🛡 Cybersecurity & Privacy 🛡 - News – Telegram
🛡 Cybersecurity & Privacy 🛡 - News
24.5K subscribers
88K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
📔 Subaru Bug Enabled Remote Vehicle Tracking and Hijacking 📔

A nowpatched vulnerability could have enabled threat actors to remotely control Subaru cars.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📢 UnitedHealth reveals 190 million US citizens were impacted by the Change Healthcare breach 📢

UnitedHealth has confirmed that 190 million US citizens were affected by the Change Healthcare cyber attack in 2024.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
📢 Developers can't get a handle on application security risks 📢

Research by Legit Security shows a majority of organizations have high risk applications in developer environments.

📖 Read more.

🔗 Via "ITPro"

----------
👁️ Seen on @cibsecurity
🦿 1Password Review: Features, Pricing & Security 🦿

1Passwords toptier security and sleek user interface make it a solid password manager to try this year. Read our handson 1Password review to learn more.

📖 Read more.

🔗 Via "Tech Republic"

----------
👁️ Seen on @cibsecurity
🖋️ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January] 🖋️

Welcome to your weekly cybersecurity scoop! Ever thought about how the same AI meant to protect our hospitals could also compromise them? This week, were breaking down the sophisticated world of AIdriven threats, key updates in regulations, and some urgent vulnerabilities in healthcare tech that need our attention. As we unpack these complex topics, we'll equip you with sharp insights to.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
🖋️ Do We Really Need The OWASP NHI Top 10? 🖋️

The Open Web Application Security Project has recently introduced a new Top 10 project the NonHuman Identity NHI Top 10. For years, OWASP has provided security professionals and developers with essential guidance and actionable frameworks through its Top 10 projects, including the widely used API and Web Application security lists.  Nonhuman identity security represents an emerging.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 CISOs Boost Crisis Simulation Budgets Amid High-Profile Cyber-Attacks 📔

74 of CISOs plan to increase their cyber crisis simulation budgets in 2025.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🦅 United Against Cybercrime: ASEAN Ministers Forge New Security Pathways 🦅

Overview The digital world in Southeast Asia is evolving rapidly, with nations striving to balance innovation, inclusivity, and security. The recently held 5th ASEAN Digital Ministers' Meeting ADGMIN in Bangkok, Thailand, marked a significant milestone in this journey. The meeting highlighted the importance of cybersecurity in shaping a resilient digital future for the region. The ASEAN Digital Masterplan 2025 ADM 2025 continues to serve as a guiding framework for fostering collaboration, enabling trust in digital services, and promoting the safe and inclusive use of technology. From addressing online scams to operationalizing the ASEAN Regional Computer Emergency Response Team CERT and advancing AI governance, the event showcased ASEAN's commitment to fortifying its digital eco...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
📔 New Phishing Campaign Targets Mobile Devices with Malicious PDFs 📔

A novel phishing campaign identified by Zimperium targets mobile users with malicious PDFs, impersonating USPS to steal credentials.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
📔 SaaS Breaches Skyrocket 300% as Traditional Defenses Fall Short 📔

Obsidian found that threat actors are focusing on SaaS applications to steal sensitive data, with most organizations' security measures not set up to deal with these attacks.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ The Case for Proactive, Scalable Data Protection 🕵️‍♂️

Whether you're facing growing data demands and increased cyber threats, or simply looking to futureproof your business, it's time to consider the longterm benefits of transitioning to a cloudfirst infrastructure.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🧠 How secure are green data centers? Consider these 5 trends 🧠

As organizations increasingly measure environmental impact towards their sustainability goals, many are focusing on their data centers. KPMG found that the majority of the top 100 companies measure and report on their sustainability efforts. Because data centers consume a large amount of energy, Gartner predicts that by 2027, three in four organizations will have implemented The post How secure are green data centers? Consider these 5 trends appeared first on Security Intelligence.

📖 Read more.

🔗 Via "Security Intelligence"

----------
👁️ Seen on @cibsecurity
🖋️ GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs 🖋️

Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Gitrelated projects that, if successfully exploited, could permit an attacker to gain unauthorized access to a user's Git credentials. "Git implements a protocol called Git Credential Protocol to retrieve credentials from the credential helper," GMO Flatt Security researcher Ry0taK, who discovered the flaws.

📖 Read more.

🔗 Via "The Hacker News"

----------
👁️ Seen on @cibsecurity
📔 Hidden Text Salting Disrupts Brand Name Detection Systems 📔

A new phishing tactic has been identified by Cisco Talos, using hidden text salting to evade email security measures.

📖 Read more.

🔗 Via "Infosecurity Magazine"

----------
👁️ Seen on @cibsecurity
🌊 Customer Success Manager 🌊

The post Customer Success Manager appeared first on UnderDefense.

📖 Read more.

🔗 Via "UnderDefense"

----------
👁️ Seen on @cibsecurity
🦅 IT Vulnerability Report: 7-Zip, Windows and Fortinet Fixes Urged by Cyble 🦅

Overview Cybles vulnerability intelligence report to clients last week examined highrisk flaws in 7Zip, Microsoft Windows, and Fortinet, among other products. It also examined dark web claims of a zeroday vulnerability in Apple iOS. In all, the report from Cyble Research and Intelligence Labs CRIL looked at 14 vulnerabilities and dark web exploits, including one vulnerability with a maximum CVSS severity score of 10.0 and another with more than 276,000 web exposures. Here are some of the vulnerabilities highlighted by Cybles vulnerability intelligence unit as meriting highpriority attention by security teams. The Top IT Vulnerabilities CVE202450603 is a 10.0severity OS Command Injection vulnerability in the Aviatrix Controller that could allow an unauthenticated user to ...

📖 Read more.

🔗 Via "CYBLE"

----------
👁️ Seen on @cibsecurity
👍1
🕵️‍♂️ Crisis Simulations: A Top 2025 Concern for CISOs 🕵️‍♂️

CISOs are planning to adjust their budgets this year to reflect their growing concerns for cybersecurity preparedness in the event of a cyberattack.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🪖 Privacy-Preserving Federated Learning – Future Collaboration and Continued Research 🪖

This post is the final blog in a series on privacypreserving federated learning . The series is a collaboration between NIST and the UK governments Responsible Technology Adoption Unit RTA, previously known as the Centre for Data Ethics and Innovation. Learn more and read all the posts published to date at NISTs Privacy Engineering Collaboration Space or RTAs blog . Reflections and Wider Considerations This is the final post in the series that began with reflections and learnings from the first USUK collaboration working with Privacy Enhancing Technologies PETs. Since the PETs Prize.

📖 Read more.

🔗 Via "NIST"

----------
👁️ Seen on @cibsecurity
🤔1
🕵️‍♂️ For $50, Cyberattackers Can Use GhostGPT to Write Malicious Code 🕵️‍♂️

Malware writing is only one of several malicious activities for which the new, uncensored generative AI chatbot can be used.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Apple Patches Actively Exploited Zero-Day Vulnerability 🕵️‍♂️

The Apple iOS 18.3 update fixes 28 other vulnerabilities identified by the tech company, though there is little information on them.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
🕵️‍♂️ Change Healthcare Breach Impact Doubles to 190M People 🕵️‍♂️

One of the largest data breaches in history was apparently twice as impactful as previously thought, with PII belonging to hundreds of millions of people sitting in the hands of cybercriminals.

📖 Read more.

🔗 Via "Dark Reading"

----------
👁️ Seen on @cibsecurity
👍1