πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.5K subscribers
89K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🌊 Passkeys in UnderDefense MAXI: Enhancing Security Beyond Passwords and MFA 🌊

Passkeys Are Now in UnderDefense MAXI Heres Why They Matter Every security team has had the same uncomfortable conversation at some point our MFA is fine, right? Yes. Technically. The post Passkeys in UnderDefense MAXI Enhancing Security Beyond Passwords and MFA appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Automated SOC to Autonomous SOC: Architecture, Maturity Model, and Implementation Roadmap 🌊

Autonomous SOC architecture, 5stage maturity model, and 90day implementation roadmap. Evaluate TCO, governance, and AI agents for your SOC. Explore now. The post Automated SOC to Autonomous SOC Architecture, Maturity Model, and Implementation Roadmap appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Top 25+ Security Automation Tools in 2026: The Enterprise Buyer’s Guide with ROI Frameworks 🌊

We evaluated 28 security automation tools across 8 categories SOAR, SIEM, XDR, MDR, GRC. Compare pricing, AI tiers, and deployment models. The post Top 25 Security Automation Tools in 2026 The Enterprise Buyers Guide with ROI Frameworks appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Threat Landscape March 2026: Ransomware Dominance, Access Brokers, Data Leaks, and Critical Exploitation Trends πŸ¦…

Cyble Research Intelligence Labs CRIL in its monthly threat landscape analysis observed a highly active threat environment throughout March 2026, shaped by largescale ransomware campaigns, persistent data breach activity, growing initial access brokerage markets, and exploitation of critical vulnerabilities affecting widely deployed enterprise systems. Threat actors continued to prioritize financial extortion, credential access, and operational disruption, while increasingly targeting sectors rich in sensitive data or dependent on business continuity. Quick Summary Key threat trends identified during March 2026 include 702 ransomware attacks recorded globally. 54 major data breach and leak incidents observed. 20 compromised access sale listings tracked across cybercrime ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Everything we know about the Vercel data breach so far πŸ“’

An OAuth supply chain compromise saw 'nonsensitive' Vercel data compromised and some internal systems accessed.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ β€˜Scattered Spider’ Member β€˜Tylerb’ Pleads Guilty β™ŸοΈ

A 24yearold British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of textmessage phishing attacks in the summer of 2022 that allowed the group to hack into at least a dozen major technology companies and steal tens of millions of dollars worth of cryptocurrency from investors.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters πŸ–‹οΈ

Cybersecurity researchers have identified 22 new vulnerabilities in popular models of serialtoIP converters from Lantronix and Silex that could be exploited to hijack susceptible devices and tamper with data exchanged by them. The vulnerabilities have been collectively codenamed BRIDGEBREAK by Forescout Research Vedere Labs, which identified nearly 20,000 SerialtoEthernet converters exposed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023 πŸ–‹οΈ

A third individual who was employed as a ransomware negotiator has pleaded guilty to conducting ransomware attacks against U.S. companies in 2023. Angelo Martino, 41, of Land O'Lakes, Florida, teamed up with the operators of the BlackCat ransomware starting in April 2023 to assist the ecrime gang in extracting higher amounts as ransoms. "Working as a negotiator on behalf of five different.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time πŸ–‹οΈ

Security teams often present MTTR as an internal KPI. Leadership sees it differently every hour a threat dwells inside the environment is an hour of potential data exfiltration, service disruption, regulatory exposure, and brand damage.  The root cause of slow MTTR is almost never "not enough analysts." It is almost always the same structural problem threat intelligence that exists.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs πŸ–‹οΈ

Cybersecurity researchers have discovered a new iteration of an Android malware family called NGate that has been found to abuse a legitimate application called HandyPay instead of NFCGate. "The threat actors took the app, which is used to relay NFC data, and patched it with malicious code that appears to have been AIgenerated," ESET security researcher Luk tefanko said in a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks πŸ–‹οΈ

The cybersecurity industry has spent the last several years chasing sophisticated threats like zerodays, supply chain compromises, and AIgenerated exploits. However, the most reliable entry point for attackers still hasn't changed stolen credentials. Identitybased attacks remain a dominant initial access vector in breaches today. Attackers obtain valid credentials through credential stuffing.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution πŸ–‹οΈ

Cybersecurity researchers have discovered a vulnerability in Google's agentic integrated development environment IDE, Antigravity, that could be exploited to achieve code execution. The flaw, since patched, combines Antigravity's permitted filecreation capabilities with an insufficient input sanitization in Antigravity's native filesearching tool, findbyname, to bypass the program's Strict.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Monday added eight new vulnerabilities to its Known Exploited Vulnerabilities KEV catalog, including three flaws impacting Cisco Catalyst SDWAN Manager, citing evidence of active exploitation. The list of vulnerabilities is as follows CVE202327351 CVSS score 8.2 An improper authentication vulnerability in PaperCut.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Trojanized Android App Fuels New Wave of NFC Fraud πŸ“”

NGate malware abuses HandyPay app to steal NFC card data and PINs in Brazil.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” The Gentlemen Ransomware Expands With Rapid Affiliate Growth πŸ“”

Gentlemen RaaS expands quickly with multiplatform attacks and SystemBClinked infections.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Unchecked AI Agents Cause Cybersecurity Incidents at Two Thirds of Firms πŸ“”

Data exposure, operational disruption and financial losses among issues faced by businesses struggling with the rapid rise of AI agents, warns Cloud Security Alliance report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Vercel Confirms Cyber Incident After Sophisticated Attacker Exploits Third‑Party Tool πŸ“”

Cloud app developer Vercel appears to have suffered a security breach.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” North Korean Blamed for $290m KelpDAO Crypto Heist πŸ“”

North Koreas Lazarus Group is pegged for a 290m crypto theft at KelpDAO.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation πŸ–‹οΈ

Threat actors associated with The Gentlemen ransomwareasaservice RaaS operation have been observed attempting to deploy a known proxy malware called SystemBC. According to new research published by Check Point, the commandandcontrol C2 or CC server linked to SystemBC has led to the discovery of a botnet of more than 1,570 victims. "SystemBC establishes SOCKS5 network tunnels within.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Alert Fatigue in Cybersecurity: the SOC Playbook to Eliminate It 🌊

Alert fatigue costs SOCs 23M annually. Discover the 12question playbook covering root causes, detection audits, and agentic AI solutions. The post Alert Fatigue in Cybersecurity the SOC Playbook to Eliminate It appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity