๐ The finest daily news on cybersecurity and privacy. ๐ Daily releases. ๐ป Is your online life secure? ๐ฉ lalilolalo.dev@gmail.com
๐ Microsoft Thwarts $4bn in Fraud Attempts ๐Microsoft has blocked fraud worth 4bn as threat actors ramp up AI use.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Android Phones Pre-Downloaded With Malware Target User Crypto Wallets ๐ต๏ธโโ๏ธThe threat actors lace predownloaded applications with malware to steal cryptocurrency by covertly swapping users' wallet addresses with their own.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Android Phones Pre-Downloaded With Malware Target User Crypto Wallets ๐ต๏ธโโ๏ธThe threat actors lace predownloaded applications with malware to steal cryptocurrency by covertly swapping users' wallet addresses with their own.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Cybersecurity by Design: When Humans Meet Technology ๐ต๏ธโโ๏ธIf security tools are challenging to use, people will look for workarounds to get around the restrictions.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ CISA Throws Lifeline to CVE Program with Last-Minute Contract Extension ๐MITRE will be able to keep running the CVE program for at least the next 11 months.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ CISA Throws Lifeline to CVE Program with Last-Minute Contract Extension ๐MITRE will be able to keep running the CVE program for at least the next 11 months.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Middle East, North Africa Security Spending to Top $3B ๐ต๏ธโโ๏ธGartner projects IT security spending in the MENA region will continue to increase in 2025, with security services accounting for the most growth.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ Identity Attacks Now Comprise a Third of Intrusions ๐IBM warns of infostealer surge as attackers automate credential theft and adopt AI to generate highly convincing phishing emails en masse.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ CISA Throws Lifeline to CVE Program with Last-Minute Contract Extension ๐MITRE will be able to keep running the CVE program for at least the next 11 months.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Android Phones Pre-Downloaded With Malware Target User Crypto Wallets ๐ต๏ธโโ๏ธThe threat actors lace predownloaded applications with malware to steal cryptocurrency by covertly swapping users' wallet addresses with their own.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Dogged by Trump, Chris Krebs Resigns From SentinelOne ๐ต๏ธโโ๏ธThe president revoked the former CISA director's security clearance, half a decade after Krebs challenged rightwing election disinformation, prompting his eventual resignation.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Cybersecurity by Design: When Humans Meet Technology ๐ต๏ธโโ๏ธIf security tools are challenging to use, people will look for workarounds to get around the restrictions.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ Microsoft Thwarts $4bn in Fraud Attempts ๐Microsoft has blocked fraud worth 4bn as threat actors ramp up AI use.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ Senators Urge Cyber-Threat Sharing Law Extension Before Deadline ๐Bipartisan support grows in Congress to extend Cybersecurity Information Sharing Act for 10 years.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Dogged by Trump, Chris Krebs Resigns From SentinelOne ๐ต๏ธโโ๏ธThe president revoked the former CISA director's security clearance, half a decade after Krebs challenged rightwing election disinformation, prompting his eventual resignation.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ Network Edge Devices the Biggest Entry Point for Attacks on SMBs ๐Sophos found that compromise of network edge devices, such as VPN appliances, accounted for 30 of incidents impacted SMBs in 2024.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Dogged by Trump, Chris Krebs Resigns From SentinelOne ๐ต๏ธโโ๏ธThe president revoked the former CISA director's security clearance, half a decade after Krebs challenged rightwing election disinformation, prompting his eventual resignation.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ Microsoft Thwarts $4bn in Fraud Attempts ๐Microsoft has blocked fraud worth 4bn as threat actors ramp up AI use.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ CVE Program Cuts Send the Cyber Sector Into Panic Mode ๐ต๏ธโโ๏ธAfter threatening to slash support for the CVE program, CISA threw MITRE a lifeline at the last minute extending its government contract for another 11 months. After that, it looks like it's up to the private sector to find the cash to keep it going.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution ๐๏ธA critical security vulnerability has been disclosed in the ErlangOpen Telecom Platform OTP SSH implementation that could permit an attacker to execute arbitrary code sans any authentication under certain conditions. The vulnerability, tracked as CVE202532433, has been given the maximum CVSS score of 10.0. "The vulnerability allows an attacker with network access to an ErlangOTP SSH.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Middle East, North Africa Security Spending to Top $3B ๐ต๏ธโโ๏ธGartner projects IT security spending in the MENA region will continue to increase in 2025, with security services accounting for the most growth.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Cybersecurity by Design: When Humans Meet Technology ๐ต๏ธโโ๏ธIf security tools are challenging to use, people will look for workarounds to get around the restrictions.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ Identity Attacks Now Comprise a Third of Intrusions ๐IBM warns of infostealer surge as attackers automate credential theft and adopt AI to generate highly convincing phishing emails en masse.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ CVE Program Cuts Send the Cyber Sector Into Panic Mode ๐ต๏ธโโ๏ธAfter threatening to slash support for the CVE program, CISA threw MITRE a lifeline at the last minute extending its government contract for another 11 months. After that, it looks like it's up to the private sector to find the cash to keep it going.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ Microsoft Thwarts $4bn in Fraud Attempts ๐Microsoft has blocked fraud worth 4bn as threat actors ramp up AI use.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ Cybersecurity by Design: When Humans Meet Technology ๐ต๏ธโโ๏ธIf security tools are challenging to use, people will look for workarounds to get around the restrictions.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐ต๏ธโโ๏ธ CVE Program Cuts Send the Cyber Sector Into Panic Mode ๐ต๏ธโโ๏ธAfter threatening to slash support for the CVE program, CISA threw MITRE a lifeline at the last minute extending its government contract for another 11 months. After that, it looks like it's up to the private sector to find the cash to keep it going.
๐ Read more.
๐ Via "Dark Reading"
----------
๐๏ธ Seen on @cibsecurity
๐๏ธ Artificial Intelligence โ What's all the fuss? ๐๏ธTalking about AI Definitions Artificial Intelligence AI AI refers to the simulation of human intelligence in machines, enabling them to perform tasks that typically require human intelligence, such as decisionmaking and problemsolving. AI is the broadest concept in this field, encompassing various technologies and methodologies, including Machine Learning ML and Deep Learning. Machine.
๐ Read more.
๐ Via "The Hacker News"
----------
๐๏ธ Seen on @cibsecurity
๐ Senators Urge Cyber-Threat Sharing Law Extension Before Deadline ๐Bipartisan support grows in Congress to extend Cybersecurity Information Sharing Act for 10 years.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity
๐ Microsoft Thwarts $4bn in Fraud Attempts ๐Microsoft has blocked fraud worth 4bn as threat actors ramp up AI use.
๐ Read more.
๐ Via "Infosecurity Magazine"
----------
๐๏ธ Seen on @cibsecurity