Google Near $23 Billion Deal for Cybersecurity Startup Wiz
This deal is set to be company's largest acquisition in history, so far.
Google has been working to bulk up its cybersecurity business, focused on the cloud.
Alphabet is eyeing the deal at a time of intense antitrust scrutiny of the search company and other tech giants.
The acquisition could also help boost Alphabet’s efforts in cloud computing, an important and growing business but one where it has lagged behind peers.
@Cyber_Security_Channel
Cybersecurity Stakes Higher Than Ever at Paris Olympics 2024
As the world gears up for the Paris Olympic Games 2024, attention turns to the athletic feats that will be on display and the massive cybersecurity challenges of hosting such a high-profile international event.
With nearly 3 million spectators expected to attend the 329 events held over a 6-week period, spending an estimated $4 billion...
The stakes for cybersecurity are higher than ever.
Olympics have increasingly become a major target for cyber attacks.
The Tokyo Olympics 2021 saw a staggering 450 million attempted cyberattacks – a 2.5x increase from the London Olympic Games 2012.
For bad actors, the Olympics present an enticing combination of factors:
— Large crowds
— Limited physical presence
— Highly distributed events staff
— Zero margin for error and downtime
@Cyber_Security_Channel
Microsoft Outlook Faced Critical Zero-Click RCE Vulnerability
To mitigate the risk, it is crucial to update all Microsoft Outlook and Office applications with the latest patches.
Additionally, implementing robust email security measures, such as disabling automatic email previews and educating users about the risks of opening emails from unknown sources, is essential.
Cyber_Security_Channel
Unleash Your Growth Potential: 90+ Actionable Tactics for Your SaaS Business
Are you a SaaS Business Owner? Or would you like to start one?
Unlock the growth potential of your product with a list of 90+ hand-picked, proven growth tactics for early-stage B2B SaaS Start-Ups.
The content of this product:
• Cold Calling
• Discount policy
• Virality features
• Lead generation
• Referral programs
• Content Marketing
• Product-led growth
• Product Onboarding
• Sales Demos & Discovery
• Multichannel Outbound Sales
• Landing Page & Website structure
This bundle is right for you, if:
[01] You are a Founder/Leader of a SaaS Start-Up.
[02] Your revenue is between 0€ and 3.000.000€ ARR.
[03] You want to learn from the experience of others before starting your own SaaS Company.
Click below to find out more:
→ https://gumroad.com/a/1023033043/nuftu
Why Windows Recall Feature Creates a Data Privacy Nightmare
Microsoft promoted Recall as essentially a new type of search engine.
For example, if wanted to revisit a document, video, or webpage but can’t remember where you saw it, you can enter what you remember into a text interface.
Windows will then use AI to find what you are looking for.
Cyber_Security_Channel
Evolve Bank Shares Data Breach Details as FinTech Firms Report Being Hit
Wise, a fintech firm whose services are widely used for international money transfers, revealed late last week that the Evolve data breach impacts some of its customers.
Wise had worked with Evolve to provide USD account details between 2020 and 2023.
While the companies no longer work together, it seems Evolve was still storing some data provided by Wise.
Cyber_Security_Channel
👨💻 HTML and CSS | Programming Notes and Flashcards
This bundle = 70+ pages and 500+ flashcards on every major concept of HTML and CSS.
Web Development Fundamentals
HTML Basics
CSS Basics
CSS Advanced
Building an Incident Response Strategy in 2024
Previously, incident response aimed to address threats at the organizational boundary.
However, as the lines between internal and external environments have blurred, strategies need to adapt, says Ridley.
“With the increasing adoption of cloud services in various business operations, the traditional concept of a well-defined perimeter has become obsolete,” he says.
Cyber_Security_Channel
Quantum Innovation: The Cybersecurity Revolution
SmartBrief: What strategic advantages do you see quantum innovation providing, particularly in addressing emerging threats and vulnerabilities?
Cyber_Security_Channel
📩 CyberWeekly by Hacklido — Issue №4; 22nd of June, 2024
Today, we would like to share the current Issue of the CyberWeekly Newsletter from our partners, Hacklido.
This time, you will be able to delve into the topics such as:
• TOR
• Kali Linux
• Kaspersky ban
• Major breaches
• LSASS decryption
• Cutting-edge tools
• Nmap port scanning
• VDPS for career launch
• Anonymity with ProxyChains
Bonus note: improved news section.
Along with more up-to-date news inside...
The full version can be found here.
-----
→ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin
-----
@Cyber_Security_Channel
📩 CyberWeekly by Hacklido — Issue №3; 15th of June, 2024
Please welcome the most recent Issue of the CyberWeekly Newsletter from our partners — Hacklido.
This time, you will be able to explore the following areas:
• The Mask APT
• JavaScript for hackers
• GitHub phishing & extorsions
• NTLM deprecation by Microsoft 2024
And more hidden gems inside...
Find the full text here.
-----
→ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin
-----
@Cyber_Security_Channel
Ascension Hospitals Breach Caused by Employee Downloading Malicious File
The X post said, “We detected unusual activity on select technology network systems, which we now believe is due to a cybersecurity event.
Our care teams have initiated procedures to ensure patient care delivery continues to be safe and as minimally impacted as possible,” the post said.
Cyber_Security_Channel
🔥 Scanning Networks – Pro Guide for Cybersecurity Specialists
→ Our partners at Hacklido are offering a revamped version of their bestselling digital product!
More material, the same price!
Making Choices for Stronger Vulnerability Management
Through our honeypot data and view into our cyber insurance policyholders' attack surfaces, security tools, and workflows, Coalition has identified the key technology choices that place businesses at risk — as well as the choices that are proving most effective.
Cyber_Security_Channel
Ransomware Attack Disrupts Operations Across London Hospitals
The UK National Health Service (NHS) also weighed in with a statement on Tuesday, noting that the incident forced hospitals to "prioritize" urgent work.
Emergency services across the UK continued to be available as usual, and the NHS directed patients to attend scheduled appointments unless informed otherwise.
Cyber_Security_Channel
📩 CyberWeekly by Hacklido — Issue №5; 13th of July, 2024
The CyberWeekly Newsletter powered by our partners (Hacklido) is back on your feed.
Get ready to explore all of the exhilarating things that are on the table in this release:
• WGU
• STOK
• EvilnoVNC
• Polyfill(.)io
• Pentesting AD
• Windows Remoting
• False File Immutability
• Evernote & Universal RCE
• Reverse engineering .NET
• Global AppSec 2024 Lisbon
• CVE|2021|40444, MSHTML
Find more exciting materials inside this version.
Read the full publication here.
-----
→ If your Company / Project / Community wants to become a partner of Cyber Security News...
Please, do not hesitate to contact us by sending a direct message: @cybersecadmin
-----
@Cyber_Security_Channel
A Hacker Posted Nearly 10 Billion Passwords Online — Likely the Biggest Leak Ever
The report claimed that not all the passwords in the file appeared to be new which means that they have been leaked previously and this increases the chance of “credential stuffing.”
As per the practice, a bad actor can take a user’s known password and try to reuse it to break into other accounts in their name, Cybernews, a cybersecurity-focused news outlet, explained.
Cyber_Security_Channel
Elon Musk Attacks WhatsApp Over Lack of Privacy
Musk, the owner of X (formerly Twitter), has renewed his criticism of WhatsApp over its handling of personal data.
The Tesla and SpaceX CEO questioned the platform's security practices in response to a user query on Saturday.
A user on X had asked, "If WhatsApp messages are end-to-end encrypted, why do we see ads related to the things we discussed in our chats?"
Musk briefly replied by saying: "WhatsApp is not secure at all."
This recent comment is part of a broader dispute between Musk and WhatsApp, which is owned by Mark Zuckerberg's conglomerate Meta.
@Cyber_Security_Channel
⚡️RockYou2024: 10 Billion Passwords Leaked in the Largest Compilation of All Time
According to the team’s analysis of RockYou2024, attackers developed the dataset by scouring the internet for data leaks, adding another 1.5 billion passwords from 2021 through to 2024 and increasing the dataset by 15 percent.
Cyber_Security_Channel
Are Your Kids Safe Online? Exploring the Unseen Risks Beyond The Screen With Parental Control
You can achieve that by understanding what they are interested in online, engaging in open conversations with them, making learning enjoyable, and utilizing the appropriate tools.
It’s about providing them with the knowledge they require in today’s tech-savvy world.
Cyber_Security_Channel
Your Phone's 5G Connection Is Vulnerable to Bypass, DoS Attacks
It's a remarkably accessible form of attack, they say, involving commonly overlooked vulnerabilities and equipment you can buy online for a couple of hundred dollars.
Cyber_Security_Channel
Authenticator for X, TikTok Exposes Personal User Info for 18 Months
Though the researcher limited his snooping, some data fields appeared to indicate the nature and purpose of the stored data, such as a chart with values such as "Impersonation_XCorp" and "uber-carshare-passport."
Cyber_Security_Channel
Apple AirPods Bug Allows Eavesdropping
"When your headphones are seeking a connection request to one of your previously paired devices, an attacker in Bluetooth range might be able to spoof the intended source device and gain access to your headphones," reported Apple in an advisory.
Cyber_Security_Channel
Google Software Engineers Can Take A Nap While Software Solves Problems
"We hope in the future this can close some of the blind spots of current automated vulnerability discovery approaches, and enable automated detection of 'unfuzzable' vulnerabilities," Google Project Zero software engineers Sergei Glazunov and Mark Brand wrote in a post.
Cyber_Security_Channel
Measure Success: Key Cybersecurity Resilience Metrics
Strengthening a company’s cyber resilience is an ongoing exercise as attackers launch more sophisticated attacks nearly every day.
It’s getting tougher to cope now that bad actors have added malicious AI to their arsenal.
But surviving these attacks rests almost entirely on the competence and reliability of the cyber resilience strategy.
Cyber_Security_Channel
Bitdefender Ultimate Small Business Security review: Versatile All-Round Protection For Low Headcounts
Larger businesses should look instead at Bitdefender also offers its Gravityzone Business Security platform, which can scale to any size – but there's a definite appeal to a security system that's designed specifically for small operations, working with limited budgets and minimal in-house expertise.
Cyber_Security_Channel
Ontario Government Introduces New Bill for Strengthening Cybersecurity and for Responsible AI
The Act aims to mitigate risks associated with cybersecurity and AI systems within Ontario’s public sector.
This includes organizations operating in Ontario’s critical public services such as those in the education, healthcare, and children’s services sectors.
Cyber_Security_Channel
Downtime Costs World’s Largest Companies $400 Billion a Year, According to Splunk Report
Downtime directly results in financial losses through lost revenue, regulatory fines and overtime wages for staff rectifying the issue.
The report also unveiled hidden costs that take longer to have an impact, like diminished shareholder value, stagnant developer productivity and reputational damage.
Cyber_Security_Channel
New North Korean Hacking Group Identified by Microsoft
To compromise its victims’ IT systems, Moonstone Sleet employs a combination of tried-and-tested and new techniques, including setting up fake companies and job opportunities to engage with potential targets, deploying trojanized versions of legitimate tools and creating malicious games.
Cyber_Security_Channel
IoT Vulnerabilities Skyrocket, Becoming Key Entry Point for Attackers
The riskiest devices observed in this category were:
— Electrocardiographs
— Medical information systems
— Medication dispensing systems
— Picture archiving and communication systems (PACS)
— Digital imaging and communications in medicine (DICOM) workstations
Cyber_Security_Channel