en
Feedback
Cyber Security News

Cyber Security News

Open in Telegram

Be Cyber Aware. Our chat: t.me/cybersecuritynewschat Our vacancies channel: @CyberSecurityJobs LinkedIn: https://www.linkedin.com/company/securitynews/ Improve Your Cyber Skills: https://linktr.ee/cybersecuritynews ๐Ÿ“ฉ Cooperation: @cybersecadmin

Show more
2025 year in numberssnowflakes fon
card fon
54 706
Subscribers
-324 hours
+277 days
+31230 days
Posts Archive
๐Ÿ“ฉ CyberWeekly by Hacklido โ€” Issue โ„–7; 28th of September, 2024 Long time no see, but here is the latest CyberWeekly Newsletter, from our partners at Hacklido. Dive in to explore the following industry topics: โ€ข EPA โ€ข NIST โ€ข CUPS โ€ข Patches โ€ข Malware โ€ข Logistics โ€ข ATG systems โ€ข Cyberattacks โ€ข Cybersecurity โ€ข Vulnerabilities โ€ข Transportation โ€ข Water treatment โ€ข Remote code execution โ€ข Authentication guidelines Along with a variety of other useful materials. Find the full article via this link. ----- โ†’ If your Company / Project / Community wants to become a partner of Cyber Security News... Please, do not hesitate to contact us by sending a direct message to @cybersecadmin ----- @Cyber_Security_Channel
Show all...
๐Ÿ“ฉ CyberWeekly by Hacklido โ€” Issue โ„–7; 28th of September, 2024 Long time no see, but here is the latest CyberWeekly Newsletter, from our partners at Hacklido. Dive in to explore the following industry topics: โ€ข EPA โ€ข NIST โ€ข CUPS โ€ข Patches โ€ข Malware โ€ข Logistics โ€ข ATG systems โ€ข Cyberattacks โ€ข Cybersecurity โ€ข Vulnerabilities โ€ข Transportation โ€ข Water treatment โ€ข Remote code execution โ€ข Authentication guidelines Along with a variety of other useful materials. Find the full article here. ----- โ†’ If your Company / Project / Community wants to become a partner of Cyber Security News... Please, do not hesitate to contact us by sending a direct message to @cybersecadmin ----- @Cyber_Security_Channel
Show all...
Millions of Kia Cars Were Vulnerable to Remote Hacking: Researchers After registering on the Kia dealer website โ€“ a link to it is sent via email to new users for registration purposes โ€“ using the same request used when registering to the ownersโ€™ portal, the researchers could generate an access token that allowed them to call the backend dealer APIs. Cyber_Security_Channel
Show all...
๐Ÿ‘ 9๐Ÿ‘ 2๐Ÿ˜ 2โค 1
Thousands of US Congress Emails Exposed to Takeover However, the share of US political email addresses exposed on the dark web (20%) pales in comparison to that of British MPs (68%) and members of the European Parliament (44%), which the researchers discovered in an earlier iteration of the study. Cyber_Security_Channel
Show all...
๐Ÿ‘ 5๐Ÿ‘ 4๐Ÿคก 3โค 2๐Ÿค” 1๐Ÿคฉ 1๐Ÿคฃ 1
Severe Unauthenticated RCE Flaw (CVSS 9.9) in GNU/Linux Systems Awaiting Full Disclosure Interestingly, there has been a delay in assigning Common Vulnerabilities and Exposures (CVE) identifiers to this issue. Margaritelli suggests that there should be at least three CVEs assigned, possibly up to six, due to the multifaceted nature of the vulnerabilities involved. Cyber_Security_Channel
Show all...
๐Ÿ‘ 14๐Ÿ”ฅ 8โค 2
Google Now Syncing Passkeys Across Desktop, Android Devices To ensure that passkeys are kept end-to-end encrypted and protected, the internet giant has introduced a new Google Password Manager PIN, that the user will be prompted to provide when attempting to access a passkey. Cyber_Security_Channel
Show all...
๐Ÿ‘ 12๐Ÿ”ฅ 6๐Ÿ•Š 3โค 2
How Hackers Are Using Legitimate Tools to Distribute Phishing Links These platforms are particularly popular in the education sector, a growing target for threat actors, as well as being commonly used by businesses and creative professionals. Cyber_Security_Channel
Show all...
๐Ÿ‘ 11โค 2
Where Are Governments in Their Zero-Trust Journey? The deadline is prompting action. With a goal in sight, federal agencies have a systematic and organized path toward stronger defenses. In an era where cyber threats advance in sophistication and intensity, this proactive stance is paramount for securing critical systems and data. This is something state and local governments must consider when fortifying for the future. Cyber_Security_Channel
Show all...
๐Ÿ‘ 15โค 3๐Ÿ”ฅ 1
Google AI Model Faces EU Data Privacy Investigation Irelandโ€™s Data Protection Commission (DPC) is examining whether the tech giant performed a legally required data protection impact assessment. The organization is examining whether this action was done before processing European Union residentsโ€™ personal data. Such details were used in its Pathways Language Model 2, according to a press release which was published on Thursday 12th of September. A Google spokesman provided this statement: โ€œWe take seriously our obligations under the GDPR and will work constructively with the DPC to answer their questions.โ€ @Cyber_Security_Channel
Show all...
๐Ÿ‘ 9โค 8๐Ÿ”ฅ 3๐Ÿ‘ 2๐Ÿ˜ 2
TfL Admits Some Services Are Down Following Cyber-Attack โ€œDue to the ongoing TfL-wide cybersecurity incident, we are currently able to process only a limited number of booking requests,โ€ the notice read. โ€œIn addition, many of our staff have limited access to systems and email and, as a result, we may be delayed or unable to respond to your query.โ€ Cyber_Security_Channel
Show all...
๐Ÿ‘ 8๐Ÿคก 4โค 2๐Ÿ”ฅ 2๐Ÿ‘ 2๐Ÿค 2๐Ÿ‘Œ 1
Photo unavailableShow in Telegram
๐Ÿค Opportunity to Support the Cyber Security News Community If you are looking to create a free Revolut account: 1. Do it via this link. 2. Follow the steps in the image. Once you complete all the requirements, message us on Telegram @cybersecadmin. To express our graditude, we will send you a unique cybersecurity-related gift. Enjoy your Revolut account, and thank you for the support! ----- @Cyber_Security_Channel
Show all...
๐Ÿ‘ 15๐Ÿ”ฅ 7โค 5๐Ÿ‘ 2๐Ÿ™ˆ 1
UK Staffing Agency Exposes Gig Workers: Passports, Visas, and More Made Public On August 5th, during a routine investigation, our research team discovered a misconfigured Amazon AWS S3 bucket, which they managed to attribute to GigtoGig. Unfortunately, the database, which contained 217,000 sensitive files, was exposed to the public, meaning that anyone could access it without having to enter a username and password. Cyber_Security_Channel
Show all...
๐Ÿ‘ 14โค 8๐Ÿ˜ 3๐Ÿ‘Œ 2๐Ÿ‘Ž 1๐Ÿ”ฅ 1๐Ÿ™ˆ 1๐Ÿซก 1
7 Password Rules to Live by in 2024, According to Security Experts For a simpler, more practical collection of guidelines, try the Secure Our World website, run by the Cybersecurity & Infrastructure Security Agency (CISA). It's targeted at an audience of consumers without a technical background, which makes it a solid source of information you can share with friends and family to help them deal with common threats. Cyber_Security_Channel
Show all...
๐Ÿ‘ 29โค 8๐Ÿ‘ 6๐Ÿ”ฅ 4๐Ÿ˜ 3๐Ÿ˜ฑ 3
Repost from N/a
โค 12๐Ÿ‘ 9๐Ÿ˜ก 9๐Ÿ”ฅ 2
Africa Data Protection Association Launches E-Learning Platform on Data Protection Available in French and English, the platform is aimed at a wide audience, including corporate executives, civil servants, and students, as well as any other profile wishing to learn. It features interactive modules, case studies and online assessments, enabling learners to progress at their own pace. Cyber_Security_Channel
Show all...
๐Ÿ‘ 22๐Ÿ‘ 6โค 3๐Ÿ˜ 3๐Ÿค” 3๐Ÿ™ˆ 3๐Ÿ”ฅ 2๐Ÿคก 2
Repost from N/a
gift
X 5
Prizes of the draw5 Telegram Premium subscriptions for 3 months
Completion date
All channel subscribers (2):
N/a
N/a
1
~0
0.00%
Cyber Security News
54.7k
~5.2k
9.55%
๐Ÿ‘ 31๐Ÿซก 8๐Ÿ”ฅ 6
Apple, TikTok, Google, and Facebook Give Your Data to Law Enforcement Up to 80% of the Time Google also disclosed โ€œsomeโ€ information to law enforcement when asked. In May 2023, 81% of requests made by law enforcement resulted in the disclosure of โ€œsome information.โ€ Big tech companies often donโ€™t disclose what information was shared and tend to just say that โ€œsomeโ€ of the information was shared with law enforcement. Cyber_Security_Channel
Show all...
๐Ÿ‘ 17๐Ÿคฌ 5๐Ÿคฎ 3โค 1๐Ÿ”ฅ 1
A Third of Organizations Suffer SaaS Data Breaches Responding organizations said they worry most about lost IP (34%), reputational damage (30%) and breaches of customer data (27%). Just 32% are confident in the security of corporate or customer data stored in their SaaS apps, down from 42% last year. Cyber_Security_Channel
Show all...
๐Ÿ”ฅ 6๐Ÿ‘ 5โค 4๐Ÿ˜ฑ 1
After Cybersecurity Lab Wouldnโ€™t Use AV Software, US Accuses Georgia Tech of Fraud One of the rules says that machines storing or accessing such "controlled unclassified information" need to have endpoint antivirus software installed. But according to the US government, Antonakakis really, really doesn't like putting AV detection software on his lab's machines. Cyber_Security_Channel
Show all...
๐Ÿ‘ 12โค 9๐Ÿค” 3
NSA Issues Tips for Better Logging, Threat Detection in LotL Incidents The guidelines are directed toward senior IT "decision makers," operational technology operators, and network administrator and operators, and focus on: โ€” Secure storage and log integrity โ€” Enterprise-approved logging policy โ€” Detection strategy for relevant threats โ€” Centralized log access and correlation Cyber_Security_Channel
Show all...
โค 10๐Ÿ”ฅ 5