Cyber Security News
Ir al canal en Telegram
Be Cyber Aware. Our chat: t.me/cybersecuritynewschat Our vacancies channel: @CyberSecurityJobs LinkedIn: https://www.linkedin.com/company/securitynews/ Improve Your Cyber Skills: https://linktr.ee/cybersecuritynews 📩 Cooperation: @cybersecadmin
Mostrar más2025 año en números

54 707
Suscriptores
-224 horas
+257 días
+29630 días
Archivo de publicaciones
Ontario Government Introduces New Bill for Strengthening Cybersecurity and for Responsible AI
The Act aims to mitigate risks associated with cybersecurity and AI systems within Ontario’s public sector.
This includes organizations operating in Ontario’s critical public services such as those in the education, healthcare, and children’s services sectors.
Cyber_Security_Channel
❤ 4👍 3
🔥 Scanning Networks – Pro Guide for Cybersecurity Specialists
→ Our partners at Hacklido are offering a revamped version of their bestselling digital product!
More material, the same price!You will learn: ↳ IDS & Firewall evasion ↳ Understanding networks ↳ Scanning, countermeasures and tools New additions: ✔️Real world examples ✔️Clear commands & terminology ✔️Practice questions with explanations for each unit Among many other useful topics… Time to become an even better Cybersecurity Specialist 🚀 Grab your personal copy here: → https://gumroad.com/a/631226579/ubvne
👍 8👏 2🔥 1🥰 1
Downtime Costs World’s Largest Companies $400 Billion a Year, According to Splunk Report
Downtime directly results in financial losses through lost revenue, regulatory fines and overtime wages for staff rectifying the issue.
The report also unveiled hidden costs that take longer to have an impact, like diminished shareholder value, stagnant developer productivity and reputational damage.
Cyber_Security_Channel
❤ 5
Making Choices for Stronger Vulnerability Management
Through our honeypot data and view into our cyber insurance policyholders' attack surfaces, security tools, and workflows, Coalition has identified the key technology choices that place businesses at risk — as well as the choices that are proving most effective.
Cyber_Security_Channel
👍 6
New North Korean Hacking Group Identified by Microsoft
To compromise its victims’ IT systems, Moonstone Sleet employs a combination of tried-and-tested and new techniques, including setting up fake companies and job opportunities to engage with potential targets, deploying trojanized versions of legitimate tools and creating malicious games.
Cyber_Security_Channel
👍 6⚡ 2
Ransomware Attack Disrupts Operations Across London Hospitals
The UK National Health Service (NHS) also weighed in with a statement on Tuesday, noting that the incident forced hospitals to "prioritize" urgent work.
Emergency services across the UK continued to be available as usual, and the NHS directed patients to attend scheduled appointments unless informed otherwise.
Cyber_Security_Channel
👍 7❤ 3
IoT Vulnerabilities Skyrocket, Becoming Key Entry Point for Attackers
The riskiest devices observed in this category were:
— Electrocardiographs
— Medical information systems
— Medication dispensing systems
— Picture archiving and communication systems (PACS)
— Digital imaging and communications in medicine (DICOM) workstations
Cyber_Security_Channel
👍 12
📩 CyberWeekly by Hacklido — Issue №2; 8th of June, 2024
Not much time has passed since we shared the first Issue of the CyberWeekly Newsletter from our partners at Hacklido.
A couple of days ago, they already published the second Issue from this helpful project.
It includes insights on the following topics:
• Mentorship in CTF
• Intel/AMD CPU internals
• Python for hackers — 10 projects
• Windows 11 TotalRecall dump tool
• Android Binder CVE — 2023-20938
• Finding your purpose in cybersecurity
And a lot more inside...
The full version can be found here.
-----
→ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin----- @Cyber_Security_Channel
👍 5❤ 3🔥 1
The Murky World of Password Leaks – and How to Check if You’ve Been Hit
Where does that leave us?
Perhaps the key takeaway is that even if you apply stringent personal security measures, your account credentials can still get caught up in such collections, primarily due to breaches at large companies.
This begs the question – how can you find out if your credentials have been compromised? Read on.
Cyber_Security_Channel
👍 7❤ 1
Photo unavailableShow in Telegram
Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack
This consisted of a Golang-based backdoor codenamed BRICKSTORM.
They were present within the rogue VMs and two web shells referred to as BEEFLUSH and BUSHWALK, allowing UNC5221 to execute arbitrary commands and communicate with command-and-control servers.
📷 Image Credit: The Hacker News
Cyber_Security_Channel
👍 11
How Do Password Managers Work and Why Do You Need One?
But suppose you’re like many people who resort to reusing their old passwords to create new accounts.
In that case, it’s safe to say that it’s only a matter of time before your data and online accounts are compromised.
And by extension, once your overused passwords are discovered, all the accounts associated with them are at risk.
Cyber_Security_Channel
👍 14❤ 1
This New Hacker Group is Targeting Software Developers With Phony Job Offers and Fake Projects
Microsoft said the group is backed by North Korea.
When it was first spotted, there was a lot of overlap between Moonstone Sleet and other North Korea-backed hacking groups.
Since then it has shifted to its bespoke infrastructure and attacks.
Cyber_Security_Channel
❤ 6👍 4
📩 CyberWeekly by Hacklido — Issue №1; 1st of June, 2024
At the beginning of the first month of the summer, our partners released a new version of their Newsletter.
It includes materials on the following topics:
• FlyingYeti
• Bug Bounty in 2024
• Hacking via WordPress
• Flipper zero cheat sheet
• Cybersecurity job updates
• Detecting Sandwich attacks in Ethereum
And much more...
You can find the full version of this release here.
-----
✨ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin
-----
@Cyber_Security_Channel
👍 6🔥 1
Attackers Target Check Point VPNs to Access Corporate Networks
They're also useful for malicious purposes. Rather than having to, say, exploit a publicly facing server, or a zero-day vulnerability, a hacker could use a remote access VPN for clean, unfettered access to an organization's IT environment.
From there, they could begin establishing persistence, probing for vulnerabilities, and much more.
How, though, do they get access to that VPN connection in the first place?
Cyber_Security_Channel
👍 11❤ 1🔥 1
Newly Detected Chinese Group Targeting Military, Government Entities
Spear-phishing emails employed in attacks over the past year included malicious archives containing LNK files designed to execute malicious commands instead, leading to the deployment of malware.
Cyber_Security_Channel
👍 9
International Malware Takedown Seized 100+ Servers
Between May 27 and May 29, police arrested four people, seized more than 100 servers and took control of more than 2,000 domains.
Arrests were made in Ukraine and Armenia, and servers were taken down or disrupted in Bulgaria, Canada, Germany, Lithuania, the Netherlands, Romania, Switzerland, the United Kingdom and the United States.
Cyber_Security_Channel
👍 5❤ 5
90+ Malicious Apps Totaling 5.5M Downloads Lurk on Google Play
Further, Zscaler's analysis shows that the apps most commonly used to hide malware on the mobile app store are tools such as the ones behind which Anatsa lurks, followed by personalization and photography apps.
Cyber_Security_Channel
👍 10
Photo unavailableShow in Telegram
ℹ️📸 Cyber Security News as a Media Partner for Conferences and Events!
It has been an honour to serve as the official Media Partner and Exhibitor of the Cybersec Europe 2024 Conference in Brussels, Belgium (29th-30th of May, 2024).
From speaker announcements and exclusive content to live coverage and booth materials, it has been a truly productive and mutually beneficial partnership.
Our team hopes that you enjoyed all the content around the Conference and found it interesting!
Thank you to everyone who made this collaboration happen!
P.S. Case Study about our work with Cybersec Europe 2024 is coming soon...
-----
🌐 Would you like Cyber Security News to become a Media Partner of your Conference/Event?
📩 Contact us to discuss the details → @cybersecadmin
-----
@Cyber_Security_Channel
👍 7❤ 5
📺 The Cyber Security News Booth at the Cybersec Europe 2024 Conference!
Our Team was happy to represent the Cyber Security News community with a booth that was located at the Partner Pavilion, next to the Main Stage.
It was a pleasure to serve as the Exhibitor at the Brussels Expo site, near prestigious 'neighbours' — companies and organisations such as:
• ISACA
• Women4Cyber
• European Cyber Security Organisation (ECSO)
• Solvay Brussels School of Economics and Management
Additionally, thank you very much to the Royal Jaarbeurs Team & Mick den Dijker for the opportunity and such a professional organisation throughout the event!
@Cyber_Security_Channel
👍 12
🤝 High-end Networking Service at the Cybersec Europe 2024 Conference
Throughout the convention, the Brussels Expo venue was equipped with a 'VIP Lounge' and the 'First Class Lounge', providing optimum spots for meetings and communication arrangements with other attendees.
In addition to the unqiue features such as noise isolation, both areas contained a wide selection of snacks and drinks for guests to enjoy during breaktimes.
@Cyber_Security_Channel
👍 4👎 1❤ 1
