πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.7K subscribers
89.1K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ¦… How Cyble Blaze AI Turns Billions of Threat Signals into Actionable Intelligence πŸ¦…

Modern cyberattacks no longer follow predictable patterns or slow timelines. They unfold at machine speed, often moving from initial access to data exfiltration in minutes. In this environment, security teams face a paradox they are surrounded by vast amounts of data yet struggle to extract clarity from it quickly enough to prevent damage.   This is where Cyble Blaze AI introduces a different operational model, centered on cyber threat intelligence, security analytics, and largescale threat intelligence automation designed to convert raw signals into immediate defensive action. Instead of treating security as a sequence of alerts and manual investigations, Cyble Blaze AI redefines it as a continuous intelligence system that observes, reasons, and responds in real time.  The Data O...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution πŸ–‹οΈ

Google has addressed a maximum severity security flaw in Gemini CLI the "googlegeminicli" npm package and the "googlegithubactionsrungeminicli" GitHub Actions workflow that could have allowed attackers to execute arbitrary commands on host systems. "The vulnerability allowed an unprivileged external attacker to force their own malicious content to load as Gemini configuration,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ UK firms left in the dark over what workers are sharing with AI πŸ“’

Security teams cant keep track of what workers are sharing with AI applications, regardless of whether theyre approved or unauthorized.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cyber is the Number One Global β€œPeople Risk,” Says Marsh πŸ“”

Marshs 2026 People Risks survey finds cyberrelated challenges dominate, as cyberthreat literacy tops risks and cyber and AI skills shortages rise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a Linux local privilege escalation LPE flaw that could allow an unprivileged local user to obtain root. The highseverity vulnerability tracked as CVE202631431 CVSS score 7.8 has been codenamed Copy Fail by Xint.io and Theori. "An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Europol Busts Albanian Scam Call Centers in Major Online Fraud Case πŸ“”

European police arrested 10 suspects after dismantling Albanian scam call centers linked to a 50m 58m online investment fraud operation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 15 Best Security Operations Center Tools in 2026 β€” Categories, Comparisons, and Stack Architecture 🌊

Evaluate SOC tools by what matters detection efficacy, integration depth, and real response. 15 platforms ranked with budgettiered stack guides for CTOs. The post 15 Best Security Operations Center Tools in 2026 Categories, Comparisons, and Stack Architecture appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 PCI Penetration Testing in 2026: Requirements, Process, Tools, and Compliance Playbook for PCI DSS 4.0 🌊

Evaluate your PCI pentest readiness for DSS 4.0. Cloud scoping, report templates, methodology comparisons pretest checklists for security leaders. The post PCI Penetration Testing in 2026 Requirements, Process, Tools, and Compliance Playbook for PCI DSS 4.0 appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 15 Best DLP Solutions in 2026: Vendors Compared by Cost, Coverage, and GenAI Protection 🌊

Compare 15 DLP solutions by cost, GenAI protection coverage. Vendorneutral analysis by practitioners who deploy these tools daily. Discover the right fit. The post 15 Best DLP Solutions in 2026 Vendors Compared by Cost, Coverage, and GenAI Protection appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 B2B PR and Personal Brand Manager 🌊

The post B2B PR and Personal Brand Manager appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 B2B Social Media Strategist 🌊

The post B2B Social Media Strategist appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Enterprises are adopting agents faster than they can secure and govern them – experts warn it’s a disaster waiting to happen πŸ“’

Identity systems developed for human interaction fail to cope with the new demands.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a stealthy Pythonbased backdoor framework called DEEPDOOR that comes with capabilities to establish persistent access and harvest a wide range of sensitive information from compromised hosts. "The intrusion chain begins with execution of a batch script 'installobf.bat' that disables Windows security controls, dynamically extracts an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades πŸ–‹οΈ

Intro A sophisticated, highresilience malicious campaign was identified by Atos Threat Research Center TRC in March 2026. This operation specifically targets the highprivilege professional accounts of enterprise administrators, DevOps engineers, and security analysts by impersonating administrative utilities they rely on for daily operations. By integrating Search Engine Order SEO.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK: Education Sector Faces Surge in Cyber Breaches Despite Stable National Threat Levels πŸ“”

The British public education sector has faced the nations most dramatic increase in cyber breach prevalence over the past year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Week in Vulnerabilities: GitHub Enterprise, Argo CD, Oracle Identity Manager, and Mozilla Security Flaws πŸ¦…

The latest weekly vulnerability Insights report to clients by Cyble provides a detailed view of vulnerabilities tracked between April 15, 2026, and April 21, 2026. The findings highlight a slight dip in overall disclosures compared to the previous week, but the persistence of active exploitation and evidence of realworld attacks continues to target enterprise, cloud, and opensource ecosystems.  During this reporting period, Cybles Vulnerability Intelligence module tracked 1,095 vulnerabilities, reflecting a decrease in volume after last weeks spike. However, the reduced number does not indicate lower risk. In fact, the presence of over 91 vulnerabilities with publicly available ProofofConcept PoC exploits increases the likelihood of rapid weaponization and exploitation in realworld ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA and Partners Publish Zero Trust Guidance For OT Security πŸ“”

A new CISAled guide explains how zerotrust security can be applied to operational technology, balancing cyber defence with safety and system availability.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Anti-DDoS Firm Heaped Attacks on Brazilian ISPs β™ŸοΈ

A Brazilian tech firm that specializes in protecting networks from distributed denialofservice DDoS attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm's chief executive says the malicious activity resulted from a security breach and was likely the work of a competitor trying to tarnish his company's public image.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories πŸ–‹οΈ

The internet is noisy this week. We are seeing some wild new tactics, like people using fake cell towers to send scam texts, while some developers are accidentally downloading tools that peek into their private files during a simple install. It is definitely a busy time to be online. Security is always a moving target. Millions of servers are currently sitting online without any passwords, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Deep#Door Python Backdoor Evades Detection On Windows πŸ“”

DeepDoor Python RAT uses tunneling and obfuscation to evade detection and steal credentials.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity