1
26

"The app locates where Google Chrome, Microsoft Edge, and Mozilla Firefox store their cookies, queries for cookies with names they are interested in (such as MUID), retrieves their encrypted content, and then proceeds to decrypt them, all without user intervention," Rivera said in response to Microsoft's claims. "The cookie values then appear to get sent to or are used by Microsoft."

2
3
3
36
4
109
5
27
6
14
7
7
8
26
9
22
10
20
11
14
12
9
13
12
14
9
15
24

After a year of consultation, discussions and amendments, the Cyber Security Act which requires certain businesses to report ransom payments has passed by the parliament.

16
58

As artificial intelligence (AI) continues to revolutionize industries, the cybersecurity field faces a dual-edged sword of opportunities and threats. StrongDM's latest report, "The State of AI in Cybersecurity," highlights the growing concerns and readiness of cybersecurity professionals to tackle AI-driven challenges. Based on a survey of 600 cybersecurity professionals, the report sheds light on pressing issues around AI regulation, perceived threats, defense confidence, and the future of the cybersecurity workforce.

Key Findings from the Survey:

Regulation Concerns: 76% of cybersecurity professionals believe AI should be "heavily regulated" to prevent misuse, underscoring the need for balance between safety and innovation.

AI-Driven Threats: A significant 87% of respondents expressed concerns about AI-driven cyberattacks, with malware (33%) and data breaches (30%) ranking as top threats.

Preparedness Levels: Only 33% of professionals feel "very confident" in their current defenses, and 65% of companies admit they are not fully prepared for AI-powered attacks.

Workforce Impact: Despite challenges, two-thirds of respondents feel optimistic about AI's potential to enhance, rather than replace, jobs in cybersecurity.

17
32
18
10

cross-posted from: https://lemmy.ml/post/22893407

Hi,

I'm looking for a E2EE and decentralized (or self hosted) videoconferencing that would have the following feature

  • video or voice-only call
  • share screen
  • files transfer (optional)
  • text chat

( all of it E2EE )

I'm considering Jitsi meet, that seem the meet those requirements

Do you know better alternatives or do you have remarks about Jitsi ?

Thanks.

19
18
20
58

cross-posted from: https://lemmy.zip/post/26768429

America's aging infrastructure seems to be the culprit.

21
41
22
32
23
18
24
22

Apple has become aware of a security flaw that could let hackers take control of a user’s iPhone or iPad if they visit a harmful website.

Maybe i'm reading this wrong but it doesn't seem to be cryptocurrency-specific:

Jeremiah O’Connor, CTO and co-founder of crypto cybersecurity firm Trugard, told Decrypt that “attackers could access sensitive data like private keys or passwords” stored in their browser, enabling crypto theft if the user’s device remained unpatched.

25
15
view more: next ›

Cybersecurity

5745 readers
319 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS