πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ FBI, Partners Disrupt RedLine, Meta Stealer Operations πŸ•΅οΈβ€β™‚οΈ

A collaboration with the FBI and lawenforcement agencies in Europe, the UK, and Australia, Operation Magnus has seized servers and source code related to the two malware families, which have stolen data from millions of victims worldwide.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How to Find the Right CISO πŸ•΅οΈβ€β™‚οΈ

Great CISOs are in short supply, so choose wisely. Here are five ways to make sure you've made the right pick.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 8 Best Network Monitoring Tools for 2024 🦿

The best network monitoring tools include Zabbix, Datadog, and Cacti. Compare features, pricing, and supported platforms among our top picks.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Best AI Security Tools: Top Solutions, Features & Comparisons 🦿

Discover the best AI security tools, with top solutions, key features, and expert comparisons to help organizations enhance their cybersecurity.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  GNU Privacy Guard 2.4.6 πŸ› 

GnuPG the GNU Privacy Guard or GPG is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🧠 Why safeguarding sensitive data is so crucial 🧠

A data breach at virtual medical provider Confidant Health lays bare the vast difference between personally identifiable information PII on the one hand and sensitive data on the other. The story began when security researcher Jeremiah Fowler discovered an unsecured database containing 5.3 terabytes of exposed data linked to Confidant Health. The company provides addiction The post Why safeguarding sensitive data is so crucial appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Vulnerabilities in Open-Source AI and ML Models πŸ–‹οΈ

A little over three dozen security vulnerabilities have been disclosed in various opensource artificial intelligence AI and machine learning ML models, some of which could lead to remote code execution and information theft. The flaws, identified in tools like ChuanhuChatGPT, Lunary, and LocalAI, have been reported as part of Protect AI's Huntr bug bounty platform. The most severe of the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New LightSpy Spyware Targets iOS with Enhanced Capabilities πŸ“”

ThreatFabric researchers have discovered significant updates to the LightSpy spyware, featuring plugins designed to interfere with device functionality.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chenlun’s Evolving Phishing Tactics Target Trusted Brands πŸ“”

The phishing campaign targeted users via texts impersonating Amazon, linked to the threat actor Chenlun.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Law Enforcement Operation Takes Down Redline and Meta Infostealers πŸ“”

Operation Magnus took down infrastructure used to run the Redline and Meta infostealers, widely used tools in cybercriminal activities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NIS2 Compliance Puts Strain on Business Budgets πŸ“”

A Veeam report found that businesses are prioritizing NIS2 compliance, with 95 of applicable firms diverting funds from other areas of the business.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Ransomware Vulnerability Matrix: A Comprehensive Resource for Cybersecurity Analysts πŸ¦…

Overview  The Ransomware Vulnerability Matrix, a vital repository on GitHub, represents a new step forward in understanding ransomware vulnerabilities. This invaluable repository catalogs known Common Vulnerabilities and Exposures CVEs that ransomware groups exploit, providing insights into ransomware types, vulnerable technologies, and the threat actors involved, including ransomware gangs, affiliates, and statebacked actors.  The Ransomware Vulnerability Matrix serves as a critical resource for cybersecurity professionals tasked with prioritizing threats and assessing exposure to ransomware vulnerabilities. Each entry within the matrix details the specific ransomware gang that exploited a particular CVE, links to verification sources, and includes crucial data about the affect...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Recurring Windows Flaw Could Expose User Credentials πŸ•΅οΈβ€β™‚οΈ

Now a zeroday, the vulnerability enables NTLM hash theft, an issue that Microsoft has already fixed twice before.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ China's 'Evasive Panda' APT Debuts High-End Cloud Hijacking πŸ•΅οΈβ€β™‚οΈ

A professionalgrade tool set, appropriately dubbed "CloudScout," is infiltrating cloud apps like Microsoft Outlook and Google Drive, targeting sensitive info for exfiltration.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ 800,000 users exposed in Landmark Admin data breach πŸ“’

The hack is just the latest third party attack on an insurance firm, with attackers stealing huge amounts of personal data.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ UK organizations scrambling to divert funds for NIS2 compliance spending πŸ“’

A survey shows that companies are investing in cybersecurity, though they're having to divert funds from elsewhere.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ β€œYou must do better”: Information Commissioner John Edwards calls on firms to beef up support for data breach victims πŸ“’

Companies need to treat victims with swift, practical action, according to the ICO.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Kaseya launches Kaseya 365 User subscription, acquires SaaS Alerts πŸ“’

MSPs can access SaaS application monitoring and protection technology for free as part of the new subscription.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'CrossBarking' Attack Targets Secret APIs, Exposes Opera Browser Users πŸ•΅οΈβ€β™‚οΈ

Using a malicious Chrome extension, researchers showed how an attacker could inject custom code into a victim's Opera browser to exploit special and powerful APIs, used by developers and typically saved for only the most trusted sites.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Master IT Fundamentals With This CompTIA Certification Prep Bundle 🦿

Prepare for a successful IT career with lifetime access to expertled courses covering CompTIA A, Network, Security, and Cloud certification prep.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Best Antivirus Software for Small Businesses in 2024 🦿

Bitdefender is our overall pick for the best antivirus software for small businesses, while Norton offers 247 support, and ESET provides scalability.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity