cyber_security_channel | News and Media

Telegram-канал cyber_security_channel - Cyber Security News

42585

Be Cyber Aware. Our vacancies channel: @CyberSecurityJobs Our chat: t.me/cybersecuritynewschat LinkedIn: https://www.linkedin.com/company/securitynews/ Facebook: https://www.facebook.com/BreakingCyberSecNews 📩 Cooperation: @cybersecadmin

Subscribe to a channel

Cyber Security News

Meta Fined $20 Million in Australia Over Personal Data Usage

The ACCC seems content to ding Meta for what are essentially inaccurate statements to consumers about data usage, however, and in an amount that has seemingly become a cost of doing business for the company.

Despite some recent concerns about its future direction, plans for VR and an ongoing drop in Facebook users, Meta is still pulling down about $120 billion per year in revenue.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Back-Door Cyber Threat Leaving Supply Chains Exposed

Supply vendors are too often the entry point for malware, ransomware or denial of service attacks, which then work their way upstream or downstream to the larger organisation itself.

Monitoring all these using conventional methods, such as surveys, generates a huge administrative burden and only provides limited assurance of a supplier’s cyber security posture at a single point in time.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Why Some Experts Are Concerned About Threads’ Data Collection

Data privacy experts say that, though this level of data collection is not unique to Threads, users do risk handing over even more personal information to a company that already knows a lot about account holders.

And as Meta looks towards turning Threads into a decentralized service, which would allow users to view Threads content across other apps and theoretically give them more control over their data, experts warn that the move could expand the company’s reach across the internet.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

CISA Calls Urgent Attention to UEFI Attack Surfaces

The government agency used the example of the BlackLotus bootkit to call attention to major gaps in the way layers below the operating system are protected.

“Based on recent incident responses to UEFI malware such as BlackLotus, the cybersecurity community and UEFI developers appear to still be in learning mode,” CISA said, noting that BlackLotus exploits a failure in secure update distribution – an issue at the intersection of Secure by Design and PSIRT maturity.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Utilities Face Security Challenges as They Embrace Data in New Ways

The risk is real, and there is a lot at stake, especially when it comes to critical infrastructure.

One successful breach could cut power or water supply to thousands of residents.

The age of operational technology (OT) — much of which is more than 25 years old — is a concern for utilities.

Aging technology is harder to update, making it easier for hackers to exploit.

Also, many devices that collect real-time data are third-party technologies, such as smart thermostats, and are outside the direct control of utilities.

The combination of a larger attack surface and less control equals greater risk.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Firefox 116 Patches High-Severity Vulnerabilities

“In some circumstances, a stale value could have been used for a global variable in WASM JIT analysis.

This resulted in incorrect compilation and a potentially exploitable crash in the content process,” Mozilla notes.

The browser update also resolves CVE-2023-4047, a permission request bypass via clickjacking.

A page could trick users into clicking on a carefully placed item but instead register the input as a click on a security dialog that was not displayed to the user.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

European Commission Seeks Input on DMA User Profiling Complaint Template

Practice shows that gatekeepers collect and accumulate large amounts of data from end users, which makes it difficult for potential entrants and start-ups to compete with them.

Transparency should help avoiding that deep consumer profiling will become the de facto industry standard and allow competitors to differentiate themselves through the use of superior privacy guarantees.

The objective of the consultation is to gather comments on the draft template relating to the description of profiling techniques of consumers and audit of such descriptions to be submitted by gatekeepers under Article 15 of the DMA (Digital Markets Act).

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Data Driven Compliance: eCom Surveillance and Cybersecurity Data Management

Data Driven Compliance is back with another exciting episode The intersection of law, compliance, and data is becoming increasingly important in the world of cross-border transactions and mergers.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Is Worldcoin a Dystopian Attempt to Steal Identities?

Worldcoin, co-founded by OpenAI's Sam Altman, aims to create a global digital identification system, using iris-scanning technology.

However, the trade-off of personal biometric data for its cryptocurrency, WLD, raises critical questions about data privacy, valuation, and potential exploitation.

The technology used by Worldcoin derives from cryptographic and blockchain tools that have become mainstays in the cryptocurrency arena. An integral part of the system is its cryptocurrency, WLD, and its associated payment platform.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

New WikiLoader Malware Targets Italian Organizations

WikiLoader is “a sophisticated downloader” whose primary goal is to install another malicious payload on victims’ devices, including malware called Ursnif, according to researchers at Proofpoint.

The malware is called WikiLoader because when it is active on a system, it sends a request to Wikipedia to check if the content of the response includes the string "The Free."

The activity is likely a signal or identifier used by the malware to quietly verify its connection to the public internet.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

⚡️This Resource is Claiming to Make You an Expert in Web Development and Programming

Do you want to get into web development and become better at it?

Then “The Frontend Bundle + Programming Notes and Flashcards is for you!

This bundle provides you with:

210+ pages
1175+ flashcards
5 languages & frameworks

Become a Master at Frontend starting from today!

You will definitely profit from having a well-organised system where you can learn and look up everything you need.

It’s time to unlock your growth:

Do it here → https://gumroad.com/a/94518995/hpyma

Читать полностью…

Cyber Security News

Universal Identity: Connecting and Automating Cybersecurity Responses for States

The Universal Identity presents a centralized identity store that seamlessly links individual LEAs (Local Education Agencies) to the state, facilitating secure data sharing and portability across a connective identity fabric.

This solution allows institutions to avoid redundant data entry and discrepancies and embrace efficient decision-making between centralized and local organizational units, while significantly reducing administrative burden.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Using Snapshots to Improve Data Security

As well as augmenting traditional backups, snapshots can also be used as an additional safeguard against ransomware, according to Jerry Rozeman, an analyst at Gartner.

This should not be interpreted as saying that snapshots take the place of other security measures that are designed to reduce the chances of a ransomware infection.

Firewalls, intrusion detection, ransomware protection systems and other cybersecurity tools remain vital.

But regular snapshots of databases and storage can provide another, and perhaps a last, line of defense in case other cybersecurity protections are breached.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

What Is the Difference Between Encryption, Compression, and Archiving?

Encryption transforms data into an unreadable format using mathematical algorithms that convert data into a cipher-like form. Encryption is a reversible process.

Compression is a process of minimizing data size for efficient storage and faster transmission. Compression maximizes resources by reducing the size of files, often by eliminating redundant or unnecessary information.

Archiving consolidates multiple files or directories into a single file, an archive. This approach allows for the efficient storage and management of related files while preserving their original structure and content.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

How to Build Consumer Trust in Your Data Privacy

This provides companies with both risk and opportunity.

The risk is that, if you do nothing to bolster your data privacy reputation, your customers will abandon you for more secure competitors. But there’s an opportunity, too.

If you clearly demonstrate your commitment to data privacy, you can strengthen your relationship with existing customers as well as gain new ones.

Plus, as swathes of new data privacy regulations come into play in 2023, there’s no harm in staying ahead of the lawmaking curve.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Top 10 Data Center Security Stories of 2023 (So Far)

By staying informed and proactive on the latest trends and best practices, data center professionals can ensure the safety and integrity of their critical assets.

1. How ChatGPT Can Help and Hinder Data Center Cybersecurity

2. Top 5 Data Center Security Risks for 2023

3. Time to Double Check Those Data Center Deadbolts: 2023 Security Review

4. Why Is Blockchain Important? Is It Still Relevant? Or Was It Ever?

5. How ISO, CIS, MITRE, and CSA Impact Your Cloud Security Architecture

6. 7 Ways to Secure Sensitive Data in the Cloud

7. How Security Architects Fit Into Organizations

8. Authentication Patterns for Securing Technical Accounts in the Cloud

9. Network Zoning in 2023: How AI and Automation Change Things

10. When To Go Cloud-Native and When To Buy a Security Vendor Solution

📸 Photo: Analytics Insight

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

IBM Cybersecurity Report Has Supply Chains Chiefs On Alert

Internally, the biggest cyber threats come from suppliers or other third parties who have access to an organisation's IT networks.

Externally, the biggest threat is from third-party organisations who perform a critical business process or deliver a key product to the first party.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Cyber-Insurance Underwriting Is Still Stuck in the Dark Ages

Offering expensive policies that exclude common risks such as ransomware or nation-state attacks is simply not a sustainable approach.

This has helped insurers become more profitable for now, but these are only short-term fixes to the real problem at hand.

Namely, that the underwriting process for cyber-insurance policies is still not that sophisticated.

Most underwriters are poorly equipped to effectively measure the cyber-risk exposure of new or renewing customers.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Data Breach Costs: Businesses Lose 73% of Their Income in the Year Following an Incident

In one example, a company’s stock price dipped nearly 21% the day after a breach was disclosed.

In this same incident, net income dropped 27% year-over-year in the quarter that the breach occurred.

These income-related losses are compounded by the fact that companies also encounter a domino effect of costs in the wake of a breach, ExtraHop said.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Unified XDR and SIEM Alleviate Security Alert Fatigue

This means that every moment counts when it comes to defending against cybercrime.

However, security teams cannot reasonably be expected to respond to the overwhelming number of alerts they receive on a daily basis.

That's where XDR and SIEM can help.

Unified XDR and SIEM counters alert fatigue by reducing the billions of individual XDR signal data into fewer alerts and incidents.

This works in two key ways. First, XDR enables security teams to collect security alerts across the entire enterprise — pulling from endpoints, networks, and applications, as well as cloud workloads and the organization’s identity infrastructure.

XDR can then connect these disparate alerts and analyze the data to help security teams prioritize which alert to address first based on its potential risk to the enterprise.

This also enables teams to more easily visualize how attackers can move throughout their networks.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

What Implementing Biometrics for Authentication Looks Like

An enterprise using biometrics as a routine authentication approach could ultimately hurt the enterprise's security, along with the security of all employees, contractors, and partners who need access to enterprise systems, Booth adds.

"As somebody whose fingerprints are on file in a CCP database somewhere thanks to the OPM hack in 2015, I've accepted that I've lost control of my biometrics," he says.

"But that doesn't mean I want to use them everywhere and risk losing further control for low-reward use cases. They should be reserved for meaningful scenarios."

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

KLAS: AI, Market Consolidation Impact Patient Privacy Monitoring Vendor Trends

Patient privacy monitoring tools help healthcare organizations prevent and detect unauthorized access to sensitive patient data.

KLAS researchers examined responses from healthcare professionals about the solutions their organizations use and how they measure up to six customer experience pillars:

- Culture
- Operations
- Loyalty
- Product
- Relationship
- Value.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Thailand Releases Draft Notification on Data Protection Officer Appointment

The term “core activity” denotes an essential and integral activity directly related to the primary operations of the data controller or data processor and does not include any supplementary business activities.

DPOs (data protection officer) may undertake other duties or tasks, provided that the data controller or data processor certifies with the Office of the PDPC (Personal Data Protection Committee) that these duties do not conflict with or violate the legal obligations outlined in the PDPA (Personal Data Protection Act), which is similar to the current requirement under Section 42 of the PDPA.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Air-Gapped ICS Systems Targeted by Sophisticated Malware

"The malware, designed explicitly to exfiltrate data from air-gapped systems by infecting removable drives, consist of at least three modules, each responsible for different tasks, such as profiling and handling removable drives, capturing screenshots, and planting second-step malware on newly connected drives," the report says.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Millions Stolen From Crypto Platforms Through Exploited ‘Vyper’ Vulnerability

Vyper — one of the most popular Web3 programming languages — is used to create blockchain smart contracts, but its developers warned that versions 0.2.15, 0.2.16 and 0.3.0 are vulnerable to an issue in which hackers manipulate smart contracts in order to drain account funds.

North Korea’s Lazarus hacking group has been one of the primary drivers of attacks on cryptocurrency platforms, using billions in stolen crypto to allegedly fund its nuclear weapons program.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Lawsuit: ByteDance’s CapCut App Secretly Reaps Massive Amounts of User Data

CapCut and sister company TikTok are owned by the Chinese company ByteDance Ltd., which has long been under scrutiny by American officials concerned with how it collects and leverages American users’ personal data, allegedly including biometric data.

CapCut collects not only users’ photos and videos, but also location, gender, and birthday, the lawsuit alleges.

ByteDance developers are accused of building in the ability to suck up technical details about a user’s device and its network information, including its MAC address, IMEI identification information, MEID (Mobile Equipment Identifier), ICCID (Integrated Circuit Card Identifier), and SIM serial number.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Possible Chinese Malware in US Systems a 'Ticking Time Bomb': Report

The
report comes two months after Microsoft warned that state-sponsored Chinese hackers had infiltrated critical US infrastructure networks.

Microsoft singled out Guam, a US Pacific territory with a vital military outpost, as one target but said malicious activity had also been detected elsewhere in the United States.

It said the stealthy attack, carried out since mid-2021, was likely aimed at hampering the United States in the event of a regional conflict.

Authorities in Australia, Canada, New Zealand and Britain warned at the same time that Chinese hacking was likely taking place globally, affecting an extensive range of infrastructure.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

95% of Patients Fear They Will Face Data Breach

Patients trust the government facilitating health data exchange over big tech companies.

Sixty-five percent of patients reported a distrust in big companies, such as Amazon, Apple, Google, Facebook and Microsoft, having access to their health data.

Only 14 percent of patients who trust these companies reported having "full trust," while the other 21 percent described their attitude as having only "slight trust."

Meanwhile, 60 percent of patients would be less concerned if the government facilitated their health data exchange

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

How to Avoid Mobile Data Leakage and Data Breach

One of the leading causes of mobile data leakage is the use of insecure mobile applications.

Some developers may not prioritize security measures, leading to vulnerabilities that attackers can exploit.

These vulnerabilities may allow unauthorized access to sensitive data stored within the application.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Baffle Delivers End-to-End Data Protection for Analytics

Baffle Data Protection for Analytics is the easiest and fastest way to secure analytics while meeting increasingly stringent compliance mandates.

With no code changes, the platform encrypts, tokenizes or masks data as it is ingested into the most popular analytics databases and data warehouses to ensure a strong security posture when data is stored and moved through analytics pipelines.

Baffle Data Protection for Analytics provides end-to-end controls for data ingestion, from applications into data stores, to consumption, from data warehouses for processing and analysis.

Fine-grained access control ensures no unauthorized users, including cloud admins, database administrators, data analysts or data scientists, can access sensitive data in clear text

@Cyber_Security_Channel

Читать полностью…
Subscribe to a channel