Posts

Showing posts from August, 2024

The Cyberwire Daily Briefing

Image
"California advances legislation to regulate AI models." Views expressed in this cybersecurity, cyber crime summary are those of the reporters and correspondents.  Accessed on 31 August 2024, 2232 UTC. Content and Source:   https://thecyberwire.com/newsletters/daily-briefing/13/167 Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net). V13 | Issue 167 | 8.30.24 Daily Briefing for 08.30.24 Announcement Listen to CertByte, the newest segment on the CyberWire Daily We’re excited to debut our new bi-weekly segment,  CertByte , on the CyberWire Daily podcast. Join N2K’s Chris Hare and special guests every other Wednesday to dissect practice test questions and get insider study tips to accelerate your path to certification success. In our first episode, Chris and George Monsalvatge break down a Project Management Professional (PMP®) question. To listen, subscribe to the  CyberWire Daily podc

The Hacker News Daily Updates.

Image
"Cyberattackers exploit Google Sheets for malware control in likely espionage campaign." Views expressed in this cybersecurity, cyber espionage update are those of the reporters and correspondents.  Accessed on 31 August 2024, 1526 UTC. Content and Source:  https://thehackernews.com Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net).   THN Daily Updates Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and popular techniques used in real-time in data science to all researchers working in various domains. Download Now Sponsored LATEST NEWS Aug 31, 2024 Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. Th

DarkReading.com

"Commercial spyware vendors have a copycat in top Russian APT." Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 31 August 2024, 0313 UTC. Content and Source:  Email subscription via https://feedly.com.   https://feedly.com/i/subscription/feed%2Fhttp%3A%2F%2Fwww.darkreading.com%2Frss%2Fall.xml Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net). Dark Reading 155K followers 45 articles per week #security #tech 17 Today Commercial Spyware Vendors Have a Copycat in Top Russian APT IoC > 2 domains • by Dark Reading Staff  /  9h • 3 TTPs • CVE-2023-41993 Russia's Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using watering-hole tactics. 'Voldemort' Malware Curses Orgs Using Global Tax Authorities 14 TTPs • by Nathan Eddy, Contributing Writer  /  10h