πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.5K subscribers
88.9K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites 🦿

More than 30 WordPress plugins were shut down after a supplychain backdoor compromised thousands of sites through the Essential Plugin portfolio. The post Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched πŸ–‹οΈ

Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities that are codenamed BlueHammer requires GitHub signin, RedSun, and UnDefend, all of which were released as zerodays by a researcher known as Chaotic Eclipse .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul πŸ–‹οΈ

Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9 million accounts in 2025. The new policy updates relate to contact and location permissions in Android, allowing thirdparty apps to access the contact lists and a user's location in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions πŸ–‹οΈ

The National Institute of Standards and Technology NIST has announced changes to the way it handles cybersecurity vulnerabilities and exposures CVEs listed in its National Vulnerability Database NVD, stating it will only enrich those that fulfil certain conditions owing to an explosion in CVE submissions. "CVEs that do not meet those criteria will still be listed in the NVD but will not.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts πŸ–‹οΈ

An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denialofservice DDoS operations that were used by more than 75,000 cybercriminals. The ongoing effort, dubbed Operation PowerOFF, disrupted access to the DDoSforhire services, took down the technical infrastructure supporting them, and obtained access to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation πŸ–‹οΈ

A recently disclosed highseverity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency CISA. To that end, the agency has added the vulnerability, tracked as CVE202634197 CVSS score 8.8, to its Known Exploited Vulnerabilities KEV catalog, requiring Federal Civilian.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic πŸ–‹οΈ

Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. "PowMix employs randomized commandandcontrol C2 beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections," Cisco Talos.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories πŸ–‹οΈ

You know that feeling when you open your feed on a Thursday morning and it's just... a lot? Yeah. This week delivered. We've got hackers getting creative in ways that are almost impressive if you ignore the whole "crime" part, ancient vulnerabilities somehow still ruining people's days, and enough supply chain drama to fill a season of television nobody asked for. Not .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment πŸ–‹οΈ

In 2024, compromised service accounts and forgotten API keys were behind 68 of cloud breaches. Not phishing. Not weak passwords. Unmanaged nonhuman identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials service accounts, API tokens, AI agent connections, andOAuth grants. When projects end or employees leave, most.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution πŸ–‹οΈ

Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service. The details of the vulnerabilities are below  CVE202620184 CVSS score 9.8 An improper certificate validation in the integration of single signon SSO.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks πŸ–‹οΈ

A "novel" social engineering campaign has been observed abusing Obsidian, a crossplatform notetaking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency sectors. Dubbed REF6598 by Elastic Security Labs, the activity has been found to leverage.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ Supply chain dependencies: Have you checked your blind spot? πŸš€

Your biggest risk may be a vendor you trust. How can SMBs map their thirdparty blind spots and build operational resilience?.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Commercial AI Models Show Rapid Gains in Vulnerability Research πŸ“”

AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a Forescout study finds.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” DDoS-For-Hire Services Disrupted by International Police Action in β€˜Operation PowerOff’ πŸ“”

Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests and sends warning letters to known DDoS service users.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea πŸ“”

US authorities jail two Americans for aiding North Korean laptop farm scams that infiltrated over 100 firms.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” APK Malformation Found in Thousands of Android Malware Samples πŸ“”

APK malformation tactic now appears in over 3000 Android malware samples evading static analysis.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack πŸ“”

Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Four Nationally Significant Cyberattacks Every Week β€” Is the UK Ready? πŸ¦…

The tempo of UK cyberattacks has shifted from sporadic disruption to something far more systemic. When incidents reach a frequency of four national events each week, the issue stops being purely technical and becomes structural. It raises a more uncomfortable question than whether attacks will happen it asks whether UK cybersecurity readiness is evolving fast enough to keep pace with a threat environment that is no longer linear, but compounding. The latest assessment from the National Cyber Security Centre NCSC reveals a sharp escalation in UK national cyber threats. In the 12 months leading to September 2025, 204 incidents were classified as nationally significant, more than double the 89 recorded in the previous year. This is the highest figure on record. The Acceleration of UK...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Bluesky Outage: Coordinated Traffic Attack Causes Widespread Errors 🦿

Blueskys DDoS attack caused outages for a second day, disrupting feeds, notifications, and search across the platform. The post Bluesky Outage Coordinated Traffic Attack Causes Widespread Errors appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 New Phishing Attack Turns n8n Into On-Demand Malware Machine 🦿

Hackers are abusing n8n workflows to deliver malware and evade detection, according to Cisco Talos, using trusted automation to bypass security defenses. The post New Phishing Attack Turns n8n Into OnDemand Malware Machine appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity