πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Microsoft's Recall delayed once again as roll-out fiasco continues πŸ“’

The muchmaligned snapshot feature has seen a number of revisions and delays as Microsoft rushes to patch over glaring security failings.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Halloween special: Cybersecurity horror stories πŸ“’

Join us for three terrifying tales sure to chill any IT professional to the core.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
🦿 TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download 🦿

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar πŸ–‹οΈ

Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? Its a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and IT.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Warns of Chinese Botnet Exploiting Router Flaws for Credential Theft πŸ–‹οΈ

Microsoft has revealed that a Chinese threat actor it tracks as Storm0940 is leveraging a botnet called Quad7 to orchestrate highly evasive password spray attacks. The tech giant has given the botnet the name CovertNetwork1658, stating the password spray operations are used to steal credentials from multiple Microsoft customers. "Active since at least 2021, Storm0940 obtains initial access.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ–‹οΈ Microsoft Delays Windows Copilot+ Recall Release Over Privacy Concerns πŸ–‹οΈ

Microsoft is further delaying the release of its controversial Recall feature for Windows Copilot PCs, stating it's taking the time to improve the experience. The development was first reported by The Verge. The artificial intelligencepowered tool was initially slated for a preview release starting in October. "We are committed to delivering a secure and trusted experience with Recall," the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US and Israel Warn of Iranian Threat Actor’s New Tradecraft πŸ“”

US and Israeli government agencies have warned that the Iranian statesponsored threat actor Cotton Sandstorm is deploying new tradecraft to expand its operations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Developer Velocity & Security: Can You Get Out of the Way in Time? πŸ•΅οΈβ€β™‚οΈ

When a CISO can articulate risk in context to the business as a whole, development teams can better prioritize their activities.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Overlooked Importance of Identifying Riskiest Users πŸ•΅οΈβ€β™‚οΈ

"See one, teach one, do one" takes a page out of the healthcare playbook to reduce human vulnerabilities where they matter most in cybersecurity.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 What’s behind unchecked CVE proliferation, and what to do about it 🧠

The volume of Common Vulnerabilities and Exposures CVEs has reached staggering levels, placing immense pressure on organizations cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid2024, nearly 27,500 had already been identified. Meanwhile, Coalitions 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit The post Whats behind unchecked CVE proliferation, and what to do about it appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Inside Iran’s Cyber Playbook: AI, Fake Hosting, and Psychological Warfare πŸ–‹οΈ

U.S. and Israeli cybersecurity agencies have published a new advisory attributing an Iranian cyber group to targeting the 2024 Summer Olympics and compromising a French commercial dynamic display provider to show messages denouncing Israel's participation in the sporting event. The activity has been pinned on an entity that's known as Emennet Pasargad, which the agencies said has been operating.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Massive Git Config Breach Exposes 15,000 Credentials; 10,000 Private Repos Cloned πŸ–‹οΈ

Cybersecurity researchers have flagged a "massive" campaign that targets exposed Git configurations to siphon credentials, clone private repositories, and even extract cloud credentials from the source code. The activity, codenamed EMERALDWHALE, is estimated to have collected over 10,000 private repositories and stored in an Amazon S3 storage bucket belonging to a prior victim. The bucket,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 5 SaaS Misconfigurations Leading to Major Fu*%@ Ups πŸ–‹οΈ

With so many SaaS applications, a range of configuration options, API capabilities, endless integrations, and apptoapp connections, the SaaS risk possibilities are endless. Critical organizational assets and data are at risk from malicious actors, data breaches, and insider threats, which pose many challenges for security teams. Misconfigurations are silent killers, leading to major.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Warns of Critical Software Vulnerabilities in Industrial Devices πŸ“”

Multiple vulnerabilities in Rockwell Automation and Mitsubishi products could allow ICS cyberattacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ¦… IT Vulnerability Report: Fortinet, SonicWall, Grafana Exposures Top 1 Million πŸ¦…

Overview Cyble Research and Intelligence Labs CRIL researchers investigated 17 vulnerabilities and nine dark web exploits during the period of Oct. 2329, and highlighted seven vulnerabilities that merit highpriority attention from security teams. This weeks IT vulnerability report affects an unusually high number of exposed devices and instances Vulnerabilities in Fortinet, SonicWall, and Grafana Labs can be found in more than 1 million webfacing assets, and a pair of 10.0severity vulnerabilities in CyberPanel have already been massexploited in ransomware attacks. Security teams should assess which of these vulnerabilities are present in their environments and the risks they pose and apply patches and mitigations promptly. The Weeks Top IT Vulnerabilities Here are the top IT...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese APTs Cash In on Years of Edge Device Attacks πŸ•΅οΈβ€β™‚οΈ

The sophisticated Chinese cyberattacks of today rest on important groundwork laid during the pandemic and before.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical Auth Bugs Expose Smart Factory Gear to Cyberattack πŸ•΅οΈβ€β™‚οΈ

Factory automation software from Mitsubishi Electric and Rockwell Automation could be subject to remote code execution RCE, denialofservice DoS, and more.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ IT Security Centralization Makes the Use of Industrial Spies More Profitable πŸ•΅οΈβ€β™‚οΈ

As organizations centralize IT security, the risk of espionage is silently becoming a more profitable threat.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top Tech Conferences & Events to Add to Your Calendar 🦿

A great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our tech events guide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Booking.com Phishers May Leave You With Reservations β™ŸοΈ

A number of cybercriminal innovations are making it easier for scammers to cash in on your upcoming travel plans. This story examines a recent spearphishing campaign that ensued when a California hotel had its booking.com credentials stolen. We'll also explore an array of cybercrime services aimed at phishers who target hotels that rely on the world's most visited travel website.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Sophos Warns Chinese Hackers Are Becoming Stealthier πŸ“”

Sophos provided details of changing tactics by Chinese APT groups over a fiveyear period, involving a shift towards stealthy, targeted attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity