πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Subaru Bug Enabled Remote Vehicle Tracking and Hijacking πŸ“”

A nowpatched vulnerability could have enabled threat actors to remotely control Subaru cars.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ UnitedHealth reveals 190 million US citizens were impacted by the Change Healthcare breach πŸ“’

UnitedHealth has confirmed that 190 million US citizens were affected by the Change Healthcare cyber attack in 2024.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Developers can't get a handle on application security risks πŸ“’

Research by Legit Security shows a majority of organizations have high risk applications in developer environments.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 1Password Review: Features, Pricing & Security 🦿

1Passwords toptier security and sleek user interface make it a solid password manager to try this year. Read our handson 1Password review to learn more.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January] πŸ–‹οΈ

Welcome to your weekly cybersecurity scoop! Ever thought about how the same AI meant to protect our hospitals could also compromise them? This week, were breaking down the sophisticated world of AIdriven threats, key updates in regulations, and some urgent vulnerabilities in healthcare tech that need our attention. As we unpack these complex topics, we'll equip you with sharp insights to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Do We Really Need The OWASP NHI Top 10? πŸ–‹οΈ

The Open Web Application Security Project has recently introduced a new Top 10 project the NonHuman Identity NHI Top 10. For years, OWASP has provided security professionals and developers with essential guidance and actionable frameworks through its Top 10 projects, including the widely used API and Web Application security lists.  Nonhuman identity security represents an emerging.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISOs Boost Crisis Simulation Budgets Amid High-Profile Cyber-Attacks πŸ“”

74 of CISOs plan to increase their cyber crisis simulation budgets in 2025.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… United Against Cybercrime: ASEAN Ministers Forge New Security Pathways πŸ¦…

Overview The digital world in Southeast Asia is evolving rapidly, with nations striving to balance innovation, inclusivity, and security. The recently held 5th ASEAN Digital Ministers' Meeting ADGMIN in Bangkok, Thailand, marked a significant milestone in this journey. The meeting highlighted the importance of cybersecurity in shaping a resilient digital future for the region. The ASEAN Digital Masterplan 2025 ADM 2025 continues to serve as a guiding framework for fostering collaboration, enabling trust in digital services, and promoting the safe and inclusive use of technology. From addressing online scams to operationalizing the ASEAN Regional Computer Emergency Response Team CERT and advancing AI governance, the event showcased ASEAN's commitment to fortifying its digital eco...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Phishing Campaign Targets Mobile Devices with Malicious PDFs πŸ“”

A novel phishing campaign identified by Zimperium targets mobile users with malicious PDFs, impersonating USPS to steal credentials.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SaaS Breaches Skyrocket 300% as Traditional Defenses Fall Short πŸ“”

Obsidian found that threat actors are focusing on SaaS applications to steal sensitive data, with most organizations' security measures not set up to deal with these attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Case for Proactive, Scalable Data Protection πŸ•΅οΈβ€β™‚οΈ

Whether you're facing growing data demands and increased cyber threats, or simply looking to futureproof your business, it's time to consider the longterm benefits of transitioning to a cloudfirst infrastructure.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 How secure are green data centers? Consider these 5 trends 🧠

As organizations increasingly measure environmental impact towards their sustainability goals, many are focusing on their data centers. KPMG found that the majority of the top 100 companies measure and report on their sustainability efforts. Because data centers consume a large amount of energy, Gartner predicts that by 2027, three in four organizations will have implemented The post How secure are green data centers? Consider these 5 trends appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs πŸ–‹οΈ

Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Gitrelated projects that, if successfully exploited, could permit an attacker to gain unauthorized access to a user's Git credentials. "Git implements a protocol called Git Credential Protocol to retrieve credentials from the credential helper," GMO Flatt Security researcher Ry0taK, who discovered the flaws.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Hidden Text Salting Disrupts Brand Name Detection Systems πŸ“”

A new phishing tactic has been identified by Cisco Talos, using hidden text salting to evade email security measures.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Customer Success Manager 🌊

The post Customer Success Manager appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… IT Vulnerability Report: 7-Zip, Windows and Fortinet Fixes Urged by Cyble πŸ¦…

Overview Cybles vulnerability intelligence report to clients last week examined highrisk flaws in 7Zip, Microsoft Windows, and Fortinet, among other products. It also examined dark web claims of a zeroday vulnerability in Apple iOS. In all, the report from Cyble Research and Intelligence Labs CRIL looked at 14 vulnerabilities and dark web exploits, including one vulnerability with a maximum CVSS severity score of 10.0 and another with more than 276,000 web exposures. Here are some of the vulnerabilities highlighted by Cybles vulnerability intelligence unit as meriting highpriority attention by security teams. The Top IT Vulnerabilities CVE202450603 is a 10.0severity OS Command Injection vulnerability in the Aviatrix Controller that could allow an unauthenticated user to ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Crisis Simulations: A Top 2025 Concern for CISOs πŸ•΅οΈβ€β™‚οΈ

CISOs are planning to adjust their budgets this year to reflect their growing concerns for cybersecurity preparedness in the event of a cyberattack.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Privacy-Preserving Federated Learning – Future Collaboration and Continued Research πŸͺ–

This post is the final blog in a series on privacypreserving federated learning . The series is a collaboration between NIST and the UK governments Responsible Technology Adoption Unit RTA, previously known as the Centre for Data Ethics and Innovation. Learn more and read all the posts published to date at NISTs Privacy Engineering Collaboration Space or RTAs blog . Reflections and Wider Considerations This is the final post in the series that began with reflections and learnings from the first USUK collaboration working with Privacy Enhancing Technologies PETs. Since the PETs Prize.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ•΅οΈβ€β™‚οΈ For $50, Cyberattackers Can Use GhostGPT to Write Malicious Code πŸ•΅οΈβ€β™‚οΈ

Malware writing is only one of several malicious activities for which the new, uncensored generative AI chatbot can be used.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Apple Patches Actively Exploited Zero-Day Vulnerability πŸ•΅οΈβ€β™‚οΈ

The Apple iOS 18.3 update fixes 28 other vulnerabilities identified by the tech company, though there is little information on them.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Change Healthcare Breach Impact Doubles to 190M People πŸ•΅οΈβ€β™‚οΈ

One of the largest data breaches in history was apparently twice as impactful as previously thought, with PII belonging to hundreds of millions of people sitting in the hands of cybercriminals.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1