cyber_security_channel | News and Media

Telegram-канал cyber_security_channel - Cyber Security News

42585

Be Cyber Aware. Our vacancies channel: @CyberSecurityJobs Our chat: t.me/cybersecuritynewschat LinkedIn: https://www.linkedin.com/company/securitynews/ Facebook: https://www.facebook.com/BreakingCyberSecNews 📩 Cooperation: @cybersecadmin

Subscribe to a channel

Cyber Security News

Building an Incident Response Strategy in 2024

Previously, incident response aimed to address threats at the organizational boundary.

However, as the lines between internal and external environments have blurred, strategies need to adapt, says Ridley.

“With the increasing adoption of cloud services in various business operations, the traditional concept of a well-defined perimeter has become obsolete,” he says.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Quantum Innovation: The Cybersecurity Revolution

SmartBrief: What strategic advantages do you see quantum innovation providing, particularly in addressing emerging threats and vulnerabilities?

Cyber_Security_Channel

Читать полностью…

Cyber Security News

📩 CyberWeekly by Hacklido — Issue №4; 22nd of June, 2024

Today, we would like to share the current Issue of the CyberWeekly Newsletter from our partners, Hacklido.

This time, you will be able to delve into the topics such as:

TOR
Kali Linux
Kaspersky ban
Major breaches
LSASS decryption
Cutting-edge tools
Nmap port scanning
VDPS for career launch
Anonymity with ProxyChains

Bonus note: improved news section.

Along with more up-to-date news inside...


The full version can be found here.

-----

→ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin

-----

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

📩 CyberWeekly by Hacklido — Issue №3; 15th of June, 2024

Please welcome the most recent Issue of the CyberWeekly Newsletter from our partners — Hacklido.

This time, you will be able to explore the following areas:

The Mask APT
JavaScript for hackers
GitHub phishing & extorsions
NTLM deprecation by Microsoft 2024

And more hidden gems inside...


Find the full text here.

-----

→ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin

-----

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Ascension Hospitals Breach Caused by Employee Downloading Malicious File

The X post said, “We detected unusual activity on select technology network systems, which we now believe is due to a cybersecurity event.

Our care teams have initiated procedures to ensure patient care delivery continues to be safe and as minimally impacted as possible,” the post said.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

🔥 Scanning Networks – Pro Guide for Cybersecurity Specialists

→ Our partners at Hacklido are offering a revamped version of their bestselling digital product!

More material, the same price!


You will learn:

↳ IDS & Firewall evasion
↳ Understanding networks
↳ Scanning, countermeasures and tools

New additions:

✔️Real world examples
✔️Clear commands & terminology
✔️Practice questions with explanations for each unit

Among many other useful topics…

Time to become an even better Cybersecurity Specialist 🚀

Grab your personal copy here:

https://gumroad.com/a/631226579/ubvne

Читать полностью…

Cyber Security News

Making Choices for Stronger Vulnerability Management

Through our honeypot data and view into our cyber insurance policyholders' attack surfaces, security tools, and workflows, Coalition has identified the key technology choices that place businesses at risk — as well as the choices that are proving most effective.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Ransomware Attack Disrupts Operations Across London Hospitals

The UK National Health Service (NHS) also weighed in with a statement on Tuesday, noting that the incident forced hospitals to "prioritize" urgent work.

Emergency services across the UK continued to be available as usual, and the NHS directed patients to attend scheduled appointments unless informed otherwise.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

📩 CyberWeekly by Hacklido — Issue №2; 8th of June, 2024

Not much time has passed since we shared the first Issue of the CyberWeekly Newsletter from our partners at Hacklido.

A couple of days ago, they already published the second Issue from this helpful project.

It includes insights on the following topics:

Mentorship in CTF
Intel/AMD CPU internals
Python for hackers — 10 projects
Windows 11 TotalRecall dump tool
Android Binder CVE — 2023-20938
Finding your purpose in cybersecurity

And a lot more inside...


The full version can be found here.

-----

→ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin


-----

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack

This consisted of a Golang-based backdoor codenamed BRICKSTORM.

They were present within the rogue VMs and two web shells referred to as BEEFLUSH and BUSHWALK, allowing UNC5221 to execute arbitrary commands and communicate with command-and-control servers.

📷 Image Credit: The Hacker News

Cyber_Security_Channel

Читать полностью…

Cyber Security News

This New Hacker Group is Targeting Software Developers With Phony Job Offers and Fake Projects

Microsoft said the group is backed by North Korea.

When it was first spotted, there was a lot of overlap between Moonstone Sleet and other North Korea-backed hacking groups.

Since then it has shifted to its bespoke infrastructure and attacks.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Attackers Target Check Point VPNs to Access Corporate Networks

They're also useful for malicious purposes. Rather than having to, say, exploit a publicly facing server, or a zero-day vulnerability, a hacker could use a remote access VPN for clean, unfettered access to an organization's IT environment.

From there, they could begin establishing persistence, probing for vulnerabilities, and much more.

How, though, do they get access to that VPN connection in the first place?

Cyber_Security_Channel

Читать полностью…

Cyber Security News

International Malware Takedown Seized 100+ Servers

Between May 27 and May 29, police arrested four people, seized more than 100 servers and took control of more than 2,000 domains.

Arrests were made in Ukraine and Armenia, and servers were taken down or disrupted in Bulgaria, Canada, Germany, Lithuania, the Netherlands, Romania, Switzerland, the United Kingdom and the United States.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

ℹ️📸 Cyber Security News as a Media Partner for Conferences and Events!

It has been an honour to serve as the official Media Partner and Exhibitor of the Cybersec Europe 2024 Conference in Brussels, Belgium (29th-30th of May, 2024).

From speaker announcements and exclusive content to live coverage and booth materials, it has been a truly productive and mutually beneficial partnership.

Our team hopes that you enjoyed all the content around the Conference and found it interesting!

Thank you to everyone who made this collaboration happen!

P.S. Case Study about our work with Cybersec Europe 2024 is coming soon...

-----

🌐 Would you like Cyber Security News to become a Media Partner of your Conference/Event?

📩 Contact us to discuss the details → @cybersecadmin

-----

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

🤝 High-end Networking Service at the Cybersec Europe 2024 Conference

Throughout the convention, the Brussels Expo venue was equipped with a 'VIP Lounge' and the 'First Class Lounge', providing optimum spots for meetings and communication arrangements with other attendees.

In addition to the unqiue features such as noise isolation, both areas contained a wide selection of snacks and drinks for guests to enjoy during breaktimes.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Apple AirPods Bug Allows Eavesdropping

"When your headphones are seeking a connection request to one of your previously paired devices, an attacker in Bluetooth range might be able to spoof the intended source device and gain access to your headphones," reported Apple in an advisory.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Google Software Engineers Can Take A Nap While Software Solves Problems

"We hope in the future this can close some of the blind spots of current automated vulnerability discovery approaches, and enable automated detection of 'unfuzzable' vulnerabilities," Google Project Zero software engineers Sergei Glazunov and Mark Brand wrote in a post.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Measure Success: Key Cybersecurity Resilience Metrics

Strengthening a company’s cyber resilience is an ongoing exercise as attackers launch more sophisticated attacks nearly every day.

It’s getting tougher to cope now that bad actors have added malicious AI to their arsenal.

But surviving these attacks rests almost entirely on the competence and reliability of the cyber resilience strategy.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Bitdefender Ultimate Small Business Security review: Versatile All-Round Protection For Low Headcounts

Larger businesses should look instead at Bitdefender also offers its Gravityzone Business Security platform, which can scale to any size – but there's a definite appeal to a security system that's designed specifically for small operations, working with limited budgets and minimal in-house expertise.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Ontario Government Introduces New Bill for Strengthening Cybersecurity and for Responsible AI

The Act aims to mitigate risks associated with cybersecurity and AI systems within Ontario’s public sector.

This includes organizations operating in Ontario’s critical public services such as those in the education, healthcare, and children’s services sectors.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Downtime Costs World’s Largest Companies $400 Billion a Year, According to Splunk Report

Downtime directly results in financial losses through lost revenue, regulatory fines and overtime wages for staff rectifying the issue.

The report also unveiled hidden costs that take longer to have an impact, like diminished shareholder value, stagnant developer productivity and reputational damage.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

New North Korean Hacking Group Identified by Microsoft

To compromise its victims’ IT systems, Moonstone Sleet employs a combination of tried-and-tested and new techniques, including setting up fake companies and job opportunities to engage with potential targets, deploying trojanized versions of legitimate tools and creating malicious games.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

IoT Vulnerabilities Skyrocket, Becoming Key Entry Point for Attackers

The riskiest devices observed in this category were:

— Electrocardiographs
— Medical information systems
— Medication dispensing systems
— Picture archiving and communication systems (PACS)
— Digital imaging and communications in medicine (DICOM) workstations

Cyber_Security_Channel

Читать полностью…

Cyber Security News

The Murky World of Password Leaks – and How to Check if You’ve Been Hit

Where does that leave us?

Perhaps the key takeaway is that even if you apply stringent personal security measures, your account credentials can still get caught up in such collections, primarily due to breaches at large companies.

This begs the question – how can you find out if your credentials have been compromised? Read on.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

How Do Password Managers Work and Why Do You Need One?

But suppose you’re like many people who resort to reusing their old passwords to create new accounts.

In that case, it’s safe to say that it’s only a matter of time before your data and online accounts are compromised.

And by extension, once your overused passwords are discovered, all the accounts associated with them are at risk.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

📩 CyberWeekly by Hacklido — Issue №1; 1st of June, 2024

At the beginning of the first month of the summer, our partners released a new version of their Newsletter.

It includes materials on the following topics:

FlyingYeti
Bug Bounty in 2024
Hacking via WordPress
Flipper zero cheat sheet
Cybersecurity job updates
Detecting Sandwich attacks in Ethereum

And much
more...

You can find the full version of this release here.

-----

✨ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin

-----

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Newly Detected Chinese Group Targeting Military, Government Entities

Spear-phishing emails employed in attacks over the past year included malicious archives containing LNK files designed to execute malicious commands instead, leading to the deployment of malware.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

90+ Malicious Apps Totaling 5.5M Downloads Lurk on Google Play

Further, Zscaler's analysis shows that the apps most commonly used to hide malware on the mobile app store are tools such as the ones behind which Anatsa lurks, followed by personalization and photography apps.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

📺 The Cyber Security News Booth at the Cybersec Europe 2024 Conference!

Our Team was happy to represent the Cyber Security News community with a booth that was located at the Partner Pavilion, next to the Main Stage.

It was a pleasure to serve as the Exhibitor at the Brussels Expo site, near prestigious 'neighbours' — companies and organisations such as:

• ISACA
• Women4Cyber
• European Cyber Security Organisation (ECSO)
• Solvay Brussels School of Economics and Management

Additionally, thank you very much to the Royal Jaarbeurs Team & Mick den Dijker for the opportunity and such a professional organisation throughout the event!

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

💻 The 'Start-Up Zone' at the Cybersec Europe 2024 Conference

A professional, well-organized area within the Expo hall, encompassing a variety of innovative businesses from all around Europe, and beyond.

It was a pleasure to see Mitigant, Threat Exposure and Mindflow, as well as talking to Berilo, heylogin and ControlCase, among many other progressive ventures from the Start-Up ecosystem.

@Cyber_Security_Channel

Читать полностью…
Subscribe to a channel