πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.2K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Five ways cyber criminals target healthcare and how to stop them πŸ“’

Medical institutions are among the top targets for threat actors, here five major threats facing the healthcare sector and what organizations can do to stay secure.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ“’ Google’s Big Sleep AI model just found a zero-day vulnerability in the wild β€” but don’t hold your breath for game-changing AI bug hunting tools any time soon πŸ“’

Google clarified it was the first undiscovered memory safety bug to be flagged by an AI agent, touting this as a significant step in using AI for vulnerability research.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Schneider Electric confirms breach after hacker claims to have 40GB of stolen data πŸ“’

A hacker claimed to have stolen 400,000 rows of user data from Schneider Electric and took to social media to taunt the French multinational.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ Docusign API Abused in Widescale, Novel Invoice Attack πŸ•΅οΈβ€β™‚οΈ

Attackers are exploiting the "Envelopes create API" of the enormously popular documentsigning service to flood corporate inboxes with convincing phishing emails aimed at defrauding organizations. It's an unusual attack vector with a high success rate.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Oh, the Humanity! How to Make Humans Part of Cybersecurity Design πŸ•΅οΈβ€β™‚οΈ

Government and industry want to jumpstart the conversation around "humancentric cybersecurity" to boost the usability and effectiveness of security products and services.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How to Win at Cyber by Influencing People πŸ•΅οΈβ€β™‚οΈ

Zero trust is a mature approach that will improve your organization's security.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dark Reading Confidential: Quantum Has Landed, So Now What? πŸ•΅οΈβ€β™‚οΈ

Episode 4 NIST's new postquantum cryptography standards are here, so what comes next? This episode of Dark Reading Confidential digs the world of quantum computing from a cybersecurity practitioner's point of view with guests Matthew McFadden, vice president, Cyber, General Dynamics Information Technology GDIT and Thomas Scanlon, professor, Heinz College, Carnegie Mellon University.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ On Election Day, Disinformation Worries Security Pros the Most πŸ•΅οΈβ€β™‚οΈ

A Dark Reading poll reveals widespread concern over disinformation about election integrity and voter fraud, even as Russia steps up deepfake attacks meant to sow distrust in the voting process among the electorate.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 VMware Explore Barcelona 2024: Tanzu Platform 10 Enters General Availability 🦿

About a year after Broadcoms acquisition of VMware, the company released VMware Tanzu Data Services to make connections to some thirdparty data engines easier.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 The 7 Best Encryption Software Choices for 2024 🦿

This is a comprehensive list of the best encryption software and tools, covering their features, pricing and more. Use this guide to determine your best fit.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 NordVPN vs ExpressVPN: Which VPN Should You Choose? 🦿

NordVPN or ExpressVPN? Read this indepth comparison to find out which VPN provider comes out on top in terms of features, security, speed, and more.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Scapy Packet Manipulation Tool 2.6.1 πŸ› 

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used such as variables, loops, and functions. Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arpsk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Skills shortage directly tied to financial loss in data breaches 🧠

The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBMs 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2 increase from the previous year. And thats expensive. This skills deficit adds an average of 1.76 million in The post Skills shortage directly tied to financial loss in data breaches appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers πŸ–‹οΈ

Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions. "ToxicPanda's main goal is to initiate money transfers from compromised devices via account takeover ATO using a wellknown technique called ondevice fraud ODF," Cleafy researchers Michele Roviello, Alessandro Strino.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ Leveraging Wazuh for Zero Trust security πŸ–‹οΈ

Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously analyzing and validating access requests. Contrary to perimeterbased security, users within an environment are not automatically trusted upon gaining access. Zero Trust security encourages continuous monitoring of every device and user, which ensures sustained protection after.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ToxicPanda Malware Targets Banking Apps on Android Devices πŸ“”

ToxicPanda malware targets banking apps on Android, spreading through Italy, Portugal and Spain.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Voters Urged to Use Official Sources for Election Information πŸ“”

A joint US government advisory warned about increasing foreign influence efforts designed to undermine the legitimacy of the Presidential Election.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Pakistani Hackers Targeted High-Profile Indian Entities using Custom RAT πŸ“”

APT36 evolved its remote access trojan, ElizaRAT, along with introducing a new stealer payload called ApoloStealer.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Oasis Fans Losing Up to Β£1000 Each to Ticket Scammers πŸ“”

Lloyds Bank has revealed that Oasis fans comprise the vast majority of ticket scam victims it deals with.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Cybersecurity and Influence Operations Threaten Integrity of U.S. Elections, Warns FBI, CISA, and ODNI πŸ¦…

As the U.S. Elections nears, Russia and Iran intensify influence operations, spreading disinformation to undermine trust in the election process, particularly in swing states.

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Critical Vulnerabilities in PTZ Cameras: CISA Adds New Exploits to Its Catalog πŸ¦…

CISA added two critical vulnerabilities CVE20248956 CVE20248957 in PTZ cameras to its KEV Catalog, exposing systems to OS command injections and authentication bypass.

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1πŸ‘1