πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ RSAC in focus: Quantum computing and security πŸ“’

Experts at RSAC 2025 emphasize the need for urgent action to secure data against future cryptographic risks posed by quantum computing.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus πŸ“”

Nessus users should update patches as soon as possible.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: Key takeaways for CISOs πŸ“’

The RSAC Conference 2025 spotlighted pivotal advancements in agentic AI, identity security, and collaborative defense strategies, shaping the evolving mandate for CISOs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Threat Actors Target Victims with HijackLoader and DeerStealer πŸ“”

Cyberattacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Scaling Beyond Borders: Establishing a Global Footprint 🦿

In 2025, amid the changing economic landscape, your business is more important than ever. You have customers to serve, revenue opportunities to capture, and an internal culture to foster. Success breeds opportunity and, while your leadership and board are all happy, they are challenging you to find new opportunities beyond US markets. A domestic footprint ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: Key takeaways for CISOs πŸ“’

The RSAC Conference 2025 spotlighted pivotal advancements in agentic AI, identity security, and collaborative defense strategies, shaping the evolving mandate for CISOs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: Quantum computing and security πŸ“’

Experts at RSAC 2025 emphasize the need for urgent action to secure data against future cryptographic risks posed by quantum computing.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: How AI is improving cybersecurity πŸ“’

AI is revolutionizing cybersecurity by enhancing threat detection, automating defenses, and letting IT professionals tackle evolving digital challenges.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: Collaboration in cybersecurity πŸ“’

Experts at RSA Conference 2025 emphasised that collaboration across sectors and shared intelligence are pivotal to addressing the evolving challenges of cybersecurity.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: Considerations and possibilities for the remainder of 2025 πŸ“’

As 2025 unfolds, RSAC explores the pivotal considerations and emerging possibilities shaping the cybersecurity landscape.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ European Commission calls for cyber security proposals πŸ“’

With a special focus on healthcare, the Commission is looking to allocate 145.5 million.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Malicious Chimera Turns Larcenous on Python Package Index πŸ•΅οΈβ€β™‚οΈ

Unlike typical datastealing malware, this attack tool targets data specific to corporate and cloud infrastructures in order to execute supply chain attacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Anubis Ransomware-as-a-Service Kit Adds Data Wiper πŸ•΅οΈβ€β™‚οΈ

The threat of wiping files and servers clean gives Anubis affiliates yet another way to leverage ransomware victims who may be hesitant to pay to get their data back, Trend Micro said.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Washington Post Staffer Emails Targeted in Cyber Breach πŸ•΅οΈβ€β™‚οΈ

Journalists' Microsoft accounts were breached, which would have given attackers access to emails of staff reporters covering national security, economic policy, and China.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'Water Curse' Targets Infosec Pros via Poisoned GitHub Repositories πŸ•΅οΈβ€β™‚οΈ

The emerging threat group attacks the supply chain via weaponized repositories posing as legitimate pentesting suites and other tools that are poisoned with malware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Security Is Only as Strong as the Weakest Third-Party Link πŸ•΅οΈβ€β™‚οΈ

Thirdparty risks are increasing dramatically, requiring CISOs to evolve from periodic assessments to continuous monitoring and treating partner vulnerabilities as their own to enhance organizational resilience.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ NIST Outlines Real-World Zero-Trust Examples πŸ•΅οΈβ€β™‚οΈ

SP 180035 offers 19 examples of how to implement zerotrust architecture ZTA using offtheshelf commercial technologies.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network πŸ–‹οΈ

The U.S. Department of Justice DoJ said it has filed a civil forfeiture complaint in federal court that targets over 7.74 million in cryptocurrency, nonfungible tokens NFTs, and other digital assets allegedly linked to a global IT worker scheme orchestrated by North Korea. "For years, North Korea has exploited global remote IT contracting and cryptocurrency ecosystems to evade U.S.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment πŸ–‹οΈ

An emerging ransomware strain has been discovered incorporating capabilities to encrypt files as well as permanently erase them, a development that has been described as a "rare dualthreat." "The ransomware features a 'wipe mode,' which permanently erases files, rendering recovery impossible even if the ransom is paid," Trend Micro researchers Maristel Policarpio, Sarah Pearl Camiling, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More πŸ–‹οΈ

Some of the biggest security problems start quietly. No alerts. No warnings. Just small actions that seem normal but aren't. Attackers now know how to stay hidden by blending in, and that makes it hard to tell when somethings wrong. This weeks stories arent just about what was attackedbut how easily it happened. If were only looking for the obvious signs, what are we missing right in front.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Playbook: Transforming Your Cybersecurity Practice Into An MRR Machine πŸ–‹οΈ

Introduction The cybersecurity landscape is evolving rapidly, and so are the cyber needs of organizations worldwide. While businesses face mounting pressure from regulators, insurers, and rising threats, many still treat cybersecurity as an afterthought. As a result, providers may struggle to move beyond tactical services like oneoff assessments or compliance checklists, and demonstrate.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity