πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ UK organizations scrambling to divert funds for NIS2 compliance spending πŸ“’

A survey shows that companies are investing in cybersecurity, though they're having to divert funds from elsewhere.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ β€œYou must do better”: Information Commissioner John Edwards calls on firms to beef up support for data breach victims πŸ“’

Companies need to treat victims with swift, practical action, according to the ICO.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Kaseya launches Kaseya 365 User subscription, acquires SaaS Alerts πŸ“’

MSPs can access SaaS application monitoring and protection technology for free as part of the new subscription.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'CrossBarking' Attack Targets Secret APIs, Exposes Opera Browser Users πŸ•΅οΈβ€β™‚οΈ

Using a malicious Chrome extension, researchers showed how an attacker could inject custom code into a victim's Opera browser to exploit special and powerful APIs, used by developers and typically saved for only the most trusted sites.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Master IT Fundamentals With This CompTIA Certification Prep Bundle 🦿

Prepare for a successful IT career with lifetime access to expertled courses covering CompTIA A, Network, Security, and Cloud certification prep.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Best Antivirus Software for Small Businesses in 2024 🦿

Bitdefender is our overall pick for the best antivirus software for small businesses, while Norton offers 247 support, and ESET provides scalability.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Everything You Need to Know about the Malvertising Cybersecurity Threat 🦿

Malvertising is a shortened mashup of malicious advertising. In a nutshell, malvertising is a relatively new cyberattack method in which bad actors inject malicious code into digital ads. These malicious ads are difficult to detect, and are served to internet users using legitimate advertising networks and publishing platforms, such as the Google Search Network. Because ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Change Healthcare Breach Hits 100M Americans β™ŸοΈ

Change Healthcare says it has notified approximately 100 million Americans that their personal, financial and healthcare records may have been stolen in a February 2024 ransomware attack that caused the largest ever known data breach of protected health information.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Cybersecurity Awareness Month: 5 new AI skills cyber pros need 🧠

The rapid integration of artificial intelligence AI across industries, including cybersecurity, has sparked a sense of urgency among professionals. As organizations increasingly adopt AI tools to bolster security defenses, cyber professionals now face a pivotal question What new skills do I need to stay relevant? October is Cybersecurity Awareness Month, which makes it the perfect The post Cybersecurity Awareness Month 5 new AI skills cyber pros need appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Python Package Targeting Crypto Wallets with Malicious Code πŸ–‹οΈ

Cybersecurity researchers have discovered a new malicious Python package that masquerades as a cryptocurrency trading tool but harbors functionality designed to steal sensitive data and drain assets from victims' crypto wallets. The package, named "CryptoAITools," is said to have been distributed via both Python Package Index PyPI and bogus GitHub repositories. It was downloaded over 1,300.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Embarking on a Compliance Journey? Here’s How Intruder Can Help πŸ–‹οΈ

Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be daunting. Luckily, Intruder simplifies the process by helping you address the key vulnerability management criteria these frameworks demand, making your compliance journey much smoother. Read on to understand how to meet the requirements of each framework to keep your customer data safe. How Intruder.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘½ Trump and Vance Phones Among Alleged Targets of Chinese Hackers πŸ‘½

In a shocking cyber revelation, Chinese hackers are suspected of targeting cellphones belonging to former President Donald Trump and his 2024 running mate, Senator JD Vance. According to informed sources, the TrumpVance campaign was alerted that both Trump and Vance may be among several individuals whose phone numbers were allegedly.

πŸ“– Read more.

πŸ”— Via "BE3SEC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over Half of US County Websites β€œCould Be Spoofed” πŸ“”

Comparitech warns that voters could be misled as most local government sites are failing on basic security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Midnight Blizzard Spearphishing Campaign Targets Thousands with RDP Files πŸ“”

Microsoft has spotted a major spearphishing campaign from the Russian APT29 group using RDP for compromise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Strela Stealer targets Central and Southwestern Europe through Stealthy Execution via WebDAV πŸ¦…

Key Takeaways The recent Strela Stealer phishing campaign, uncovered by Cyble Research and Intelligence Labs CRIL, poses as an invoice notification to trick users into engaging with it. This campaign predominantly targets users in Central and Southwestern European regions, adjusting its focus based on locale settings to maximize its reach within specific demographics. Phishing emails carry ZIP file attachments containing heavily obfuscated JavaScript .js files, which are designed to evade detection by security tools. The JavaScript file conceals a base64encoded PowerShell command that, when executed, launches a malicious payload directly from the WebDAV server without saving the file to disk. The payload, Strela Stealer, is embedded within an obfuscated DLL file, specifical...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information πŸ–‹οΈ

A nowpatched security flaw in the Opera web browser could have enabled a malicious extension to gain unauthorized, full access to private APIs. The attack, codenamed CrossBarking, could have made it possible to conduct actions such as capturing screenshots, modifying browser settings, and account hijacking, Guardio Labs said. To demonstrate the issue, the company said it managed to publish a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malvertising Campaign Hijacks Facebook Accounts to Spread SYS01stealer Malware πŸ–‹οΈ

Cybersecurity researchers have uncovered an ongoing malvertising campaign that abuses Meta's advertising platform and hijacked Facebook accounts to distribute information known as SYS01stealer. "The hackers behind the campaign use trusted brands to expand their reach," Bitdefender Labs said in a report shared with The Hacker News. "The malvertising campaign leverages nearly a hundred malicious.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Launches First International Cybersecurity Plan πŸ“”

CISAs 20252026 International Strategic Plan aims to strengthen external partnerships to reduce risks to critical infrastructure relied on in the US.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ When Cybersecurity Tools Backfire πŸ•΅οΈβ€β™‚οΈ

Outages are inevitable. Our focus should be on minimizing their scope, addressing underlying causes, and understanding that protecting systems is about keeping bad actors out while maintaining stability and reliability.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The role of multi-cloud in improving security πŸ“’

The benefits of a multicloud approach can only be fully enjoyed with proper oversight of ones data and a clear plan for disaster recovery.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity Training Resources Often Limited to Developers πŸ•΅οΈβ€β™‚οΈ

With a lack of cybersecurity awareness training resources for all employees, organizations are more susceptible to being breached or falling short when it comes to preventing threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity