🚀 Cybersec Europe 2024 Conference Has Started!
This morning, the event began with the Opening talk with Deputy Prime Minister Petra De Sutter, titled as 'Security challenges for telecom & government'.
The session took place on The Heroes Stage, one of the main speaker spaces of the Conference.
@Cyber_Security_Channel
⏰ Cybersec Europe 2024 Conference in Brussels Begins Tomorrow
During 'Day 0' of the event, our Team has visisted the venue of the convention, observing the construction process and the final preparations that were being made to ensure a successful start of the Conference.
The badges are collected, the Cyber Security News booth is inspected — we are ready for the first day of the Conference tomorrow, 29th of May.
Please note:
🔐 Cybersec Europe 2024 Conference Begins in Only 2 Days!
This week, our team will be attending the Cybersec Europe Conference in Brussels.
We will be present at the venue as a Media Partner of the event.
Documenting the convention firsthand, from the site.
The good news?
→ You can join us as well!
This Conference is FREE FOR ALL.
You just need to register as a guest on the website.
📅 29th-30th of May, 2024
📍 Brussels, Belgium
Cyber Security News has also been invited to participate as an Exhibitor, meaning that we will have our own booth at the location.
-----
Are you also planning to visit this international Cyber Security event?
Let’s schedule a meeting and organise a Cyber Security News meet-up.
Reach out to us directly to discuss the details → @cybersecadmin
We would be happy to see you there! 🇧🇪
-----
@Cyber_Security_Channel
🎁 Get a $300 Conference Start-Up Pass for FREE
A complimentary gift for Cyber Security News community members.
Participate in a prestigious business & entrepreneurship Conference.
📅 30th-31th of May, 2024
📍 Limassol, Cyprus
This is the perfect opportunity to:
How to enter?
Win-win offer:
☄️ New Partner Announcement — Cybersec Europe!
We are excited to reveal that Cyber Security News has partnered with Cybersec Europe.
This company specialises in organizing top-notch global Cyber Security conferences and events featuring experienced speakers, fascinating workshops, and valuable networking opportunities.
Cybersec Europe Returns to Brussels with More Exhibitors, Speakers, and Innovations!
📅 May 29-30, 2024
📍Brussels Expo, Palace 5
Join us at Cybersec Europe, the leading cybersecurity event in the Benelux, now bigger than ever!
With over 300 exhibitors and up to 9,000 visitors, this is your chance to:
• Gain knowledge and inspiration
• Build a strong strategic vision
• Discover new solutions
• Expand your network
Meet top cybersecurity experts like:
• Miguel De Bruycker (Centre for Cybersecurity Belgium)
• Marijke Verhavert (TomorrowLab)
• Anastasiya Tretyak (EY Belgium)
• Ivana Butorac (Sopra Steria)
Among many other professionals in the field.
@Cyber_Security_Channel
Top ITSM Certifications for 2024
We’ll look at the most popular ITSM certifications and why each one is important in the field of information technology.
The focus of these certifications is to enhance the delivery of value to customers by improving information systems processes that can increase efficiencies and reduce downtime or interruptions.
Cyber_Security_Channel
Legacy of Wisdom: Security Lessons Inspired by My Father
Article from SecurityWeek. My father was a very practical man, and he was also a talented craftsman.
He was never happier than when he was in his woodshop during his retirement years, surrounded by his grandchildren, passing on life’s lessons to the next generation.
Cyber_Security_Channel
Christie’s Website Breached Right Before Huge Sales Day
Even though Christie’s has provided contact details, the incident could still pose challenges for the auction house.
Besides, it’s still not clear whether the hackers had gained access to sensitive information held by Christie’s.
Cyber_Security_Channel
Dell Hacker Claims They Had Access To Systems For Nearly Three Weeks
Dell disclosed the breach on 9 May, notifying customers that their names, addresses, and Dell customer info were exposed, warning them to watch out for social engineering attacks impersonating the technology giant.
Cyber_Security_Channel
IntelBroker Allegedly Breaches Europol, Exposing Classified Data
Among the agencies within Europol affected by the breach are the Cybercrime Center (EC3), specifically the Cryptocurrencies and Space units, the Europol Platform for Experts, the Law Enforcement Forum, and the SIRIUS system.
Cyber_Security_Channel
Hunters Announces Full Adoption of OCSF and Introduces OCSF-Native Search
The adoption of OCSF provides a unified, standardized language across cybersecurity tools and platforms, simplifying data integration and analysis workflows.
The adoption fosters frictionless interoperability and enables enhanced collaboration among cybersecurity professionals, promoting flexibility and innovation by eliminating constraints imposed by proprietary data formats.
Cyber_Security_Channel
What is 'Hackbot as a Service' and are Malicious LLMs a Risk?
Hackers have already been using LLMs to refine social engineering attacks, matching the tone and style of an executive for phishing or using deepfake attacks to circumvent identity systems.
Cyber_Security_Channel
Human Errors Still a Leading Cause of Cyber Incidents, Says Kaspersky
This trend can be attributed to the commoditization of attacks through the widespread adoption of existing tools, originally designed for conducting targeted campaigns which, due to deliberate or accidental leaks, have become common.
Cyber_Security_Channel
Hackers Compromised Dropbox eSignature Service
Even users who only received or signed a document through Sign without creating an account had names and email addresses compromised.
However, there is no indication that payment information or customers’ files (signed documents and agreements) were accessed.
Cyber_Security_Channel
Why Your VPN May Not Be As Secure As It Claims
VPNs work by creating a virtual network interface that serves as an encrypted tunnel for communications.
But researchers at Leviathan Security say they’ve discovered it’s possible to abuse an obscure feature built into the DHCP standard so that other users on the local network are forced to connect to a rogue DHCP server.
Cyber_Security_Channel
🚨 Last Call for Free Start-Up Passes!
• Are you based in Cyprus?
• Are you traveling to the island this week?
• Are you spending your vacation time in Limassol?
Save $300 & enjoy a unique business-oriented convention.
👀 Reflect Festival Conference
📅 30th-31st of May, 2024
📍 Limassol, Cyprus
Sounds exciting?
Message us for details on how to receive your free Start-Up Pass with exclusive access to side events, networking lounges and keynote speakers.
→ Contact: @cybersecadmin
P.S. Do you know someone, who might be interested?
Forward them this message!
6 Facts About How Interpol Fights Cybercrime
In spite of the kinds of public actions, many in the cybersecurity community may not fully understand how Interpol has the authority and trust to get all of this work done.
At the RSA Conference USA 2024 last month, Craig Jones, Interpol's director of cybercrime offered a deep-dive look into how the organization works and also how it cooperates with private firms to carry out its mission.
Cyber_Security_Channel
Google Discovers Fourth Zero-Day in Less Than a Month
Google recommends that Windows and macOS users upgrade to Chrome version 125.0.6422.112/.113 and Linux users to version 125.0.6422.112.
Chromium-based users should apply fixes as they become available, Google added.
Cyber_Security_Channel
People Deftly Extracted ‘passwords’ From AI Chatbots During Lab Test
As state and local governments search for ways to integrate AI into their digital services and back offices, cyber psychologist John Blythe, one of the study’s authors, told StateScoop.
It’s imperative they first close the knowledge gap with employees through cybersecurity training programs designed that account for human psychology.
Cyber_Security_Channel
Critical Bug Allows DoS, RCE, Data Leaks in All Major Cloud Platforms
Tenable researchers initially were looking into an entirely separate security issue in an undisclosed cloud service when they realized something unexpected was going on.
From where they were sitting, it seemed they were able to access a wide range of the cloud service provider's (CSP) own internal metrics and logging endpoints.
Among these were instances of Fluent Bit.
Cyber_Security_Channel
Expert Reaction: Health Company Victim of Big Data Breach
McGuinness noted in her statement that the original compromise has been isolated, and there is no evidence to suggest an increased cyber threat to the medical sector.
However, experts say the breach is a timely reminder to all organisations which hold personal information to review their cyber security practices.
Cyber_Security_Channel
Microsoft Warns of Active Zero-Day Exploitation, Patches 60 Windows Vulnerabilities
Microsoft also marked CVE-2024-30040 in the already-exploited category, warning that attackers are bypassing security features in Microsoft 365 and Office.
The flaw, which carries a CVSS score of 8.8, allows attackers to execute arbitrary code if a user is tricking into loading malicious files.
Cyber_Security_Channel
⚡️900k Impacted by Data Breach at Mississippi Healthcare Provider
Additionally, SRHS is providing the impacted individuals with 12 months of free credit monitoring services, as well as with guidance on how to protect against identity theft and fraud.
Cyber_Security_Channel
The Future of Information Warfare: LLMs and the Fight for Truth
CopyCop employed a sophisticated strategy to manipulate news narratives.
By using prompt engineering, they tailored content to specific audiences and political biases, effectively amplifying existing divisions and spreading misleading information.
Cyber_Security_Channel
LLMs & Malicious Code Injections: 'We Have to Assume It's Coming'
One area in which many companies have embraced AI is incident response and threat analytics.
"Security information and event management is definitely getting disrupted with the use of this stuff," Swarnam says.
"It actually eliminates triaging at level one, and in a lot of cases at level two as well."
Cyber_Security_Channel
ℹ️ New Course Offers In-Depth Training on Latest PCI DSS v4.0 Standard
The "PCI DSS - Foundation to Mastery" course is now updated to include the latest PCI DSS v4.0, the standard for protecting cardholder data.
It is designed for both beginners and experienced professionals who want to learn more about this important security measure.
The course is taught by an expert who has spent over ten years implementing PCI DSS around the world.
The updated course material covers everything from basic principles to advanced implementation techniques and includes the latest changes and requirements.
With data breaches on the rise, understanding and applying PCI DSS is crucial for any organization.
This course helps prepare participants to meet these challenges and stay ahead in the field of cybersecurity.
Click here to learn more about the material.
-----
@Cyber_Security_Channel
10 Hot New Cybersecurity Tools Announced At RSAC 2024
Threat intelligence firm Recorded Future is among the cybersecurity vendors that debuted new GenAI-powered product capabilities Monday in connection with RSAC.
“I think RSA continues to be one of the best events to showcase the innovation and the impact that we have with our customers,” said Colin Mahony, president of Recorded Future, in an interview with CRN.
Cyber_Security_Channel
State’s Cyber Squad Investigating Byron Council Data Breach
Speaking to The Echo on Monday, Mr Baker said it was a member of the public who first notified the council of the data leak, five days after the upgrade.
The internal documents were reportedly removed on 29 April.
Cyber_Security_Channel
Why Remote Desktop Tools are Facing an Onslaught of Cyber Threats
Over 99% of the attack attempts leveraging VNC were aimed at HTTP ports, and the other 1% targeted the transfer control protocol (TCP).
Tanner suggested this is probably due to the fact that HTTP does not require specific authentication, unlike TCP.
Cyber_Security_Channel
City of Wichita Shuts Down Network Following Ransomware Attack
It is unclear whether personal information was compromised in the attack, but Wichita said details on the matter will be provided as the investigation into the incident advances.
Cyber_Security_Channel