Be Cyber Aware. Our vacancies channel: @CyberSecurityJobs Our chat: t.me/cybersecuritynewschat LinkedIn: https://www.linkedin.com/company/securitynews/ Facebook: https://www.facebook.com/BreakingCyberSecNews 📩 Cooperation: @cybersecadmin
Building an Incident Response Strategy in 2024
Previously, incident response aimed to address threats at the organizational boundary.
However, as the lines between internal and external environments have blurred, strategies need to adapt, says Ridley.
“With the increasing adoption of cloud services in various business operations, the traditional concept of a well-defined perimeter has become obsolete,” he says.
Cyber_Security_Channel
Quantum Innovation: The Cybersecurity Revolution
SmartBrief: What strategic advantages do you see quantum innovation providing, particularly in addressing emerging threats and vulnerabilities?
Cyber_Security_Channel
📩 CyberWeekly by Hacklido — Issue №4; 22nd of June, 2024
Today, we would like to share the current Issue of the CyberWeekly Newsletter from our partners, Hacklido.
This time, you will be able to delve into the topics such as:
• TOR
• Kali Linux
• Kaspersky ban
• Major breaches
• LSASS decryption
• Cutting-edge tools
• Nmap port scanning
• VDPS for career launch
• Anonymity with ProxyChains
Bonus note: improved news section.
Along with more up-to-date news inside...
The full version can be found here.
-----
→ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin
-----
@Cyber_Security_Channel
📩 CyberWeekly by Hacklido — Issue №3; 15th of June, 2024
Please welcome the most recent Issue of the CyberWeekly Newsletter from our partners — Hacklido.
This time, you will be able to explore the following areas:
• The Mask APT
• JavaScript for hackers
• GitHub phishing & extorsions
• NTLM deprecation by Microsoft 2024
And more hidden gems inside...
Find the full text here.
-----
→ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin
-----
@Cyber_Security_Channel
Ascension Hospitals Breach Caused by Employee Downloading Malicious File
The X post said, “We detected unusual activity on select technology network systems, which we now believe is due to a cybersecurity event.
Our care teams have initiated procedures to ensure patient care delivery continues to be safe and as minimally impacted as possible,” the post said.
Cyber_Security_Channel
🔥 Scanning Networks – Pro Guide for Cybersecurity Specialists
→ Our partners at Hacklido are offering a revamped version of their bestselling digital product!
More material, the same price!
Making Choices for Stronger Vulnerability Management
Through our honeypot data and view into our cyber insurance policyholders' attack surfaces, security tools, and workflows, Coalition has identified the key technology choices that place businesses at risk — as well as the choices that are proving most effective.
Cyber_Security_Channel
Ransomware Attack Disrupts Operations Across London Hospitals
The UK National Health Service (NHS) also weighed in with a statement on Tuesday, noting that the incident forced hospitals to "prioritize" urgent work.
Emergency services across the UK continued to be available as usual, and the NHS directed patients to attend scheduled appointments unless informed otherwise.
Cyber_Security_Channel
📩 CyberWeekly by Hacklido — Issue №2; 8th of June, 2024
Not much time has passed since we shared the first Issue of the CyberWeekly Newsletter from our partners at Hacklido.
A couple of days ago, they already published the second Issue from this helpful project.
It includes insights on the following topics:
• Mentorship in CTF
• Intel/AMD CPU internals
• Python for hackers — 10 projects
• Windows 11 TotalRecall dump tool
• Android Binder CVE — 2023-20938
• Finding your purpose in cybersecurity
And a lot more inside...
The full version can be found here.
-----
→ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin
Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack
This consisted of a Golang-based backdoor codenamed BRICKSTORM.
They were present within the rogue VMs and two web shells referred to as BEEFLUSH and BUSHWALK, allowing UNC5221 to execute arbitrary commands and communicate with command-and-control servers.
📷 Image Credit: The Hacker News
Cyber_Security_Channel
This New Hacker Group is Targeting Software Developers With Phony Job Offers and Fake Projects
Microsoft said the group is backed by North Korea.
When it was first spotted, there was a lot of overlap between Moonstone Sleet and other North Korea-backed hacking groups.
Since then it has shifted to its bespoke infrastructure and attacks.
Cyber_Security_Channel
Attackers Target Check Point VPNs to Access Corporate Networks
They're also useful for malicious purposes. Rather than having to, say, exploit a publicly facing server, or a zero-day vulnerability, a hacker could use a remote access VPN for clean, unfettered access to an organization's IT environment.
From there, they could begin establishing persistence, probing for vulnerabilities, and much more.
How, though, do they get access to that VPN connection in the first place?
Cyber_Security_Channel
International Malware Takedown Seized 100+ Servers
Between May 27 and May 29, police arrested four people, seized more than 100 servers and took control of more than 2,000 domains.
Arrests were made in Ukraine and Armenia, and servers were taken down or disrupted in Bulgaria, Canada, Germany, Lithuania, the Netherlands, Romania, Switzerland, the United Kingdom and the United States.
Cyber_Security_Channel
ℹ️📸 Cyber Security News as a Media Partner for Conferences and Events!
It has been an honour to serve as the official Media Partner and Exhibitor of the Cybersec Europe 2024 Conference in Brussels, Belgium (29th-30th of May, 2024).
From speaker announcements and exclusive content to live coverage and booth materials, it has been a truly productive and mutually beneficial partnership.
Our team hopes that you enjoyed all the content around the Conference and found it interesting!
Thank you to everyone who made this collaboration happen!
P.S. Case Study about our work with Cybersec Europe 2024 is coming soon...
-----
🌐 Would you like Cyber Security News to become a Media Partner of your Conference/Event?
📩 Contact us to discuss the details → @cybersecadmin
-----
@Cyber_Security_Channel
🤝 High-end Networking Service at the Cybersec Europe 2024 Conference
Throughout the convention, the Brussels Expo venue was equipped with a 'VIP Lounge' and the 'First Class Lounge', providing optimum spots for meetings and communication arrangements with other attendees.
In addition to the unqiue features such as noise isolation, both areas contained a wide selection of snacks and drinks for guests to enjoy during breaktimes.
@Cyber_Security_Channel
Apple AirPods Bug Allows Eavesdropping
"When your headphones are seeking a connection request to one of your previously paired devices, an attacker in Bluetooth range might be able to spoof the intended source device and gain access to your headphones," reported Apple in an advisory.
Cyber_Security_Channel
Google Software Engineers Can Take A Nap While Software Solves Problems
"We hope in the future this can close some of the blind spots of current automated vulnerability discovery approaches, and enable automated detection of 'unfuzzable' vulnerabilities," Google Project Zero software engineers Sergei Glazunov and Mark Brand wrote in a post.
Cyber_Security_Channel
Measure Success: Key Cybersecurity Resilience Metrics
Strengthening a company’s cyber resilience is an ongoing exercise as attackers launch more sophisticated attacks nearly every day.
It’s getting tougher to cope now that bad actors have added malicious AI to their arsenal.
But surviving these attacks rests almost entirely on the competence and reliability of the cyber resilience strategy.
Cyber_Security_Channel
Bitdefender Ultimate Small Business Security review: Versatile All-Round Protection For Low Headcounts
Larger businesses should look instead at Bitdefender also offers its Gravityzone Business Security platform, which can scale to any size – but there's a definite appeal to a security system that's designed specifically for small operations, working with limited budgets and minimal in-house expertise.
Cyber_Security_Channel
Ontario Government Introduces New Bill for Strengthening Cybersecurity and for Responsible AI
The Act aims to mitigate risks associated with cybersecurity and AI systems within Ontario’s public sector.
This includes organizations operating in Ontario’s critical public services such as those in the education, healthcare, and children’s services sectors.
Cyber_Security_Channel
Downtime Costs World’s Largest Companies $400 Billion a Year, According to Splunk Report
Downtime directly results in financial losses through lost revenue, regulatory fines and overtime wages for staff rectifying the issue.
The report also unveiled hidden costs that take longer to have an impact, like diminished shareholder value, stagnant developer productivity and reputational damage.
Cyber_Security_Channel
New North Korean Hacking Group Identified by Microsoft
To compromise its victims’ IT systems, Moonstone Sleet employs a combination of tried-and-tested and new techniques, including setting up fake companies and job opportunities to engage with potential targets, deploying trojanized versions of legitimate tools and creating malicious games.
Cyber_Security_Channel
IoT Vulnerabilities Skyrocket, Becoming Key Entry Point for Attackers
The riskiest devices observed in this category were:
— Electrocardiographs
— Medical information systems
— Medication dispensing systems
— Picture archiving and communication systems (PACS)
— Digital imaging and communications in medicine (DICOM) workstations
Cyber_Security_Channel
The Murky World of Password Leaks – and How to Check if You’ve Been Hit
Where does that leave us?
Perhaps the key takeaway is that even if you apply stringent personal security measures, your account credentials can still get caught up in such collections, primarily due to breaches at large companies.
This begs the question – how can you find out if your credentials have been compromised? Read on.
Cyber_Security_Channel
How Do Password Managers Work and Why Do You Need One?
But suppose you’re like many people who resort to reusing their old passwords to create new accounts.
In that case, it’s safe to say that it’s only a matter of time before your data and online accounts are compromised.
And by extension, once your overused passwords are discovered, all the accounts associated with them are at risk.
Cyber_Security_Channel
📩 CyberWeekly by Hacklido — Issue №1; 1st of June, 2024
At the beginning of the first month of the summer, our partners released a new version of their Newsletter.
It includes materials on the following topics:
• FlyingYeti
• Bug Bounty in 2024
• Hacking via WordPress
• Flipper zero cheat sheet
• Cybersecurity job updates
• Detecting Sandwich attacks in Ethereum
And much more...
You can find the full version of this release here.
-----
✨ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin
-----
@Cyber_Security_Channel
Newly Detected Chinese Group Targeting Military, Government Entities
Spear-phishing emails employed in attacks over the past year included malicious archives containing LNK files designed to execute malicious commands instead, leading to the deployment of malware.
Cyber_Security_Channel
90+ Malicious Apps Totaling 5.5M Downloads Lurk on Google Play
Further, Zscaler's analysis shows that the apps most commonly used to hide malware on the mobile app store are tools such as the ones behind which Anatsa lurks, followed by personalization and photography apps.
Cyber_Security_Channel
📺 The Cyber Security News Booth at the Cybersec Europe 2024 Conference!
Our Team was happy to represent the Cyber Security News community with a booth that was located at the Partner Pavilion, next to the Main Stage.
It was a pleasure to serve as the Exhibitor at the Brussels Expo site, near prestigious 'neighbours' — companies and organisations such as:
• ISACA
• Women4Cyber
• European Cyber Security Organisation (ECSO)
• Solvay Brussels School of Economics and Management
Additionally, thank you very much to the Royal Jaarbeurs Team & Mick den Dijker for the opportunity and such a professional organisation throughout the event!
@Cyber_Security_Channel
💻 The 'Start-Up Zone' at the Cybersec Europe 2024 Conference
A professional, well-organized area within the Expo hall, encompassing a variety of innovative businesses from all around Europe, and beyond.
It was a pleasure to see Mitigant, Threat Exposure and Mindflow, as well as talking to Berilo, heylogin and ControlCase, among many other progressive ventures from the Start-Up ecosystem.
@Cyber_Security_Channel