vCISO GRC Auditor appeared first on UnderDefense.π Read more.
π Via "UnderDefense"
----------
ποΈ Seen on @cibsecurity
UnderDefense
vCISO GRC Auditor - UnderDefense
π MacOS-Focused Ransomware Attempts Leverage LockBit Brand π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
An unidentified threat actor has attempted to develop ransomware targeting macOS devices, posing as LockBit.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
MacOS-Focused Ransomware Attempts Leverage LockBit Brand
An unidentified threat actor has attempted to develop ransomware targeting macOS devices, posing as LockBit
π’ Everything you need to know about the βmass exploitationβ of FortiManager appliances π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
A missing authentication flaw could allow an attacker to use a compromised FortiManager device to move laterally to other Fortinet devices and target enterprise environments.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Everything you need to know about the βmass exploitationβ of FortiManager appliances
A missing authentication flaw could allow an attacker to use a compromised FortiManager device to move laterally to other Fortinet devices and target enterprise environments
π’ Human error is cybersecurityβs number one concern, Kaseya report finds π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT professionals highlight bad user behavior and a lack of security training as key hurdles to overcome this year.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ChannelPro
Human error is cybersecurityβs number one concern, Kaseya report finds
IT professionals highlight bad user behavior and a lack of security training as key hurdles to overcome this year
ποΈ Eliminating AI Deepfake Threats: Is Your Identity Security AI-Proof? ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Artificial Intelligence AI has rapidly evolved from a futuristic concept to a potent weapon in the hands of bad actors. Today, AIbased attacks are not just theoretical threatsthey're happening across industries and outpacing traditional defense mechanisms. The solution, however, is not futuristic. It turns out a properly designed identity security platform is able to deliver defenses.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ SEC Charges 4 Companies Over Misleading SolarWinds Cyberattack Disclosures ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Securities and Exchange Commission SEC has charged four current and former public companies for making "materially misleading disclosures" related to the largescale cyber attack that stemmed from the hack of SolarWinds in 2020. The SEC said the companies Avaya, Check Point, Mimecast, and Unisys are being penalized for how they handled the disclosure process in the aftermath of.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
π Ukraine Warns of Mass Phishing Campaign Targeting Citizens Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
CERTUA said the phishing campaign lures victims into downloading malware used to exfiltrate files containing sensitive personal data.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ukraine Warns of Mass Phishing Campaign Targeting Citizens Data
CERT-UA said the phishing campaign lures victims into downloading malware used to exfiltrate files containing sensitive personal data
π Irish Data Protection Watchdog Fines LinkedIn $336m π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
LinkedIn violated the EUs GDPR in how it processes its users personal data for behavioral purposes.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Irish Data Protection Watchdog Fines LinkedIn $336m
LinkedIn violated the EUβs GDPR in how it processes its users personal data for behavioral purposes
π Inequity Challenges Women in Digital Trust, But Progress is Being Made π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A new ISACA study reveals that pay inequity and a lack of female leadership are significant issues noted by women in the digital trust sector.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Inequity Challenges Women in Digital Trust, But Progress is Being Made
A new ISACA study reveals that pay inequity and a lack of female leadership are significant issues noted by women in the digital trust sector
β€2π1π₯1
π§ Addressing growing concerns about cybersecurity in manufacturing π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Manufacturing has become increasingly reliant on modern technology, including industrial control systems ICS, Internet of Things IoT devices and operational technology OT. While these innovations boost productivity and streamline operations, theyve vastly expanded the cyberattack surface. According to the 2024 IBM Cost of a Data Breach report, the average total cost of a data breach in The post Addressing growing concerns about cybersecurity in manufacturing appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
Addressing growing concerns about cybersecurity in manufacturing
As manufacturing becomes increasingly reliant on modern technology, the industry's cyberattack surface has increased exponentially.
π’ Living off the land attacks π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
How adversaries are using native system files against you and what you can do to block it.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Living off the land attacks
How adversaries are using native system files against you and what you can do to block it
β€1
π’ Understanding least privileges π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Protect your company from ransomware attacks.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
Understanding least privileges
Protect your company from ransomware attacks
π₯1
π΅οΈββοΈ My Journey From the Air Force to Cybersecurity π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Cybersecurity is missiondriven, meaningful work that coincides with the service branches' goals to protect, defend, and create a safer world.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
My Journey From the Air Force to Cybersecurity
Cybersecurity is mission-driven, meaningful work that coincides with the service branches' goals to protect, defend, and create a safer world.
π΅οΈββοΈ Cybersecurity Isn't Easy When You're Trying to Be Green π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Renewable energy firms deal with a large cyberattack surface area, given the distributed nature of power generation and more pervasive connectivity.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Cybersecurity Isn't Easy When You're Trying to Be Green
Renewable energy firms deal with a large cyberattack surface area, given the distributed nature of power generation and more pervasive connectivity.
π΅οΈββοΈ Open Source LLM Tool Sniffs Out Python Zero-Days π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Vulnhuntr is a Python static code analyzer that uses Claude AI to find and explain complex, multistep vulnerabilities.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Open Source LLM Tool Sniffs Out Python Zero-Days
Vulnhuntr is a Python static code analyzer using Claude AI to find and explain complex, multistep vulnerabilities.
π¦Ώ Enter the World of Ethical Hacking with Confidence π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
This 44.99 bundle gives you 92 hours of training in penetration testing, network security, and much more.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Enter the World of Ethical Hacking with Confidence
This $44.99 bundle gives you 92 hours of training in penetration testing, network security, and much more.
β€1