AI DevwWrld Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Cyberpills.news

Miter and CISA present an extension for the Caldera platform for the security of critical infrast...Improve the resilience of critical infrastructures through the innovative Caldera extension for OTThe MITER Corporation and the US cybersecurity agency, CISA, have collaborated to create the “Caldera for OT” extension to protect critical infrastructure such as energy, transportation and water supplies by simulating hacker attacks to improve security and system defenses.

Data security remains an ongoing concern for TikTokTikTok's efforts to improve data protection safeguards and regain user trustTikTok has taken steps to improve the security of user data, relying on a security company in the United Kingdom. The Clover project will guarantee the protection of European data, respecting the GDPR. By April 2024, data will be stored in three secure data centers. These actions will dispel concerns...

Freecycle.org reports data breach, urges users to reset passwordsEnhancing security measures: Freecycle.org takes immediate action following data breachFreecycle.org, a recycling platform, suffered a data breach, prompting the organization to recommend password resets for its millions of users. The compromised data includes usernames, email addresses, and hashed passwords. Freecycle.org is investigating the incident and advising users to remain vigilant...

Okta: social engineering attacks targeting IT help desks to gain control of privileged accounts and disable...Details of the attack and recommendations for protecting privileged accountsOkta, an identity and access management company, has revealed a series of targeted attacks on their customers' IT service desks in the US. Attackers used social engineering to gain control over privileged accounts. Okta suggests implementing new security measures, such as phishing-resistant authentications,...

Privacy Guarantor fines company for improper use of the video surveillance systemBiometric video surveillance system and continuous monitoring of the position of accused employeesThe Privacy Guarantor has fined a company for the improper use of the video surveillance system, which included fingerprinting and geographical tracking of employees. The company processed worker data without authorization and used biometric data without legal basis, violating the GDPR.

LockBit hackers steal sensitive british military defense documentsSuspicions of a russian cyber attack on the UK Ministry of DefenceThe UK Ministry of Defense has been attacked by Russian hackers, according to reports on social media. The stolen information was shared on the dark web. The UK's National Cyber Security Center has issued a threat alert, urging companies to be alert and stay safe.

Exploring the world of iPhone hacks without jailbreakDiscover all the secrets to fully personalize your iPhone without risksIn this article, we explore safe alternatives to customize iPhone without jailbreak, avoiding risks such as warranty loss and security threats. Third-party apps offer customization options, better security, performance optimization, and hidden features without compromising the quality of user exp...

Better cybersecurity with a new quantum random number generatorA quantum random number generator based on a perovskite light-emitting diodeA study conducted at Linköping University in Sweden has led to the development of a new quantum random number generator (QRNG) that promises to improve the security of digital communications. This technology, based on the use of perovskite light-emitting diodes, could be adopted within 5 years to protect...

Seventh day of cyber attacks: NoName057(16) hits banks and telecommunicationsThe importance of protecting digital infrastructures against hacktivist groupsNumerous DDoS cyber attacks have hit Italy by a Russian hacker group called NoName057(16). Banca Popolare di Bari, Poste Mobile and Coop Voce were the main targets. To mitigate attacks, geolocking and other techniques such as application firewalls can be used.

Critical security vulnerabilities expose users' personal information of Smart Chastity Cage MakerThe dangerous consequences of neglecting cybersecurity in IoT devicesA recent security discovery has revealed serious flaws in an internet-connected chastity device for males, exposing personal information. The company ignored warnings and took no action to fix the issues. The website also exposed PayPal payment logs, raising further concerns about user privacy.

Investigation finds violations by former chairman of Metropolitan District AuthorityUncovering systemic irregularities: an in-depth examination of MDC chairman's unauthorized actionsAn investigation reveals that William DiBella, former state senator and MDC chairman, violated agency rules by authorizing unnecessary legal work. Recommendations to prevent such violations in the future have been made.

Harness the power of cloud computing in healthcare and fintechA revolutionary innovation that changes the face of healthcare and financial servicesThe article discusses how cloud computing is transforming the healthcare and fintech industries, offering scalability, security and cost reduction. The cloud also fosters innovation, enabling the rapid development of new services and the integration of new technologies such as artificial intellig...

Recall of a children's snack after its website was found to serve adult contentLidl is recalling four types of PAW Patrol themed snacks across the UKKids snack recalled after website served adult content. Error in the advertising system causes the accident. The company apologizes and takes preventive measures. Importance of online parental supervision. Filtering software recommended for greater security.

Phishing and sex extortion: how to defend yourself and protect your reputationHow to defend yourself from online scams and preserve your privacy: advice and security measures to adoptA new sex-extortion scam scheme is targeting YouPorn users, threatening to publicly release a sex tape unless they pay a sum in cryptocurrency. Attackers exploit users' emotional vulnerability but experts advise not to give in to blackmail and to report the incident to the competent authorities.

Chrome extensions: beware of password theftMalicious Chrome extensions: how to protect your passwordsSome Chrome extensions may steal plaintext passwords from websites. Malicious extensions access data stored by the browser and recover passwords without encryption. It is recommended to uninstall suspicious extensions and use a reliable password manager to protect your credentials. Keep your browser...

MSSQL database under attack by Freeworld ransomwareThe Freeworld ransomware threat is putting MSSQL databases at risk: protect yourself with these security measuresFreeworld ransomware is attacking MSSQL databases, encrypting data and demanding a ransom to restore access. Organizations need to take security measures such as updating software and protecting backups to avoid damage and financial loss.

Personal data security in test projects: best practices and complianceThe importance of data protection measures in testing technology projectsThe article highlights the importance of personal data security during the testing phase of IT projects. We recommend using best practices such as isolating test environments, implementing strict access policies, and encrypting sensitive data. This ensures that personal data is processed securely and...

Enhancing cybersecurity for Market Infrastructure InstitutionsStrengthening cyber defenses: safeguarding MIIs from growing threatsThis article highlights the importance of dark web monitoring for Market Infrastructure Institutions (MIIs) to combat cybersecurity threats. It discusses the significance of brand abuse and SEBI's comprehensive cybersecurity guidelines in protecting MIIs. By embracing these guidelines, MIIs can proactively...

Free decryptor available for Key Group ransomwareThe Free Decryptor for Key Group Ransomware: The Solution to Recover Encrypted Files Without Paying RansomFree decryptor available for Key Group ransomware. A tool that allows you to unlock encrypted files without paying the required ransom. Important to consult an IT professional for the correct application. Prevent future infections with antivirus and regular backups.

Economic impact of cybercrime in Germany: 206 billion euros lost by 2023The devastating impact of cybercrime on the German economy: a warning for cybersecurityAccording to a recent survey, Germany will lose 206 billion euros by 2023 due to cybercrime, with serious consequences for key sectors of the economy such as manufacturing, finance and telecommunications. It is therefore essential that companies invest in advanced cybersecurity solutions to protect their...

New SEC rulemaking: everything companies need to know about cybersecurity compliance rulesHow to ensure cybersecurity compliance and protect company dataThe article explores the SEC's new rules on cybersecurity compliance, with a focus on measures companies must take to protect data. Google Cloud is recommended as a reliable solution for ensuring compliance and offering advanced security services. Preventative measures such as reviewing security policies...

SandWorm: the feared hacker group that threatens UkraineThe danger of SandWorm: a group of hackers that threatens international securityThe article talks about the hacker group called SandWorm and their targeted cyber attacks in Ukraine. The group uses sophisticated phishing techniques and vulnerability exploits to infiltrate networks and steal sensitive information. In particular, their advanced malware called “Chisel” is mentioned. The...

First steps towards the integration between privacy and cybersecurityThe synergistic dialogue between privacy and cybersecurity professionals for more effective protection of sensitive dataThe Cyber & Privacy Forum in Verona is an event that aims to promote communication between privacy and cybersecurity professionals, in order to create a common language. Industry experts will be present to discuss data protection as an integrated subject. Research will also be conducted to gather feedback...

Improving application performance: analysis and optimizationsThe process of optimizing and improving system resources in web applicationsThe article explains that performance conversion is a technical process that improves the efficiency of applications. On websites, code can be translated to make it faster and more efficient, reducing response times and improving user experience. This can reduce costs and requires expertise to accomplish...

DreamBus botnet exploits RocketMQ vulnerability to spread a cryptocurrency minerAn in-depth look at the DreamBus botnet's dissemination tactics and impacts on enterprise systemsThe DreamBus botnet exploits a vulnerability in RocketMQ software to spread a cryptocurrency miner. This malware infects systems and uses computing resources for mining. It is important to update your software, set up a firewall and use an advanced security solution to protect yourself from Dream...

Fight against cybercrime: the FBI intervenes and dismantles a vast network of infected computersThe joint action of the FBI and international partners to neutralize the Qakbot banking malwareThe FBI has dismantled the network of computers infected with Qakbot, a dangerous banking malware. This action represents a great victory in the fight against cybercrime. Users are advised to take security measures to protect their data.

China's cyber security summit and national virus databaseThe summit tackles emerging cyber threats and emphasizes the need for a comprehensive national computer virus databaseChina's cyber security summit focused on creating a national computer virus database to safeguard against cyber threats. Attacks on organizations are increasing, particularly in critical information infrastructure sectors. Coordinated efforts between the National Computer Virus Emergency Response Center...

The latest cybersecurity incidents that make the newsPeople, technology and security: the impact of the latest cyber incidents on the digital societyQakbot Botnet Disabled: Coordinated international operation between the FBI, Department of Justice, and law enforcement agencies of various countries to combat malware. University of Michigan cuts student and staff connections due to suspicious activity. Hospital Sisters Health System takes measures...

Emergence of a critical vulnerability: VMware alertNew critical vulnerability: imminent threat to VMware usersA recent security advisory uncovered a critical vulnerability in VMware, putting sensitive data in virtualized infrastructures at risk. Users are advised to update vulnerable versions, install security patches and monitor for suspicious activity.

Dramatic increase in DarkGate malware activityHow to protect computer systems from its advance: defense strategies and preventive measuresDarkGate malware is showing a worrying increase in use and diffusion. This sophisticated malware poses a significant threat to cyber security, with financial consequences for businesses. To defend yourself, it is important to keep your software up-to-date and take preventative measures such as user education...

Cybersecurity: Chinese Hacking Group's attack highlights new threatsThe new challenges of information security in the era of advanced cyber attacksA group of Chinese hackers exploited a vulnerability in international technology companies through remote code execution. This attack caused financial losses and undermined customer trust. It is important to implement advanced security measures to defend against cyber attacks.

Phishing as a Service gets smarterThe hidden danger in phishing: how to protect yourself from new Phishing as a Service AttacksPhishing as a Service (PhaaS) is a new method that allows cybercriminals to conduct sophisticated phishing attacks without technical knowledge. It offers paid phishing services, with advanced features. It is important to take security measures and work with the authorities to counter this threat.

Japan cybersecurity agency infiltrated by hackers for 9 monthsHacker infiltration raises concerns about the privacy of sensitive informationThe Japan Cybersecurity Agency was the victim of a nine-month cyber attack, with the support of Chinese state entities. Concern has been raised for Japan's national security, as sensitive and personal data may have been breached. Mutual allegations have been raised between China and the United States...

Critical updates: storage media securityImpact of cyberthreats on the data storage industry: analysis of the most common vulnerabilitiesThe article addresses the security concerns of hardware data storage devices. We discuss the vulnerabilities of SSD drives, the risks associated with compromised firmware and the purchase of counterfeit devices. It is suggested to adopt solutions such as data encryption and active monitoring to ensure...

BreachLock report 2023: major penetration tests reveal criticalitiesCyberthreat trends across the enterprise landscape: new data reveals the most common targets of cybercriminals in 2023The BreachLock 2023 Penetration Test Report uncovers common and overlooked vulnerabilities in organizations, such as weak passwords and unsecured wireless networks. To protect your systems and data, we recommend implementing two-factor authentication and training your employees on security.

Cyber attack responsible for chaos in UK airspaceThe vulnerability of critical infrastructure: the case of the cyber attack that hit UK airspaceA cyber attack has wreaked havoc in UK airspace, delaying flights and endangering critical infrastructure. It is necessary to strengthen cybersecurity and work together to address this threat.

Mom's Meals Service violation: the data of 12 million users at riskA cyber attack jeopardizes the privacy of Mom's Meals Service customers: here's what happenedA popular meal delivery service, Mom's Meals Service, suffered a data breach affecting more than 12 million users. Sensitive personal information such as names and addresses have been exposed. The service has taken immediate security measures to further protect the data and advises users to change their...

The key to success: a specialized IT team for corporate technical supportThe importance of a dedicated and competent team for the management and maintenance of corporate IT systemsThis article emphasizes the importance of corporate technical support for smooth operations. IT technicians manage software, hardware and IT security issues, ensuring productivity and data protection.

WhatsApp attack: scams from unknown calls to Indian usersWhatsApp scams from the United States are on the rise: Indian users at risk of online privacy and securityWhatsApp scams from the US are putting the privacy of Indian users at risk. Scammers make unwanted calls, share deceptive links, or solicit personal or financial information. Users must avoid answering unknown numbers and be wary of calls. It is important to educate users about online safety.

Major data breach: security concerns for the Metropolitan PoliceThe lack of data security in London's Metropolitan Police raises serious concerns about the protection of sensitive informationLondon's Metropolitan Police has been the victim of a major data breach, with sensitive and private information at risk. The organization has implemented security measures to mitigate the incident and prevent future cyber attacks. The incident raises the importance of implementing robust security policies...

Webinar: offensive cybersecurity in actionCyber security training webinar: offensive strategies to defend against hackersOffensive cybersecurity webinar: a comprehensive overview of ethical hacking strategies to protect computer networks and systems from devastating attacks. In addition, useful tools and resources will be presented, and learning and networking opportunities will be offered.

The role of women in cyber securityA new horizon for cybersecurity: women protagonists in digital defenceThe article discusses the growing involvement of women in cyber security. They bring diversity of thought, innovative solutions and inspire future generations. However, the need to further promote gender equality in this area is underlined.

LockBit 3.0: the new ransomware of cybercriminalsRansomware targeting businesses with cryptocurrencies and sophisticated featuresLockBit 3.0 is an advanced ransomware that is targeting businesses with file encryption and ransom demand. It's hard to counter, but experts recommend safety measures like regular software updates and data backups.

Genworth Financial under investigation for data breachSensitive data loss risk: Genworth Financial in the spotlight of the competent authoritiesGenworth Financial is under investigation for a possible breach of sensitive customer data. Investigators are investigating the incident and the company is taking steps to strengthen cyber security. Clients have been briefed and advised on the precautions to be taken. Data breaches are a growing problem...

The Medusa group publishes data stolen from PostelThe dangerous menace of ransomware: the case of the Medusa group and the attack on PostelThe Medusa criminal group attacked the Postel company of Poste Italiane, stealing sensitive employee data and threatening to publish it if a ransom was not paid. Medusa uses ransomware to encrypt files and delete backups, making data recovery difficult. The attack creates concerns about data loss and...

Kroll Data Breach: a cyber attack puts the personal information of creditors at riskCyber risks in the financial sector: the importance of protecting creditors' personal dataKroll, a debt collection company, suffered a data breach. The personal information of FTX, BlockFi and Genesis creditors has been exposed. The attack was via phishing, but the financial information was not compromised. Kroll has taken steps to protect the data and creditors have been notified. The episode...

Brad Smith: five steps to solve 99% of cybersecurity problemsThe future of cybersecurity: Brad Smith's vision for a secure digital ecosystemIn a recent address, Microsoft's Brad Smith outlined five steps to solve 99% of cybersecurity problems: multi-factor authentication, zero trust principles, compartmentalized networks, standard detection and response mechanisms, and device protection. He also emphasized the role of AI and collaboration...

Crime as a Service (CaaS): the organized forms of crime multinationalsThe evolution of crime in the digital worldThe article explores the emerging phenomenon of "Crime as a Service" in the digital world. It describes how multinational crime companies offer specialized services to commit cyber crimes, the dangers this entails and the need for a global fight against this form of organized crime.

The Digital Services Act (DSA) enters into force: a new landscape for large companiesA revolution in the regulation of the digital sector: all the obligations of large companies according to the Digital Services Act (DSA)The Digital Services Act (DSA) is new EU legislation that regulates digital services and imposes greater responsibilities on big companies like Meta (formerly Facebook) and Google. Objective: security, transparency and fight against illegal content.

The threat of SEO Poisoning in healthcareThe invisible threat that puts information security in the health sector at riskThe article addresses the emerging threat of SEO poisoning in healthcare, explaining how it works and what its implications are for patient data security. Preventive measures are suggested to counter this threat and ensure cyber security in healthcare sector.