Cyber News Live (@cybernewslive) 's Twitter Profile
Cyber News Live

@cybernewslive

Welcome to Cyber News Live where our goal is to create a community and bring public awareness to the cyber industry.

#cnl #cybernewslive #cyber #cybersecurity

ID: 937643472319688705

linkhttps://cybernewslive.com calendar_today04-12-2017 11:23:19

24,24K Tweet

1,1K Followers

63 Following

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Ransomware-as-a-service (RaaS) operations are targeting industrial organizations, exploiting unsecured IT/OT connections, leading to significant operational disruptions. The frequency and severity of these attacks are increasing, posing a serious threat to these organizations.

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Ransomware operators are leveraging LLMs to accelerate attacks by automating tasks like phishing, data exfiltration, and ransom note generation, enabling faster and more targeted extortion. This operational acceleration complicates attribution and increases the blast radius of

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Researchers at Black Hat Europe demonstrated the ability to spoof legacy railway signaling systems, potentially enabling attackers to disrupt critical infrastructure. This highlights the vulnerability of edge infrastructure and the need for proactive security measures to prevent

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Threat actors are targeting VPN platforms like Palo Alto Networks GlobalProtect and Cisco SSL VPN with automated credential-based attacks, exposing organizations to unauthorized access and data breaches. This activity puts enterprises at risk of lateral movement and data

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

NIS2 mandates robust identity and access management, making weak authentication unacceptable. Organizations must prioritize strong password policies, implement multi-factor authentication (MFA), and establish regular access reviews to mitigate credential-based attacks and ensure

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Law enforcement seized E-Note, a cryptocurrency exchange, used by cybercriminals to launder over $70 million from ransomware and account takeover attacks, exposing the financial infrastructure supporting cybercrime and enabling further investigations. Organizations must review

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Threat actors infected a passenger ferry with malware, potentially enabling remote control of the vessel and exposing it to sabotage. This incident highlights the critical need for maritime cybersecurity and the potential for severe consequences. Organizations must immediately

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Threat actors are exploiting a WhatsApp vulnerability through malicious links to gain real-time access to user conversations, exposing sensitive data and enabling surveillance. This puts millions of users at risk of data theft and privacy breaches. Defenders should educate users

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Researchers discovered a massive, unsecured MongoDB database exposing 4.3 billion professional records, including names, emails, and LinkedIn profiles, enabling widespread identity theft and spear-phishing attacks. Organizations must immediately review their data security

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Box Elder County (Box Elder County) is notifying 81,664 victims after unauthorized access to its network. 225 days to respond. Grade: F. #CyberNewsLive boxeldercountyut.gov

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Eckerd Youth Alternatives Inc. dba Eckerd Connects (Eckerd Connects) is notifying 68,585 victims after unauthorized access to its network. 409 days to respond. Grade: F. #CyberNewsLive eckerd.org

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Torhoerman Law: Injury & Car Accident Lawyers (TorHoermanLaw) is notifying 6,907 victims after a data security incident. 192 days to respond. Grade: F. #CyberNewsLive torhoermanlaw.com

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Vocatura, Spagnuolo & Company, P.C., CPAs is notifying 983 victims after a data security incident. 154 days to respond. Grade: D-. #CyberNewsLive vocspag.com

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

The Vernon Law Firm is notifying 781 victims after unauthorized access to its systems. 370 days to respond. Grade: F. #CyberNewsLive vernonlaw.com

Cyber News Live (@cybernewslive) 's Twitter Profile Photo

Parexel International, LLC (Parexel) is notifying an undisclosed number of victims after a data security incident. 130 days to respond. Grade: D. #CyberNewsLive parexel.com