π’ The National Public Data breach exposed nearly three billion users β now the company has filed for bankruptcy π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
National Public Datas decline after a devastating cyber attack took roughly six months, as it failed to stay afloat amid mounting recovery costs.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
The National Public Data breach exposed 270 million users β now the company has filed for bankruptcy
National Public Dataβs decline after a devastating cyber attack took roughly six months, as it failed to stay afloat amid mounting recovery costs
π’ LinkedIn fined β¬310 million for GDPR breaches π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The social networking platform has accepted the ruling and will implement changes to its ad tracking processes.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
LinkedIn fined β¬310 million for GDPR breaches
The social networking platform has accepted the ruling and will implement changes to its ad tracking processes
π¦Ώ Is Firefox Password Manager Secure? π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Like other password managers, there are risks and drawbacks to consider before trusting Firefox Password Manager with your credentials.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Is Firefox Password Manager Secure?
Like other password managers, there are risks and drawbacks to consider before trusting Firefox Password Manager with your credentials.
π¦Ώ Hiring Kit: Computer Forensic Analyst π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
The increasing emphasis on securing sensitive data by regulatory agencies and governments worldwide has opened job opportunities beyond criminal justice for capable individuals with proficient technical skills, inquisitive analytical mindsets, and the tenacious drive to solve seemingly intractable problems. This customizable hiring kit, written by Mark W. Kaelin for TechRepublic Premium, provides a framework you ...π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Hiring Kit: Computer Forensic Analyst | TechRepublic
The increasing emphasis on securing sensitive data by regulatory agencies and governments worldwide has opened job opportunities beyond criminal justice
ποΈ THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 - Oct 27) ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity news can sometimes feel like a neverending horror movie, can't it? Just when you think the villains are locked up, a new threat emerges from the shadows. This week is no exception, with tales of exploited flaws, international espionage, and AI shenanigans that could make your head spin. But don't worry, we're here to break it all down in plain English and arm you with the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat actors continue to abuse legitimate services like Cloudflare and Microsoft Sway to their advantage. "The campaigns target sensitive information from different crypto wallets, including Coinbase, MetaMask, Phantom, Trezor, and Bitbuy, as well as login credentials for.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Sailing the Seven Seas Securely from Port to Port β OT Access Security for Ships and Cranes ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Operational Technology OT security has affected marine vessel and port operators, since both ships and industrial cranes are being digitalized and automated at a rapid pace, ushering in new types of security challenges. Ships come to shore every six months on average. Container cranes are mostly automated. Diagnostics, maintenance, upgrade and adjustments to these critical systems are done.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Researchers Discover Over 70 Zero-Day Bugs at Pwn2Own Ireland π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Trend Micros Zero Day Initiative hands out over 1m in awards for Pwn2Own competitors, who found more than 70 zeroday flaws.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Researchers Discover Over 70 Zero-Day Bugs at Pwn2Own Ireland
Trend Microβs Zero Day Initiative hands out over $1m in awards for Pwn2Own competitors, who found more than 70 zero-day flaws
π AI-Powered BEC Scams Zero in on Manufacturers π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Vipre research reveals that 10 of emails targeting the manufacturing sector are BEC attempts.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
AI-Powered BEC Scams Zero in on Manufacturers
Vipre research reveals that 10% of emails targeting the manufacturing sector are BEC attempts
π΅οΈββοΈ Put End-of-Life Software to Rest π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Relying on EOL software leaves critical systems exposed making it a problem no business can afford to ignore.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Put End-of-Life Software to Rest
Relying on EOL software leaves critical systems exposed β making it a problem no business can afford to ignore.
π2
π’ The National Public Data breach exposed 270 million users β now the company has filed for bankruptcy π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
National Public Datas decline after a devastating cyber attack took roughly six months, as it failed to stay afloat amid mounting recovery costs.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
The National Public Data breach exposed 270 million users β now the company has filed for bankruptcy
National Public Dataβs decline after a devastating cyber attack took roughly six months, as it failed to stay afloat amid mounting recovery costs
β€1
π’ National Public Data breach: Lawsuit claims failed to protect billions of personal records π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
A breach at background check company National Public Data allegedly left billions of sensitive personal records exposed on the dark web.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
ITPro
National Public Data breach: Lawsuit claims failed to protect billions of personal records
A breach at background check company National Public Data allegedly left billions of sensitive personal records exposed on the dark web
ποΈ Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A government entity and a religious organization in Taiwan were the target of a Chinalinked threat actor known as Evasive Panda that infected them with a previously undocumented postcompromise toolset codenamed CloudScout. "The CloudScout toolset is capable of retrieving data from various cloud services by leveraging stolen web session cookies," ESET security researcher Anh Ho said. "Through.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 - Oct 27) ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity news can sometimes feel like a neverending horror movie, can't it? Just when you think the villains are locked up, a new threat emerges from the shadows. This week is no exception, with tales of exploited flaws, international espionage, and AI shenanigans that could make your head spin. But don't worry, we're here to break it all down in plain English and arm you with the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Russian Espionage Group Targets Ukrainian Military with Malware via Telegram ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A suspected Russian hybrid espionage and influence operation has been observed delivering a mix of Windows and Android malware to target the Ukrainian military under the Telegram persona Civil Defense. Google's Threat Analysis Group TAG and Mandiant are tracking the activity under the name UNC5812. The threat group, which operates a Telegram channel named civildefensecomua, was created on.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
ποΈ BeaverTail Malware Resurfaces in Malicious npm Packages Targeting Developers ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Three malicious packages published to the npm registry in September 2024 have been found to contain a known malware called BeaverTail, a JavaScript downloader and information stealer linked to an ongoing North Korean campaign tracked as Contagious Interview. The Datadog Security Research team is monitoring the activity under the name Tenacious Pungsan, which is also known by the monikers.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Evasive Pandaβs CloudScout Toolset Targets Taiwan π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Evasive Pandas CloudScout uses MgBot to steal session cookies, infiltrating cloud data in Taiwan.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Evasive Pandaβs CloudScout Toolset Targets Taiwan
Evasive Pandaβs CloudScout uses MgBot to steal session cookies, infiltrating and extracting cloud data from Taiwanese institutions
β€1
π New Type of Job Scam Targets Financially Vulnerable Populations π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The surge in job scams targets vulnerable individuals, mirroring pig butchering fraud tactics.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New Type of Job Scam Targets Financially Vulnerable Populations
The surge in job scams targets vulnerable individuals, mirroring pig butchering fraud tactics
π Russian Malware Campaign Targets Ukrainian Recruits Via Telegram π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Google researchers have observed Russian threat actor UNC5812 using a malware campaign via Telegram to access the devices of Ukrainian military recruits.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Russian Malware Campaign Targets Ukrainian Recruits Via Telegram
Google researchers have observed Russian threat actor UNC5812 using a malware campaign via Telegram to access the devices of Ukrainian military recruits
β€1
π¦
U.S. Agencies Investigate China-Linked Telecom Hacks Targeting High-Profile Politicians π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
The FBI and the Cybersecurity and Infrastructure Security Agency CISA have launched an investigation into a series of cyber intrusions linked to hackers believed to be affiliated with the Chinese statelinked threat actors. This investigation follows reports that the phone communications of prominent U.S. political figures, including former President Donald Trump, Vice President Kamala Harris campaign team, and vicepresidential candidate JD Vance, have been targeted in a sweeping cyberespionage effort. Allegations of Unauthorized Access by Chinese State Linked Threat Actors The FBI and CISA issued a statement confirming their investigation into unauthorized access to commercial telecommunications infrastructure perpetrated by actors associated with the Peoples Republic of Ch...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
U.S. Investigates China-Linked Telecom Hacks On Politicians
The FBI and CISA are investigating cyber intrusions linked to Chinese state actors, targeting Trump, Harris, and JD Vance via Telecom Hacks.
π¦
New Vulnerabilities Identified in Philips Smart Lighting and Matrix Door Controller π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Overview The Indian Computer Emergency Response Team CERTIn has issued two critical vulnerability advisories related to Philips Smart Lighting products and the Matrix Door Controller. Both vulnerabilities are classified as high severity, signaling significant risks for users that cannot be ignored. If left unaddressed, these vulnerabilities could lead to serious repercussions, including unauthorized access to sensitive information and potential data breaches. The implications of these vulnerabilities extend beyond mere inconvenience they threaten the security and integrity of users' home networks and connected devices. Affected users must take immediate action to protect their systems and ensure they are not exposed to potential exploitation. By staying informed and implementi...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
New Vulnerabilities In Philips Smart Lighting & Matrix Door
CERT-In's vulnerability advisories highlight severe risks in Philips Smart Lighting and Matrix Door Controller.