πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.7K subscribers
89.1K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Utilities Tech Supplier Itron Discloses Cyber-Attack, Operations Unaffected πŸ“”

Itron confirmed a cyber incident but does not believe it is likely to have a material impact on the company.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Why U.S. Critical Infrastructure Is the Highest-Value Target in the Global Cyber War πŸ¦…

The idea that cyber conflict operates quietly in the background no longer holds. What used to be a shadow contest of espionage and occasional disruption has evolved into something far more direct and consequential. Today, the cyber war on US infrastructure is not a supporting element of geopolitical tensionit is one of its primary arenas.  Recent global conflicts have shown that digital operations are now tightly woven into military and political strategy. Critical systems that sustain everyday life, energy, water, communications, and transportation have become highvalue targets. The logic is simple disrupting infrastructure creates immediate, visible consequences without crossing traditional thresholds of war.  From Silent Intrusions to Persistent Attacks  Cyber operations were...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Junior Marketing Generalist 🌊

The post Junior Marketing Generalist appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Project Manager 🌊

The post Project Manager  appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack πŸ–‹οΈ

Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group published data related to the company on the dark web. "Based on current evidence, we believe this data originated from Checkmarx's GitHub repository, and that access to that repository was facilitated through the initial supply chain attack of March 23, 2026,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More πŸ–‹οΈ

Everything is dumb again. This week feels broken in a very familiar way. Old tricks are back. New tools are doing shady crap. Supply chains got hit. Fake help desks worked. Weird research showed how easy some attacks still are. Most of it feels like stuff we should have fixed years ago. Bad extensions. Stolen creds. Remote tools are getting abused. Malware hides in places people trust. Same.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Sanctions Target Cambodian Scam Network Leaders πŸ“”

US sanctions target Cambodian scam networks tied to crypto fraud and trafficking.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover πŸ–‹οΈ

An administrative role meant for artificial intelligence AI agents within Microsoft Entra ID could enable privilege escalation and identity takeover attacks, according to new findings from Silverfort. Agent ID Administrator is a privileged builtin role introduced by Microsoft as part of its agent identity platform to handle all aspects of an AI agent's identity lifecycle operations in a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202 πŸ–‹οΈ

Microsoft on Monday revised its advisory for a nowpatched, highseverity security flaw impacting Windows Shell to acknowledge that it has been actively exploited in the wild. The vulnerability in question is CVE202632202 CVSS score 4.3, a spoofing vulnerability that could allow an attacker to access sensitive information. It was addressed as part of its Patch Tuesday update for this.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Monetizing the quantum shift: 11 PQC channel opportunities πŸ“’

Channel partners must lead clients through the postquantum cryptography transition now.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” North Korean Hackers Target Crypto Firms with ClickFix and AI-Made Zoom Lures πŸ“”

Arctic Wolf attributed this largescale spearphishing campaign to BlueNoroff, a financially motivated subgroup of the Lazarus Group.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC πŸ“”

The National Cyber Security Centre has warned against measuring SOCs with ticketbased metrics.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks πŸ–‹οΈ

A Chinese national accused of being a member of the Silk Typhoon hacking group has been extradited to the U.S. from Italy.  Xu Zewei, 34, was arrested in July 2025 by Italian authorities for his alleged links to the Chinese statesponsored threat group and for orchestrating cyber attacks against American organizations and government agencies between February 2020 and June 2021, including.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ After Mythos: New Playbooks For a Zero-Window Era πŸ–‹οΈ

When patching isnt fast enough, NDR helps contain the next era of threats. If youve been tracking advancements in AI, you know the exploit window, the short buffer that organizations relied on to patch and protect after a vulnerability disclosure, is closing fast. Anthropics new model, Claude Mythos, and its Project Glasswing, showed that finding exploitable vulnerabilities and subtle cracks.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… ANZ Organizations Are in the Ransomware Crosshairsβ€” What the Dark Web Is Telling Us πŸ¦…

The conversation around ANZ ransomware threats has shifted noticeably over the past year. What once looked like sporadic, highprofile incidents has evolved into a sustained and structured campaign against organizations across Australia and New Zealand. Signals emerging from underground forums and marketplaces reveal a sobering reality ransomware is no longer just a technical problem it is an economic strategy driven by efficiency, specialization, and scale.  At the center of this shift is ransomware dark web intelligence, which paints a clear picture of attacker intent. Threat actors are not simply increasing volume they are refining their focus. The ANZ region, with its highvalue economy and deeply digitized infrastructure, has become a preferred hunting ground.  Why HighValue Ec...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face's opensource robotics platform with nearly 24,000 GitHub stars, that could be exploited to achieve remote code execution. The vulnerability in question is CVE202625874 CVSS score 9.3, which has been described as a case of untrusted data deserialization stemming from the use of the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese National Extradited Over Silk Typhoon Cyber Campaign πŸ“”

Extradition links alleged MSSdirected hacker to Silk Typhoon and COVID19 espionage.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About πŸ–‹οΈ

Every security program is betting on the same assumption once a system is connected, the problem is solved. Open a ticket, stand up a gateway, push the data through. Done. That assumption is wrong. It is also a major reason Zero Trust programs stall. New research my team just published puts numbers on it. The Cyber360 Defending the Digital Battlespace report, based on a survey of 500 security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware Turf War as 0APT and KryBit Groups Trade Blows πŸ“”

Ransomware groups 0APT and KryBit have doxxed each other online.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi πŸ–‹οΈ

Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across Windows, Linux, and ESXi variants that renders recovery impossible even for the threat actors. The fact that VECT's locker permanently destroys large files rather than encrypting them means even victims who opt to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2