uk
Feedback
Cyber Security News

Cyber Security News

Відкрити в Telegram

Be Cyber Aware. Our chat: t.me/cybersecuritynewschat Our vacancies channel: @CyberSecurityJobs LinkedIn: https://www.linkedin.com/company/securitynews/ Improve Your Cyber Skills: https://linktr.ee/cybersecuritynews 📩 Cooperation: @cybersecadmin

Показати більше
2025 рік у цифрахsnowflakes fon
card fon
54 707
Підписники
-224 години
+257 днів
+29630 день
Архів дописів
Ontario Government Introduces New Bill for Strengthening Cybersecurity and for Responsible AI The Act aims to mitigate risks associated with cybersecurity and AI systems within Ontario’s public sector. This includes organizations operating in Ontario’s critical public services such as those in the education, healthcare, and children’s services sectors. Cyber_Security_Channel
Показати все...
4👍 3
🔥 Scanning Networks – Pro Guide for Cybersecurity Specialists → Our partners at Hacklido are offering a revamped version of their bestselling digital product!
More material, the same price!
You will learn: ↳ IDS & Firewall evasion ↳ Understanding networks ↳ Scanning, countermeasures and tools New additions: ✔️Real world examples ✔️Clear commands & terminology ✔️Practice questions with explanations for each unit Among many other useful topics… Time to become an even better Cybersecurity Specialist 🚀 Grab your personal copy here:https://gumroad.com/a/631226579/ubvne
Показати все...
👍 8👏 2🔥 1🥰 1
Downtime Costs World’s Largest Companies $400 Billion a Year, According to Splunk Report Downtime directly results in financial losses through lost revenue, regulatory fines and overtime wages for staff rectifying the issue. The report also unveiled hidden costs that take longer to have an impact, like diminished shareholder value, stagnant developer productivity and reputational damage. Cyber_Security_Channel
Показати все...
5
Making Choices for Stronger Vulnerability Management Through our honeypot data and view into our cyber insurance policyholders' attack surfaces, security tools, and workflows, Coalition has identified the key technology choices that place businesses at risk — as well as the choices that are proving most effective. Cyber_Security_Channel
Показати все...
👍 6
New North Korean Hacking Group Identified by Microsoft To compromise its victims’ IT systems, Moonstone Sleet employs a combination of tried-and-tested and new techniques, including setting up fake companies and job opportunities to engage with potential targets, deploying trojanized versions of legitimate tools and creating malicious games. Cyber_Security_Channel
Показати все...
👍 6 2
Ransomware Attack Disrupts Operations Across London Hospitals The UK National Health Service (NHS) also weighed in with a statement on Tuesday, noting that the incident forced hospitals to "prioritize" urgent work. Emergency services across the UK continued to be available as usual, and the NHS directed patients to attend scheduled appointments unless informed otherwise. Cyber_Security_Channel
Показати все...
👍 7 3
IoT Vulnerabilities Skyrocket, Becoming Key Entry Point for Attackers The riskiest devices observed in this category were: — Electrocardiographs — Medical information systems — Medication dispensing systems — Picture archiving and communication systems (PACS) — Digital imaging and communications in medicine (DICOM) workstations Cyber_Security_Channel
Показати все...
👍 12
📩 CyberWeekly by Hacklido — Issue №2; 8th of June, 2024 Not much time has passed since we shared the first Issue of the CyberWeekly Newsletter from our partners at Hacklido. A couple of days ago, they already published the second Issue from this helpful project. It includes insights on the following topics: Mentorship in CTF Intel/AMD CPU internals Python for hackers — 10 projects Windows 11 TotalRecall dump tool Android Binder CVE — 2023-20938 Finding your purpose in cybersecurity And a lot more inside... The full version can be found here. -----
→ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin
----- @Cyber_Security_Channel
Показати все...
👍 5 3🔥 1
The Murky World of Password Leaks – and How to Check if You’ve Been Hit Where does that leave us? Perhaps the key takeaway is that even if you apply stringent personal security measures, your account credentials can still get caught up in such collections, primarily due to breaches at large companies. This begs the question – how can you find out if your credentials have been compromised? Read on. Cyber_Security_Channel
Показати все...
👍 7 1
Фото недоступнеДивитись в Telegram
Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack This consisted of a Golang-based backdoor codenamed BRICKSTORM. They were present within the rogue VMs and two web shells referred to as BEEFLUSH and BUSHWALK, allowing UNC5221 to execute arbitrary commands and communicate with command-and-control servers. 📷 Image Credit: The Hacker News Cyber_Security_Channel
Показати все...
👍 11
How Do Password Managers Work and Why Do You Need One? But suppose you’re like many people who resort to reusing their old passwords to create new accounts. In that case, it’s safe to say that it’s only a matter of time before your data and online accounts are compromised. And by extension, once your overused passwords are discovered, all the accounts associated with them are at risk. Cyber_Security_Channel
Показати все...
👍 14 1
This New Hacker Group is Targeting Software Developers With Phony Job Offers and Fake Projects Microsoft said the group is backed by North Korea. When it was first spotted, there was a lot of overlap between Moonstone Sleet and other North Korea-backed hacking groups. Since then it has shifted to its bespoke infrastructure and attacks. Cyber_Security_Channel
Показати все...
6👍 4
📩 CyberWeekly by Hacklido — Issue №1; 1st of June, 2024 At the beginning of the first month of the summer, our partners released a new version of their Newsletter. It includes materials on the following topics: FlyingYeti Bug Bounty in 2024 Hacking via WordPress Flipper zero cheat sheet Cybersecurity job updates Detecting Sandwich attacks in Ethereum And much more... You can find the full version of this release here. ----- ✨ If your company / project / community wants to become a partner of Cyber Security News, feel free to reach out: @cybersecadmin ----- @Cyber_Security_Channel
Показати все...
👍 6🔥 1
Attackers Target Check Point VPNs to Access Corporate Networks They're also useful for malicious purposes. Rather than having to, say, exploit a publicly facing server, or a zero-day vulnerability, a hacker could use a remote access VPN for clean, unfettered access to an organization's IT environment. From there, they could begin establishing persistence, probing for vulnerabilities, and much more. How, though, do they get access to that VPN connection in the first place? Cyber_Security_Channel
Показати все...
👍 11 1🔥 1
Newly Detected Chinese Group Targeting Military, Government Entities Spear-phishing emails employed in attacks over the past year included malicious archives containing LNK files designed to execute malicious commands instead, leading to the deployment of malware. Cyber_Security_Channel
Показати все...
👍 9
International Malware Takedown Seized 100+ Servers Between May 27 and May 29, police arrested four people, seized more than 100 servers and took control of more than 2,000 domains. Arrests were made in Ukraine and Armenia, and servers were taken down or disrupted in Bulgaria, Canada, Germany, Lithuania, the Netherlands, Romania, Switzerland, the United Kingdom and the United States. Cyber_Security_Channel
Показати все...
👍 5 5
90+ Malicious Apps Totaling 5.5M Downloads Lurk on Google Play Further, Zscaler's analysis shows that the apps most commonly used to hide malware on the mobile app store are tools such as the ones behind which Anatsa lurks, followed by personalization and photography apps. Cyber_Security_Channel
Показати все...
👍 10
Фото недоступнеДивитись в Telegram
ℹ️📸 Cyber Security News as a Media Partner for Conferences and Events! It has been an honour to serve as the official Media Partner and Exhibitor of the Cybersec Europe 2024 Conference in Brussels, Belgium (29th-30th of May, 2024). From speaker announcements and exclusive content to live coverage and booth materials, it has been a truly productive and mutually beneficial partnership. Our team hopes that you enjoyed all the content around the Conference and found it interesting! Thank you to everyone who made this collaboration happen! P.S. Case Study about our work with Cybersec Europe 2024 is coming soon... ----- 🌐 Would you like Cyber Security News to become a Media Partner of your Conference/Event? 📩 Contact us to discuss the details → @cybersecadmin ----- @Cyber_Security_Channel
Показати все...
👍 7 5
📺 The Cyber Security News Booth at the Cybersec Europe 2024 Conference! Our Team was happy to represent the Cyber Security News community with a booth that was located at the Partner Pavilion, next to the Main Stage. It was a pleasure to serve as the Exhibitor at the Brussels Expo site, near prestigious 'neighbours' — companies and organisations such as: • ISACA • Women4Cyber • European Cyber Security Organisation (ECSO) • Solvay Brussels School of Economics and Management Additionally, thank you very much to the Royal Jaarbeurs Team & Mick den Dijker for the opportunity and such a professional organisation throughout the event! @Cyber_Security_Channel
Показати все...
👍 12
🤝 High-end Networking Service at the Cybersec Europe 2024 Conference Throughout the convention, the Brussels Expo venue was equipped with a 'VIP Lounge' and the 'First Class Lounge', providing optimum spots for meetings and communication arrangements with other attendees. In addition to the unqiue features such as noise isolation, both areas contained a wide selection of snacks and drinks for guests to enjoy during breaktimes. @Cyber_Security_Channel
Показати все...
👍 4👎 1 1