ru
Feedback
Cyber Security News

Cyber Security News

Открыть в Telegram
2025 год в цифрахsnowflakes fon
card fon
54 707
Подписчики
-324 часа
+277 дней
+31230 день
Архив постов
Hello! Please make sure to message us directly: @cybersecadmin
Показать все...
Hello! Please make sure to message us directly: @cybersecadmin
Показать все...
Why LinkedIn Developed Its Own AI-Powered Security Platform The organization decided to streamline and maximize its system to better protect its user base and itself. It decided to harness the power of AI to do so. Other elements include: 1. Prompt and error handling (automatically refining prompts based on evolving context and user needs). 2. A fallback mechanism in case the original query doesn’t produce adequate results (preparing secondary queries). 3. Learning from past queries (to enrich future queries in the same context) — and more. @Cyber_Security_Channel
Показать все...
👍 8🤡 4 1
Why LinkedIn Developed Its Own AI-Powered Security Platform The organization decided to streamline and maximize its system to better protect its user base and itself. It decided to harness the power of AI to do so. Other elements include: 1. Prompt and error handling (automatically refining prompts based on evolving context and user needs). 2. A fallback mechanism in case the original query doesn’t produce adequate results (preparing secondary queries). 3. Learning from past queries (to enrich future queries in the same context) — and more. @Cyber_Security_Channel
Показать все...
❗️Cyber Security News is looking for VOLUNTEERS to join our team: Round 3 Our community is continuously growing and we are looking to further expand our team of specialists who work on delivering daily content from the world of cybersecurity. At the moment we are searching for volunteers who would join our team and help us make this Community even better. We are willing to reply to every candidate who applies to this position and provide all the needed information and explanation about the work process.
Responsibilities
• Conduct research on the Internet • Format and publish posts to the channels of our community • Offer creative ideas that would enhance content published within our community
Requirements
• Research skills • Stable Wi-Fi connection • Strong interest in cybersecurity • A mobile device with installed Telegram app • Up to date knowledge about trending topics, current events, etc.
Offerings
Exchange of knowledge with colleagues from the field of cybersecurity (Team Chat) • Experience as a manager/admin of a large cybersecurity community (great project to add to your CV) • Opportunity to influence a growing community with a large audience (60,000+ members across different platforms) If you have a friend/colleague who would be interested in this opportunity, feel free to send them this post!
Contacts
If you are interested in the above position or have any further questions, feel free to reach out – @cybersecadmin - - - - - @Cyber_Security_Channel
Показать все...
👍 26 6🔥 2
Microsoft Apps for macOS Exposed to Library Injection Attacks This could allow attackers to inject any library and run arbitrary code within the compromised application. In turn, potentially leading to the exploitation of the app’s full set of permissions and entitlements. Cyber_Security_Channel
Показать все...
🔥 9 5😁 4👍 2😱 1🙈 1
Cyber Insurance Claims Are Declining as Firms Take Ransomware Recovery Into Their Own Hands These numbers are linked to an increasing number of ransomware recoveries, Databarracks said. In previous years, the majority of organizations chose to pay out in the event of an attack. Cyber_Security_Channel
Показать все...
👍 14 4🔥 1🤔 1
Repost from N/a
👍 19🔥 4🫡 4 2👨‍💻 2
SolarWinds Web Help Desk Vulnerability Possibly Exploited as Zero-Day However, SolarWinds did recommend that all customers apply the available patch, which is compatible with Web Help Desk version 12.8.3.1813 only, urging users of previous iterations to upgrade as soon as possible. The flaw impacts versions 12.4 to 12.8 of the helpdesk solution. Cyber_Security_Channel
Показать все...
👍 11 6
Microsoft Warns of Six Windows Zero-Days Being Actively Exploited This zero-day was reported by Ahn Lab and the South Korea’s National Cyber Security Center, suggesting it was used in a nation-state APT compromise. Microsoft did not release IOCs (indicators of compromise) or any other data to help defenders hunt for signs of infections. Cyber_Security_Channel
Показать все...
👍 14 3
Repost from N/a
gift
X 5
Розыгрыш призов5 подписок Telegram Premium на 6 месяцев
Дата объявления победителей
Все подписчики каналов (2):
N/a
N/a
1
~0
0.00%
Cyber Security News
54.7k
~5.2k
9.55%
👍 27👎 6🔥 6 2
🔐 The 10 Best Ways to Protect Your Crypto Assets. In the fast-paced world of cryptocurrencies, security is more important than ever. Here are the top 10 ways to protect your assets: 1. 🗄️ Choose Secure Storage Methods. • When dealing with small amounts, we recommend using hot wallets such as Trust Wallet or MetaMask. • For larger amounts, consider using cold wallets like Ledger or Trezor. 2. 🔑 Keep Your Private Keys Safe. • Never share your private keys. • Back them up regularly and store them in a safe place. • Avoid using online private key generators; choose local tools instead. • Do not store your keys in your phone's photo gallery, notes, or other folders. 3. 🛜 Be Careful When Socializing. • Be cautious on social media; don’t reveal details about your crypto assets. • Avoid sharing personal information and access to your wallets with strangers. 4. 📚 Stay Educated and Update Your Knowledge. • Continue your education on cryptocurrency security and stay informed about new threats. • Keep your cryptocurrency security knowledge up to date. 5. 🤝 Use Two-Factor Authentication. • Enable two-factor authentication (2FA) for all cryptocurrency-related accounts. • Use authentication apps such as Google Authenticator instead of SMS codes. ----- 🔜 To learn about the other 5 important ways to protect your crypto assets, visit the Channel of our new partners Match Systems. ----- @Cyber_Security_Channel
Показать все...
👍 20
Trump’s Campaign Confirms it Was Hacked, Blames Iran for Data Breach The campaign cited the report from Microsoft that said a presidential campaign had been targeted with an email phishing attack in June, according to reports. Cyber_Security_Channel
Показать все...
👍 9😁 4
⚡️HIGH ALERT Urgent Warning as ‘One of the Largest Data Breaches in History’ Targets 2.9 Billion – & Social Security Numbers at Risk The complaint claims the group put the database on sale for $3.5 million. This could be one of the largest breaches in history if proven accurate. At this time, it is unclear when the breach actually occurred. Additionally, the provider has yet to warn those who might've been affected. Cyber_Security_Channel
Показать все...
👍 10😱 5
Фото недоступноПоказать в Telegram
ℹ️ AI and Automation Are Misleading the Cybersecurity Industry Dr. Magda Chelly, is a cyber expert educated in Paris and currently based in Singapore. She informed LinkedIn News that there is also a misguided belief that organizations have already met their cybersecurity requirements. "Automation and AI [artificial intelligence] are handling some cybersecurity functions, making companies believe they can manage with smaller teams," she stated. "Furthermore, companies with well-established cybersecurity programs might assume they don't need to hire new talent, relying instead on their existing staff." P.S. Do you agree or disagree? Source: LinkedIn News Europe 📷 Image credit: Zibtek @Cyber_Security_Channel
Показать все...
👍 9 8👎 2😁 1
Would you be interested to participate in an official giveaway of free Telegram Premium subscriptions, hosted through the platform's functionality?Anonymous voting
  • Yes, that sounds interesting.
  • No, thank you, I don't need / already have Telegram Premium.
0 votes
👍 7 1
Superior Court of Justice of Mexico City Allegedly Breached The seller is offering the database for $1,000, with an option for full access at $5,000. Full access includes not only the database but also remote code execution (RCE) capabilities and an ESXi exploit, which could allow attackers to gain control over the court’s virtual infrastructure. Cyber_Security_Channel
Показать все...
👍 8👏 1
Cost of a Data Breach Surges 10% on Shadow Data Challenge Although average breach costs for the healthcare sector dropped from $10.9m to $9.8m over the period, in most other sectors, costs increased – notably finance, where average breach costs rose from $5.9m to $6.1m Cyber_Security_Channel
Показать все...
👍 10
Фото недоступноПоказать в Telegram
🔁 A Valuable Resource to Explore the World of Cryptocurrency — SecureShift Our partners created a streamlined trading experience with a useful function: → Simple purchase interface, displaying current cryptocurrency prices for direct buy/sell actions.
Key Points
Trading Fees: Flat 1% fee for both makers and takers, higher than the industry average. • Withdrawals: No additional fees beyond network costs, providing a cost-effective withdrawal process. • Crypto-Only Transactions: Requires users to have cryptocurrency, which may be a hurdle for beginners. • Platform Features: High transaction speed, optimal exchange rate locking, no exchange limits, no KYC, over 900 coins available In addiiton, the platform provides an affiliate program, offering up to 0.6% of total transaction volume. In summary, SecureShift.io emphasizes a user-friendly interface and an optimized crypto trading process. ----- #ad #paidpromotion #sponsored @Cyber_Security_Channel
Показать все...
👍 8 2
Cybersecurity Skills and Breaches: What Tech Pros Need to Know The results, however, remained mixed. “While many companies have diversity hiring goals, we aren’t seeing hiring numbers increase significantly among women, minorities and veterans,” said Rob Rashotte, vice president of global training and technical field enablement at Fortinet. “Despite 91% of respondents saying they prefer to hire candidates with technical certifications, 71% of organizations require potential new hires to hold a four-year degree”. Cyber_Security_Channel
Показать все...
👍 4 3