πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for GDPR Violations πŸ–‹οΈ

The Irish data protection watchdog on Thursday fined LinkedIn 310 million 335 million for violating the privacy of its users by conducting behavioral analyses of personal data for targeted advertising. "The inquiry examined LinkedIn's processing of personal data for the purposes of behavioral analysis and targeted advertising of users who have created LinkedIn profiles members," the Data.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
🌊 vCISO GRC Auditor 🌊

The post vCISO GRC Auditor appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” MacOS-Focused Ransomware Attempts Leverage LockBit Brand πŸ“”

An unidentified threat actor has attempted to develop ransomware targeting macOS devices, posing as LockBit.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Everything you need to know about the β€˜mass exploitation’ of FortiManager appliances πŸ“’

A missing authentication flaw could allow an attacker to use a compromised FortiManager device to move laterally to other Fortinet devices and target enterprise environments.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Human error is cybersecurity’s number one concern, Kaseya report finds πŸ“’

IT professionals highlight bad user behavior and a lack of security training as key hurdles to overcome this year.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Eliminating AI Deepfake Threats: Is Your Identity Security AI-Proof? πŸ–‹οΈ

Artificial Intelligence AI has rapidly evolved from a futuristic concept to a potent weapon in the hands of bad actors. Today, AIbased attacks are not just theoretical threatsthey're happening across industries and outpacing traditional defense mechanisms.  The solution, however, is not futuristic. It turns out a properly designed identity security platform is able to deliver defenses.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SEC Charges 4 Companies Over Misleading SolarWinds Cyberattack Disclosures πŸ–‹οΈ

The U.S. Securities and Exchange Commission SEC has charged four current and former public companies for making "materially misleading disclosures" related to the largescale cyber attack that stemmed from the hack of SolarWinds in 2020. The SEC said the companies Avaya, Check Point, Mimecast, and Unisys are being penalized for how they handled the disclosure process in the aftermath of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Ukraine Warns of Mass Phishing Campaign Targeting Citizens Data πŸ“”

CERTUA said the phishing campaign lures victims into downloading malware used to exfiltrate files containing sensitive personal data.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Irish Data Protection Watchdog Fines LinkedIn $336m πŸ“”

LinkedIn violated the EUs GDPR in how it processes its users personal data for behavioral purposes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Inequity Challenges Women in Digital Trust, But Progress is Being Made πŸ“”

A new ISACA study reveals that pay inequity and a lack of female leadership are significant issues noted by women in the digital trust sector.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2πŸ‘Ž1πŸ”₯1
🧠 Addressing growing concerns about cybersecurity in manufacturing 🧠

Manufacturing has become increasingly reliant on modern technology, including industrial control systems ICS, Internet of Things IoT devices and operational technology OT. While these innovations boost productivity and streamline operations, theyve vastly expanded the cyberattack surface. According to the 2024 IBM Cost of a Data Breach report, the average total cost of a data breach in The post Addressing growing concerns about cybersecurity in manufacturing appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Living off the land attacks πŸ“’

How adversaries are using native system files against you and what you can do to block it.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ Understanding least privileges πŸ“’

Protect your company from ransomware attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ•΅οΈβ€β™‚οΈ My Journey From the Air Force to Cybersecurity πŸ•΅οΈβ€β™‚οΈ

Cybersecurity is missiondriven, meaningful work that coincides with the service branches' goals to protect, defend, and create a safer world.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity Isn't Easy When You're Trying to Be Green πŸ•΅οΈβ€β™‚οΈ

Renewable energy firms deal with a large cyberattack surface area, given the distributed nature of power generation and more pervasive connectivity.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Open Source LLM Tool Sniffs Out Python Zero-Days πŸ•΅οΈβ€β™‚οΈ

Vulnhuntr is a Python static code analyzer that uses Claude AI to find and explain complex, multistep vulnerabilities.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Enter the World of Ethical Hacking with Confidence 🦿

This 44.99 bundle gives you 92 hours of training in penetration testing, network security, and much more.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ›  Faraday 5.8.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated PenetrationTest Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to reuse the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Adversary3 3.32 πŸ› 

Adversary3 malware vulnerability intel tool for thirdparty attackers living off malware LOM, updated with 700 malware and C2 panel vulnerabilities.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Researchers Discover Command Injection Flaw in Wi-Fi Alliance's Test Suite πŸ–‹οΈ

A security flaw impacting the WiFi Test Suite could enable unauthenticated local attackers to execute arbitrary code with elevated privileges. The CERT Coordination Center CERTCC said the vulnerability, tracked as CVE202441992, said the susceptible code from the WiFi Alliance has been found deployed on Arcadyan FMIMG51AX000J routers. "This flaw allows an unauthenticated local attacker to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security πŸ–‹οΈ

Apple has publicly made available its Private Cloud Compute PCC Virtual Research Environment VRE, allowing the research community to inspect and verify the privacy and security guarantees of its offering. PCC, which Apple unveiled earlier this June, has been marketed as the "most advanced security architecture ever deployed for cloud AI compute at scale." With the new technology, the idea is.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity