📈 Do You Sell Digital Products on Gumroad?
This one is for you!
Gumroad is a marketplace where anyone can sell their own digital products and share knowledge with the community.
🚀 Cyber Security News is looking for Gumroad entrepreneurs who are interested to collaborate on an affiliate partnership:
- You are selling digital products on Gumroad
- You would like to increase your sales
Does this sound like you?
→ Feel free to reach out to us: @cybersecadmin
Do you know someone who might be interested?
→ Send them this post!
We look forward to cooperating and creating new partnerships with the members of our community!
Kind regards,
The Cyber Security News Team
Critical Bug Exposes OwnCloud Admin Passwords
This flaw allows attackers to gain unauthenticated access to, modify, or delete files if they know the user's username and the user has not configured a signing key (the default setting).
This flaw not only raises concerns about unauthorized access to sensitive data, but it also highlights the possibility of malicious activity within the ownCloud ecosystem.
Exploiting this flaw could result in unauthorized modifications or deletions of critical files, disrupting business operations and jeopardizing data integrity.
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ Linux Privilege Escalation Guide → https://gumroad.com/a/631226579/usgvzp
-----
@Cyber_Security_Channel
Bay Area Nonprofit Signal Shows How Bloated Tech Companies Have Become
The report is a glaring reminder that modern consumer technology, done well, doesn’t need all that many people to run it.
Signal’s app offers video calls, messages and Instagram-esque Stories, all free to use and free from ads.
The nonprofit is a leader in privacy research and never sells user data to advertisers, which is how other free products tend to make their money.
----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ [Link to your Gumroad product here]
Interested to become a partner of Cyber Security News?
Contact us: @cybersecadmin
----
@Cyber_Security_Channel
CalypsoAI Recognized for Innovative Approach to AI Security by Multiple Awards Programs
CalypsoAI is the leader in developing and delivering AI security solutions.
The company’s vision is to be the trusted partner and global leader in the AI security domain, empowering enterprises and governments to leverage the immense potential of generative AI solutions and Large Language Models (LLMs) responsibly and securely.
----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ [Link to your Gumroad product here]
Interested to become a partner of Cyber Security News?
Contact us: @cybersecadmin
----
@Cyber_Security_Channel
D&I in FS: Data Protection and D&I Reporting
The regulators’ proposals are helpful in providing firms with clarity as to the ‘necessity’ of their processing of D&I data, so is conducive to a firm establishing a lawful basis under the UK GDPR.
Additionally, the most applicable special conditions under the DPA are likely to be: the employment, equality or senior level conditions or explicit consent.
Ultimately, firms will need to assess on a case-by-case basis which of these (or other) legal basis would be most appropriate in their scenario.
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ Linux Privilege Escalation Guide → https://gumroad.com/a/631226579/usgvzp
-----
@Cyber_Security_Channel
DIGIT Expo 2023 | Data Ethics: A Balancing Act
Audience engaged, the panel at DIGIT’s flagship event immediately got straight to the point, with chair Rob Huggins asking:
“What strategies and best practices can organisations employ to protect sensitive data and avoid data breaches while continuing to extract value from the process?”
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ SC-900 Microsoft Exam Guide → https://gumroad.com/a/631226579/juaah
-----
@Cyber_Security_Channel
Fake Browser Updates Targeting Mac Systems With Infostealer
The malware, also referred to as AMOS, surfaced earlier this year on a dedicated Telegram channel.
Criminals, who can rent the malware on a subscription basis for about $1,000 a month, have used a variety of means to distribute the malware since then.
The most common tactic has been to distribute the malware via installers for popular apps or via purportedly cracked versions of Microsoft Office and other widely used applications.
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ Linux Privilege Escalation Guide → https://gumroad.com/a/631226579/usgvzp
-----
@Cyber_Security_Channel
Microsoft Azure Confidential VMs Will Roll Out This December
Intel Trust Domain Extensions expands the capabilities of Intel Software Guard Extensions, which is a current option for securing Azure instances. In particular, TDX adds more options for confidential computing.
The new confidential VMs add boot-time attestation and confidential disk encryption with enterprise key management options for platform-managed keys and customer-managed keys, Microsoft said.
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ SC-900 Microsoft Exam Guide → https://gumroad.com/a/631226579/juaah
-----
@Cyber_Security_Channel
Logs Missing in 42% Cyberattacks; Small Business Most Vulnerable: Report
John Shier, field CTO at Sophos, emphasised the critical importance of time in responding to active threats on time.
He stated, "Missing telemetry only adds time to remediations that most organisations can't afford.
This is why complete and accurate logging is essential, but we're seeing that, all too frequently, organisations don't have the data they need."
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ Linux Privilege Escalation Guide → https://gumroad.com/a/631226579/usgvzp
-----
@Cyber_Security_Channel
Canadian Military, Police Impacted by Data Breach at Moving Companies
According to the Canadian government, the data breach impacts the personal information of present and former public service employees, as well as members of the Canadian Armed Forces and Royal Canadian Mounted Police.
“Preliminary information indicates that breached information could belong to anyone who has used relocation services as early as 1999 and may include any personal and financial information that employees provided to the companies,” the government says in an incident notification.
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ SC-900 Microsoft Exam Guide → https://gumroad.com/a/631226579/juaah
-----
@Cyber_Security_Channel
How AI Can Assist Cities and Counties With Cybersecurity
AI certainly holds great promise when one considers that AI systems are 24/7, they never sleep or go on vacation, AI is superior at finding patterns and anomalies in milliseconds as opposed to days or weeks.
Despite the noted advantages many local government tech leaders remain uncertain about what is either possible or even available.
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ SC-900 Microsoft Exam Guide → https://gumroad.com/a/631226579/juaah
-----
@Cyber_Security_Channel
CISA Launches Pilot Program to Address Critical Infrastructure Threats
CISA will be hosting roundtables and information systems with partners in every sector and region to understand the "unique needs and challenges, identify gaps in existing capabilities, assess interest in our shared services, and identify ways CISA can provide more scalable support through shared services or other means" for critical infrastructure organizations.
@Cyber_Security_Channel
Global X Says AI, Cybersecurity Among Four Key Themes for 2024
See below what Global X had to say:
1. AI and Robotics & Automation Lead the Way Into the Future
“The addressable market for AI services, including the full ecosystem of hardware, software, and data, is set to expand rapidly in the coming years.”
2. U.S. Infrastructure Builds New Foundations
“The Infrastructure Investment and Jobs Act called for $1.2 trillion in spending over seven years.
The CHIPS Act adds another $600 billion of public and private funds to construct new facilities over several years.
Together, the government is set to spend approximately $300 billion a year, potentially translating to a 37% increase in revenue for infrastructure companies.”
3. Cybersecurity’s Relevancy Rises
“Deterioration in USA-China relations along with persistent conflicts in Europe and the Middle East could trigger increased risk of cyber intrusions.
The Office of the Director of National Intelligence recently published a report about the increased cyber risks from China, Iran, North Korea, and Russia.”
4. Healthcare Tied to Aging Population Breaks Through
“The aging populations of the four largest economies in the world, the United States, Europe, China, and Japan, is not breaking news, but this is an economic reality.
Historically, slowing growth and higher rates drive returns across the Healthcare sector.”
@Cyber_Security_Channel
Redefining Cybersecurity: Ivanti and Securin Join Forces to Tackle 21st Century Threats
The partnership between Ivanti and Securin is a response to these challenges.
It aims to provide organizations with the tools and insights needed to enhance a cybersecurity posture.
Cybersecurity should not be a privilege accessible only to large organizations, but a necessity for all, regardless of size, according to both Mukkamala and Chinnagangannagari.
@Cyber_Security_Channel
QuantLR, PacketLight Integrates QKD Services with OTN Encrypted Transport
This successful integration and testing project between QuantLR and PacketLight represents a significant step forward in advancing the field of quantum communication.
The collaboration demonstrates the viability of combining quantum solutions with optical networking infrastructure, unlocking new possibilities for secure and efficient data transmission.
@Cyber_Security_Channel
Discover the Future of Cybersecurity at the 4th Annual Open Source Security Summit
The free and virtual Open Source Security Summit is a forum to explore the intersection of open source and security.
Building on the previous three Summits, this year’s event will continue the conversation with cross-industry experts and dive deeper into why open source solutions lead to better security outcomes, as well as how using open source tools can build trust with customers and consumers.
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ [Link to your Gumroad product here]
Interested to become a partner of Cyber Security News?
Contact us: @cybersecadmin
-----
@Cyber_Security_Channel
Department of Health Welcomed Level of Data Breach Fine
The Department of Health submission said the DPC had sent them an initial draft decision in December of that year with the department responding with submissions in March of 2022.
A draft revised decision was sent in May of this year with the department given a final opportunity to respond to its contents during the summer.
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ HACKPROOF: How to Beat Fraudsters, Prevent Identity Theft, and Say Goodbye to Cybercrime → https://gumroad.com/a/468645587/hnoppk
-----
@Cyber_Security_Channel
⚡️Pennsylvania Hospital Hit By Data Breach Affecting 169K
WGH said it assessed the security of its network, sent notifications to potentially impacted patients and conducted a review of its existing policies and procedures, as well as its enhanced administrative and technical controls.
It also provided additional security training to reduce the likelihood of a similar future event.
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ HACKPROOF: How to Beat Fraudsters, Prevent Identity Theft, and Say Goodbye to Cybercrime → https://gumroad.com/a/468645587/hnoppk
-----
@Cyber_Security_Channel
🚨1$ PER ITEM – LAST DAY FOR 90% OFF BLACK FRIDAY SALE from our partners at Hacklido
1$ instead of 10$ for each of the below products:
⚡️Scanning Networks – Pro Guide:
→ https://gumroad.com/a/631226579/ubvne
⚡️SC-900 Microsoft Security, Compliance and Identity Fundamentals:
→ https://gumroad.com/a/631226579/juaah
⚡️Practical Linux Privilege Escalation Manual:
→ https://gumroad.com/a/631226579/usgvzp
💥Use this coupon: HACKLIDOBF23
Make sure to grab yourself a copy and share the coupon with your friends before the prices go back to normal!
@Cyber_Security_Channel
Trellix Announces Cybersecurity Generative AI Innovations Powered by Amazon Bedrock
“As security threats evolve, businesses require innovative solutions to quickly move from detection to mitigation, and the ability to communicate cyber and business risk in simple language,” says John Morgan, General Manager XDR, Trellix.
“AWS enables Trellix to continue delivering transformative products to our customers, leveraging the power of GenAI to accelerate their cybersecurity initiatives.”
----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ [Link to your product here]
Interested to become a partner of Cyber Security News?
Contact us: @cybersecadmin
----
@Cyber_Security_Channel
Jersey Charity Members' Data May Have Been Hacked
The charity has also notified the Jersey Office of the Information Commissioner and is remaining in close contact with the financial institution while it investigates.
The charity said the situation "has not been caused by any action of Jersey Heritage or by Jersey Heritage’s own systems having been compromised or subject to any form of attack".
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ SC-900 Microsoft Exam Guide → https://gumroad.com/a/631226579/juaah
-----
@Cyber_Security_Channel
Cyber Security Professionals are Exhausted, and it's Putting Firms at Greater Risk of Attack
More than four-in-ten cyber security leaders said they have limited capabilities and expertise to fully understand the threats they face, while a further 43% said they had some, little, or no capabilities or expertise to detect and respond to potential threats in their IT environments.
One-in-four added they have limited capability or expertise to respond effectively to an incident at all.
----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ [Link to your product here]
Interested to become a partner of Cyber Security News?
Contact us for details: @cybersecadmin
----
@Cyber_Security_Channel
White House Recognizes OCRI's Efforts in Cyber Workforce Development
October was Cybersecurity Awareness Month, and the White House challenged organizations to meet the growing demand for cybersecurity talent to build more secure, resilient and defensible cyberspace.
“We are appreciative of the commitments made by big technology companies like Cisco Systems and Palo Alto Networks, by manufacturers like Boeing, financial institutions like Visa, non-profits like ISC2, partnerships between groups like Siemens Energy, the SANS Institute and ICS Village, and statewide ecosystems like the Ohio Cyber Range Institute-Regional Programming center Ecosystem,” said Kemba Walden, acting national cyber director for the White House.
“Together, commitments made by all of these institutions will build the pipeline of cyber talent and foster our ability to create a secure, resilient and defensible cyberspace.”
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ Linux Privilege Escalation Guide → https://gumroad.com/a/631226579/usgvzp
-----
@Cyber_Security_Channel
🔥 BLACK FRIDAY – 90% OFF DEALS from our partners at Hacklido
Applies to all products:
🚀 Scanning Networks – Pro Guide:
→ https://gumroad.com/a/631226579/ubvne
🚀 SC-900 Microsoft Security, Compliance and Identity Fundamentals:
→ https://gumroad.com/a/631226579/juaah
🚀 Practical Linux Privilege Escalation Manual:
→ https://gumroad.com/a/631226579/usgvzp
👀 Secret discount coupon: HACKLIDOBF23
Get your personal Cyber Security packages before the deal expires!
@Cyber_Security_Channel
Nearly 9 Million Patients' Records Compromised in Data Breach
The statement noted that Northwell is “not aware of any evidence of subsequent misuse of the information obtained from PJ&A’s network,” but is offering all impacted patients with a free identity theft service.
-----
❤️ Enjoyed this post?
🔥 Improve your skills and support our community by purchasing this digital product from our partners:
➡️ Linux Privilege Escalation Guide → https://gumroad.com/a/631226579/usgvzp
-----
@Cyber_Security_Channel
Idaho National Laboratory Experiences Massive Data Breach; Employee Information Leaked Online
A politically-motivated hacking group has claimed responsibility for the data breach on various social media platforms.
EastIdahoNews.com is not naming the group, due to the nature of the sensitive information, which is now publicly available.
As of 11 a.m., INL officials could not the confirm the identity of the hackers.
@Cyber_Security_Channel
What is Endpoint Encryption: Unveiling A Data Security Strategy
Endpoint encryption works by using algorithms to transform readable data into an unreadable format unless you have a specific key or code.
This key is the only way to decrypt the data and access the original, readable information.
The beauty of endpoint encryption lies in its simplicity and effectiveness.
Endpoint encryption doesn’t require the end user to take any complicated steps.
Once set up to encrypt the data, the encryption runs seamlessly in the background, providing continuous protection.
@Cyber_Security_Channel
3 Ways AI Can Handle Third-party Vendor and Supplier Risk Challenges
Third-party risk management is now facing a tipping point.
As many organizations continue to face budgetary and resourcing challenges, how can security leaders still make much-needed improvements to the efficiency of their third-party risk management (TPRM) programs?
Doing so is essential if they want to reduce the risk of breaches, minimize potential business impacts and protect the organization’s reputation.
@Cyber_Security_Channel
Aspen Cyber Summit 2023 — Live Coverage
During a panel at the Aspen Cyber Summit on Wednesday, DHS Assistant Secretary Iranga Kahangama walked the audience through several different tasks that officials are now using machine learning and generative AI to conduct.
“We have many different operational applications of AI that we are actively using and looking to improve upon using and whether it's on the generative side or more traditional machine learning type applications,” he said.
@Cyber_Security_Channel
What To Do With a Cloud Intrusion Toolkit in 2023?
It wouldn't hurt to take a look over the software's capabilities and ensure your web apps and cloud infrastructure are fully secured against the tool's techniques.
It may be that Predator uses code and methods found in other toolkits.
@Cyber_Security_Channel