cyber_security_channel | News and Media

Telegram-канал cyber_security_channel - Cyber Security News

42585

Be Cyber Aware. Our vacancies channel: @CyberSecurityJobs Our chat: t.me/cybersecuritynewschat LinkedIn: https://www.linkedin.com/company/securitynews/ Facebook: https://www.facebook.com/BreakingCyberSecNews 📩 Cooperation: @cybersecadmin

Subscribe to a channel

Cyber Security News

UK Staffing Agency Exposes Gig Workers: Passports, Visas, and More Made Public

On August 5th, during a routine investigation, our research team discovered a misconfigured Amazon AWS S3 bucket, which they managed to attribute to GigtoGig.

Unfortunately, the database, which contained 217,000 sensitive files, was exposed to the public, meaning that anyone could access it without having to enter a username and password.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Africa Data Protection Association Launches E-Learning Platform on Data Protection

Available in French and English, the platform is aimed at a wide audience, including corporate executives, civil servants, and students, as well as any other profile wishing to learn.

It features interactive modules, case studies and online assessments, enabling learners to progress at their own pace.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

A Third of Organizations Suffer SaaS Data Breaches

Responding organizations said they worry most about lost IP (34%), reputational damage (30%) and breaches of customer data (27%).

Just 32% are confident in the security of corporate or customer data stored in their SaaS apps, down from 42% last year.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

NSA Issues Tips for Better Logging, Threat Detection in LotL Incidents

The guidelines are directed toward senior IT "decision makers," operational technology operators, and network administrator and operators, and focus on:

— Secure storage and log integrity
— Enterprise-approved logging policy
— Detection strategy for relevant threats
— Centralized log access and correlation

Cyber_Security_Channel

Читать полностью…

Cyber Security News

❗️Cyber Security News is looking for VOLUNTEERS to join our team: Round 3

Our community is continuously growing and we are looking to further expand our team of specialists who work on delivering daily content from the world of cybersecurity.

At the moment we are searching for volunteers who would join our team and help us make this Community even better.

We are willing to reply to every candidate who applies to this position and provide all the needed information and explanation about the work process.

Responsibilities


• Conduct research on the Internet
• Format and publish posts to the channels of our community
• Offer creative ideas that would enhance content published within our community

Requirements


• Research skills
• Stable Wi-Fi connection
• Strong interest in cybersecurity
• A mobile device with installed Telegram app
• Up to date knowledge about trending topics, current events, etc.

Offerings


Exchange of knowledge with colleagues from the field of cybersecurity (Team Chat)
• Experience as a manager/admin of a large cybersecurity community (great project to add to your CV)
• Opportunity to influence a growing community with a large audience (60,000+ members across different platforms)

If you have a friend/colleague who would be interested in this opportunity, feel free to send them this post!

Contacts


If you are interested in the above position or have any further questions, feel free to reach out – @cybersecadmin

- - - - -

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Cyber Insurance Claims Are Declining as Firms Take Ransomware Recovery Into Their Own Hands

These numbers are linked to an increasing number of ransomware recoveries, Databarracks said.

In previous years, the majority of organizations chose to pay out in the event of an attack.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Microsoft Warns of Six Windows Zero-Days Being Actively Exploited

This zero-day was reported by Ahn Lab and the South Korea’s National Cyber Security Center, suggesting it was used in a nation-state APT compromise.

Microsoft did not release IOCs (indicators of compromise) or any other data to help defenders hunt for signs of infections.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Trump’s Campaign Confirms it Was Hacked, Blames Iran for Data Breach

The campaign cited the report from Microsoft that said a presidential campaign had been targeted with an email phishing attack in June, according to reports.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

ℹ️ AI and Automation Are Misleading the Cybersecurity Industry

Dr. Magda Chelly, is a cyber expert educated in Paris and currently based in Singapore.

She informed LinkedIn News that there is also a misguided belief that organizations have already met their cybersecurity requirements.

"Automation and AI [artificial intelligence] are handling some cybersecurity functions, making companies believe they can manage with smaller teams," she stated.

"Furthermore, companies with well-established cybersecurity programs might assume they don't need to hire new talent, relying instead on their existing staff."

P.S. Do you agree or disagree?

Source: LinkedIn News Europe

📷 Image credit: Zibtek

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Cost of a Data Breach Surges 10% on Shadow Data Challenge

A
lthough average breach costs for the healthcare sector dropped from $10.9m to $9.8m over the period, in most other sectors, costs increased – notably finance, where average breach costs rose from $5.9m to $6.1m

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Cybersecurity Skills and Breaches: What Tech Pros Need to Know

The results, however, remained mixed.

“While many companies have diversity hiring goals, we aren’t seeing hiring numbers increase significantly among women, minorities and veterans,” said Rob Rashotte, vice president of global training and technical field enablement at Fortinet.

“Despite 91% of respondents saying they prefer to hire candidates with technical certifications, 71% of organizations require potential new hires to hold a four-year degree”.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Google Workspace Authentication Vulnerability Allowed Thousands of Emails to be Compromised

In its message sent to impacted emails, Google said it fixed the vulnerability within 72 hours of it being discovered and that it has since added “additional detection” processes to ensure it cannot be repeated.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

“Humans Remain the Weakest Link”: Pentesters’ 98% Success in Social Engineering

We monitored the responses with bated breath the day we sent the email. Within minutes, the first few employees clicked on the link.

By the end of the day, over 80% of the employees, including several high-ranking executives, had fallen for the ruse.

They clicked the link and entered their usernames and passwords without hesitation.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Most Airlines Except One Are Recovering From the CrowdStrike Tech Outage. The Feds Have Noticed

Transportation Secretary Pete Buttigieg spoke to Delta CEO Ed Bastian on Sunday about the airline’s high number of cancellations since Friday.

Buttigieg said his agency had received “hundreds of complaints” about Delta, and he expects the airline to provide hotels and meals for travelers who are delayed and to issue quick refunds to customers who don’t want to be rebooked on a later flight.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Wiz Walks Away From $23 Billion Deal with Google, Will Pursue IPO

Wiz has walked away from a $23 billion deal to be bought by Google, in what would have been the search giant’s largest-ever acquisition, telling employees it would pursue an IPO as previously planned.

Rappaport wrote that the company would focus on its next milestones: an initial public offering and $1 billion in annual recurring revenue.

The deal would have nearly doubled the $12 billion valuation of the startup from its most recent round of funding.

Wiz was founded in 2020 and has grown rapidly under Assaf Rappaport, who had been targeting an IPO as recently as May.

Discussion question for the community:

→ Do you think that was the right decision for them?

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

7 Password Rules to Live by in 2024, According to Security Experts

For a simpler, more practical collection of guidelines, try the Secure Our World website, run by the Cybersecurity & Infrastructure Security Agency (CISA).

It's targeted at an audience of consumers without a technical background, which makes it a solid source of information you can share with friends and family to help them deal with common threats.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Apple, TikTok, Google, and Facebook Give Your Data to Law Enforcement Up to 80% of the Time

Google also disclosed “some” information to law enforcement when asked. In May 2023, 81% of requests made by law enforcement resulted in the disclosure of “some information.”

Big tech companies often don’t disclose what information was shared and tend to just say that “some” of the information was shared with law enforcement.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

After Cybersecurity Lab Wouldn’t Use AV Software, US Accuses Georgia Tech of Fraud

One of the rules says that machines storing or accessing such "controlled unclassified information" need to have endpoint antivirus software installed.

But according to the US government, Antonakakis really, really doesn't like putting AV detection software on his lab's machines.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Why LinkedIn Developed Its Own AI-Powered Security Platform

The organization decided to streamline and maximize its system to better protect its user base and itself.

It decided to harness the power of AI to do so.

Other elements include:

1. Prompt and error handling (automatically refining prompts based on evolving context and user needs).

2. A fallback mechanism in case the original query doesn’t produce adequate results (preparing secondary queries).

3. Learning from past queries (to enrich future queries in the same context) — and more.

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

Microsoft Apps for macOS Exposed to Library Injection Attacks

This could allow attackers to inject any library and run arbitrary code within the compromised application.

In turn, potentially leading to the exploitation of the app’s full set of permissions and entitlements.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

SolarWinds Web Help Desk Vulnerability Possibly Exploited as Zero-Day

However, SolarWinds did recommend that all customers apply the available patch, which is compatible with Web Help Desk version 12.8.3.1813 only, urging users of previous iterations to upgrade as soon as possible.

The flaw impacts versions 12.4 to 12.8 of the helpdesk solution.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

🔐 The 10 Best Ways to Protect Your Crypto Assets.

In the fast-paced world of cryptocurrencies, security is more important than ever.

Here are the top 10 ways to protect your assets:

1. 🗄️ Choose Secure Storage Methods.

• When dealing with small amounts, we recommend using hot wallets such as Trust Wallet or MetaMask.
• For larger amounts, consider using cold wallets like Ledger or Trezor.

2. 🔑 Keep Your Private Keys Safe.

• Never share your private keys.
• Back them up regularly and store them in a safe place.
• Avoid using online private key generators; choose local tools instead.
• Do not store your keys in your phone's photo gallery, notes, or other folders.

3. 🛜 Be Careful When Socializing.

• Be cautious on social media; don’t reveal details about your crypto assets.
• Avoid sharing personal information and access to your wallets with strangers.

4. 📚 Stay Educated and Update Your Knowledge.

• Continue your education on cryptocurrency security and stay informed about new threats.
• Keep your cryptocurrency security knowledge up to date.

5. 🤝 Use Two-Factor Authentication.

• Enable two-factor authentication (2FA) for all cryptocurrency-related accounts.
• Use authentication apps such as Google Authenticator instead of SMS codes.

-----

🔜 To learn about the other 5 important ways to protect your crypto assets, visit the Channel of our new partners Match Systems.

-----

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

⚡️HIGH ALERT Urgent Warning as ‘One of the Largest Data Breaches in History’ Targets 2.9 Billion – & Social Security Numbers at Risk

The complaint claims the group put the database on sale for $3.5 million.

This could be one of the largest breaches in history if proven accurate.

At this time, it is unclear when the breach actually occurred.

Additionally, the provider has yet to warn those who might've been affected.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

Superior Court of Justice of Mexico City Allegedly Breached

The seller is offering the database for $1,000, with an option for full access at $5,000.

Full access includes not only the database but also remote code execution (RCE) capabilities and an ESXi exploit, which could allow attackers to gain control over the court’s virtual infrastructure.

Cyber_Security_Channel

Читать полностью…

Cyber Security News

🔁 A Valuable Resource to Explore the World of Cryptocurrency — SecureShift

Our partners created a streamlined trading experience with a useful function:

→ Simple purchase interface, displaying current cryptocurrency prices for direct buy/sell actions.

Key Points


Trading Fees: Flat 1% fee for both makers and takers, higher than the industry average.

Withdrawals: No additional fees beyond network costs, providing a cost-effective withdrawal process.

Crypto-Only Transactions: Requires users to have cryptocurrency, which may be a hurdle for beginners.

Platform Features: High transaction speed, optimal exchange rate locking, no exchange limits, no KYC, over 900 coins available

In addiiton, the platform provides an affiliate program, offering up to 0.6% of total transaction volume.

In summary, SecureShift.io emphasizes a user-friendly interface and an optimized crypto trading process.

-----

#ad #paidpromotion #sponsored

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

ℹ️ Cybersecurity Talent Isn't as in Demand as You Might Think (2024)

Although the need for security professionals is increasing in certain nations, several large economies are experiencing a decline.

In Europe, France witnessed a 4.5% decrease from May 2023 to 2024, marking this the third largest reduction among the 15 countries reviewed by LinkedIn's Economic Graph team.

The USA and Singapore had even greater declines.

Source: LinkedIn News Europe

📷 Image credit: Business Standard

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

🗂 GDPR Data Classification & Cyber Security Template

Ideal starting point for SMBs and developing companies.

Table of Contents


— '3rd party Access’ page
— 'Where' and 'Why' sheet
— 60 types of personal data
— 'User Permissions Tracker’

+ additional tools inside.

Special Bonus


'A Practical Guide to GDPR for Small Businesses' eBook (53 pages) for FREE!

Enjoy this generous deal from our partners...

Download your resources here:

https://gumroad.com/a/710907859/loChz

Читать полностью…

Cyber Security News

North Korean Hackers Target Critical Infrastructure for Military Gain

The threat actor primarily targets organizations in the:

— Energy
— Nuclear
— Defense
— Aerospace
— Engineering

Sectors, to exfiltrate information such as:

— Contract specification
— Design drawings
— Project data

Cyber_Security_Channel

Читать полностью…

Cyber Security News

🎙"80% of Your Security Comes from 20% of Your Controls"

→ 2024 Strategies for Balancing Cost and Security Controls with Mads Nielsen

[LIVE WEBINAR]

📅 Thursday, 1st of August
⏰ 2:00 PM, GMT+2

Mads will Cover


Identifying Misplaced Priorities: Which controls might you have wrong?

Top Priority Controls: Three essential controls for maximum impact.

Cost-Effective Playbook: Craft a CISO playbook that balances security needs and budget constraints.

CISO Priority Map: Hardening, Firewalls/WAP, Strong passwords.

Featured Insights


Recent Data Breaches & Budget Impacts: Learn from UnitedHealth Group and Trello incidents — recent high-profile data breaches.

CrowdStrike Incident: Understand the lessons from the recent CrowdStrike update failure.

Emerging 2024 Threats: Insights from the CrowdStrike 2024 Global Threat Report.

How to Attend?


Register via the following link → click here.

-----

#ad #paidpromotion #sponsored

@Cyber_Security_Channel

Читать полностью…

Cyber Security News

📩 CyberWeekly by Hacklido — Issue №6; 20th of July, 2024

Dive into the latest insights with the current edition of the CyberWeekly Newsletter, courtesy of Hacklido.

Uncover discussions on a wide range of themes, such as:

HIPPA
Snort IPS
Crowdstrike outage
CVE202427956 - SQLi
Healthcare ransmoware
RAG manipulation attacks
Oracle bulk patch updates
Active Directory pentesting
CVE202440626 - XSS (Stored)

There is much more to explore in this version.

Read the full article here.

-----

→ If your Company / Project / Community wants to become a partner of Cyber Security News...

Please, do not hesitate to contact us by sending a direct message to @cybersecadmin

-----

@Cyber_Security_Channel

Читать полностью…
Subscribe to a channel