πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations πŸ–‹οΈ

The U.S. Department of Justice DoJ on Thursday indicted two North Korean nationals, a Mexican national, and two of its own citizens for their alleged involvement in the ongoing fraudulent information technology IT worker scheme that seeks to generate revenue for the Democratic People's Republic of Korea DPRK in violation of international sanctions. The action targets Jin SungIl , Pak.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How to enable M365 Copilot for your organisation πŸ“’

Maximising the value of technology in an evolving defence sector.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are using Microsoft Teams to conduct β€œemail bombing” attacks πŸ“’

Experts told ITPro that tactics like this are on the rise, and employees must be trained effectively.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISOs are gaining more influence in the boardroom, and it’s about time πŸ“’

CISO influence in the Csuite and boardrooms is growing, new research shows, as enterprises focus heavily on cybersecurity capabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 2025 State of SaaS Backup and Recovery Report πŸ–‹οΈ

The modern workplace has undergone a seismic transformation over recent years, with hybrid work becoming the norm and businesses rapidly adopting cloudbased SoftwareasaService SaaS applications to facilitate it. SaaS applications like Microsoft 365 and Google Workspace have now become the backbone of business operations, enabling seamless collaboration and productivity. However, this.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russian Scammers Target Crypto Influencers with Infostealers πŸ“”

Crazy Evil, a group of crypto scammers, exploit NFTs and cryptocurrencies with malware targeting influencers and tech professionals.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” North Korean IT Workers Holding Data Hostage for Extortion, FBI Warns πŸ“”

A new FBI advisory warned that North Korean IT worker schemes have escalated their activities in recent months to include data extortion.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ UK businesses patchy at complying with data privacy rules πŸ“’

Companies need clear and welldefined data privacy strategies.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ Strengthening Our National Security in the AI Era πŸ•΅οΈβ€β™‚οΈ

For the first time in a long while, the federal government and the software sector alike finally have the tools and resources needed to do security well consistently and costeffectively.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 How cyberattacks on grocery stores could threaten food security 🧠

Grocery store shoppers at many chains recently ran into an unwelcome surprise empty shelves and delayed prescriptions. In early November, Ahold Delhaize USA was the victim of a cyberattack that significantly disrupted operations at more than 2,000 stores, including Hannaford, Food Lion and Stop and Shop. Specific details of the nature of the attack have The post How cyberattacks on grocery stores could threaten food security appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations πŸ–‹οΈ

A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network. The 119 vulnerabilities, assigned 97 unique CVE identifiers, span seven LTE implementations Open5GS, Magma, OpenAirInterface, Athonet, SDCore, NextEPC,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AWS Announces Β£5m Grant for Cyber Education in the UK πŸ“”

Amazon Web Services has launched its Cyber Education Grant Program in the UK.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Unlocking Vulnrichment: Enhancing CVE Data for Smarter Vulnerability Management πŸ¦…

Overview  The Cybersecurity and Infrastructure Security Agency CISA has introduced Vulnrichment, an innovative initiative designed to enhance CVE data by adding crucial context, scoring, and detailed analysis. Launched on May 10, 2024, Vulnrichment aims to empower security professionals by providing more than just basic CVE informationit offers the insights needed to make informed, timely decisions regarding vulnerability management.   As part of a midyear update, CISA's Tod Beardsley, Vulnerability Response Section Chief, provides an overview of how this resource can be leveraged to improve vulnerability management.  For IT defenders and vulnerability management teams, Vulnrichment represents a significant advancement in how CVE data is presented and utilized. By enriching basi...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Anatomy of an Exploit Chain: CISA, FBI Detail Ivanti CSA Attacks πŸ¦…

Threat actors chained together four vulnerabilities in Ivanti Cloud Service Appliances CSA in confirmed attacks on multiple organizations in September, according to an advisory released this week by the FBI and the U.S. Cybersecurity and Infrastructure Security Agency CISA.  The agencies urged users to upgrade to the latest supported version of Ivanti CSA, and to conduct threat hunting on networks using recommended detection techniques and Indicators of Compromise IoCs.  The January 22 advisory builds on October 2024 advisories from CISA and Ivanti and offers new information on the ways threat actors can chain together vulnerabilities in an attack. The four vulnerabilities were exploited as zero days, leading some to suspect sophisticated nationstate threat actors, possibly linked...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ten ways Microsoft Copilot will change the way you work πŸ“’

Maximising the value of technology in an evolving defence sector.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Integrating Copilot With CDW πŸ“’

Maximising the value of technology in an evolving defence sector.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Compliant security with CDW πŸ“’

Maximising the value of technology in an evolving defence sector.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Protect your organization with Microsoft 365 πŸ“’

Maximising the value of technology in an evolving defence sector.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Are successful deepfake scams more common than we realize? 🧠

Many times a day worldwide, a boss asks one of their team members to perform a task during a video call. But is the person assigning tasks actually who they say they are? Or is it a deepfake? Instead of blindly following orders, employees must now ask themselves if they are becoming a victims of The post Are successful deepfake scams more common than we realize? appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ DoJ Busts Up Another Multinational DPRK IT Worker Scam πŸ•΅οΈβ€β™‚οΈ

A departmentwide initiative has now led to five major law enforcement actions, in an attempt to curb the increasingly common trend of North Korean hackers posing as IT job applicants.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ MITRE's Latest ATT&CK Simulations Tackles Cloud Defenses πŸ•΅οΈβ€β™‚οΈ

The MITRE framework's applied exercise provides defenders with critical feedback about how to detect and defend against common, but sophisticated, attacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity