πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.6K subscribers
89.1K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Health Records of 500,000 UK Biobank Volunteers Listed Online in China 🦿

Health data from 500,000 UK Biobank participants was found listed for sale online in China, raising concerns over research access misuse and data security. The post Health Records of 500,000 UK Biobank Volunteers Listed Online in China appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 What Is Cloud Security? A 2026 Guide 🦿

Learn what cloud security is, why it matters in 2026, and the best practices for protecting data, identities, workloads, and cloud infrastructure. The post What Is Cloud Security? A 2026 Guide appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Data Governance in Financial Services: How Banks and Fintechs Build Scalable, Audit-Ready Frameworks in 2026 🌊

Data governance in financial services 8step auditready framework, 14 regulations mapped, 5level maturity model. Built for banks and fintechs in 2026. The post Data Governance in Financial Services How Banks and Fintechs Build Scalable, AuditReady Frameworks in 2026 appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Data Breach Incident Response Plan for 2026: Phases, Team Roles, Compliance Checklists, and Recovery Frameworks 🌊

Data breach incident response plan for CTOs 6 phases, severity playbooks, GDPRHIPAASEC notification checklists, and recovery templates. Learn how we operationalize IR. The post Data Breach Incident Response Plan for 2026 Phases, Team Roles, Compliance Checklists, and Recovery Frameworks appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover Pre-Stuxnet β€˜fast16’ Malware Targeting Engineering Software πŸ–‹οΈ

Cybersecurity researchers have discovered a new Luabased malware created years before the notorious Stuxnet worm that aimed to sabotage Iran's nuclear program by destroying uranium enrichment centrifuges. According to a new report published by SentinelOne, the previously undocumented cyber sabotage framework dates back to 2005, primarily targeting highprecision calculation software to tamper.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 SOC 2 Automation Explained: Costs, Platforms, Timelines, and the Controls You Still Can’t Automate 🌊

SOC 2 automation cuts audit prep from months to weeks. Compare platforms, costs 20K200K, timelines, and the controls you still can't automate. Evaluate now. The post SOC 2 Automation Explained Costs, Platforms, Timelines, and the Controls You Still Cant Automate appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 AI Risk Management 2026: Shadow AI, Agentic Risks & NIST Implementation Playbook 🌊

AI risk management frameworks compared for 2026. NIST roadmap, EU AI Act compliance, 12domain risk taxonomy maturity model. Built for CISOs. Explore now. The post AI Risk Management 2026 Shadow AI, Agentic Risks NIST Implementation Playbook appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification tricks to dupe unsuspecting users into sending international text messages that incur charges on their mobile bills, generating illicit revenue for the threat actors who lease the phone numbers. According to a new report published by Infoblox, the operation is believed to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” BlackFile Group Targets Retail and Hospitality with Vishing Attacks πŸ“”

Researchers uncover a new data theft and extortion group dubbed BlackFile.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet πŸ“”

The fast16 malware may have been used to target Irans nuclear program prior to Stuxnet.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ“’ Pay up or expect attrition: 77% of cyber professionals missed out on pay rises last year – and almost half now plan to switch roles πŸ“’

Organizations are overlooking cyber pros when it comes to pay increases, and it could cost them dearly.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Most Cybersecurity Professionals Feel Undervalued and Underpaid πŸ“”

A new report by global technology recruitment firm, Harvey Nash, found that three quarters of cybersecurity staff are pessimistic on pay and half are looking for a new job.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side πŸ–‹οΈ

Anthropics Claude Mythos Preview has dominated security discussions since its April 7 announcement. Early reporting describes a powerful cybersecurityfocused AI system capable of identifying vulnerabilities at scale and raising serious questions about how quickly organizations can validate, prioritize, and remediate what it finds. The debate that followed has mostly focused on the right.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks πŸ–‹οΈ

A proUkrainian hacktivist group called PhantomCore has been attributed to attacks actively targeting servers running TrueConf video conferencing software in Russia since September 2025. That's according to a report published by Positive Technologies, which found the threat actors to be leveraging an exploit chain comprising three vulnerabilities to execute commands remotely on susceptible.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware πŸ–‹οΈ

Cybersecurity researchers have flagged dozens of Microsoft Visual Studio Code VS Code extensions on the Open VSX repository that are linked to a persistent informationstealing campaign dubbed GlassWorm. The cluster of 73 extensions has been identified as cloned versions of their legitimate counterparts. Of these, six have been confirmed to be malicious, with the remaining acting as seemingly.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Widely Used Browser Extensions Selling User Data πŸ“”

Dozens of browser extensions openly sell user data via privacy policy disclosures.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Utilities Tech Supplier Itron Discloses Cyber-Attack, Operations Unaffected πŸ“”

Itron confirmed a cyber incident but does not believe it is likely to have a material impact on the company.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Why U.S. Critical Infrastructure Is the Highest-Value Target in the Global Cyber War πŸ¦…

The idea that cyber conflict operates quietly in the background no longer holds. What used to be a shadow contest of espionage and occasional disruption has evolved into something far more direct and consequential. Today, the cyber war on US infrastructure is not a supporting element of geopolitical tensionit is one of its primary arenas.  Recent global conflicts have shown that digital operations are now tightly woven into military and political strategy. Critical systems that sustain everyday life, energy, water, communications, and transportation have become highvalue targets. The logic is simple disrupting infrastructure creates immediate, visible consequences without crossing traditional thresholds of war.  From Silent Intrusions to Persistent Attacks  Cyber operations were...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Junior Marketing Generalist 🌊

The post Junior Marketing Generalist appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Project Manager 🌊

The post Project Manager  appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity