πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.5K subscribers
88.9K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic πŸ–‹οΈ

Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. "PowMix employs randomized commandandcontrol C2 beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections," Cisco Talos.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories πŸ–‹οΈ

You know that feeling when you open your feed on a Thursday morning and it's just... a lot? Yeah. This week delivered. We've got hackers getting creative in ways that are almost impressive if you ignore the whole "crime" part, ancient vulnerabilities somehow still ruining people's days, and enough supply chain drama to fill a season of television nobody asked for. Not .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment πŸ–‹οΈ

In 2024, compromised service accounts and forgotten API keys were behind 68 of cloud breaches. Not phishing. Not weak passwords. Unmanaged nonhuman identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials service accounts, API tokens, AI agent connections, andOAuth grants. When projects end or employees leave, most.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution πŸ–‹οΈ

Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service. The details of the vulnerabilities are below  CVE202620184 CVSS score 9.8 An improper certificate validation in the integration of single signon SSO.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks πŸ–‹οΈ

A "novel" social engineering campaign has been observed abusing Obsidian, a crossplatform notetaking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency sectors. Dubbed REF6598 by Elastic Security Labs, the activity has been found to leverage.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ Supply chain dependencies: Have you checked your blind spot? πŸš€

Your biggest risk may be a vendor you trust. How can SMBs map their thirdparty blind spots and build operational resilience?.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Commercial AI Models Show Rapid Gains in Vulnerability Research πŸ“”

AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a Forescout study finds.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” DDoS-For-Hire Services Disrupted by International Police Action in β€˜Operation PowerOff’ πŸ“”

Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests and sends warning letters to known DDoS service users.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“” US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea πŸ“”

US authorities jail two Americans for aiding North Korean laptop farm scams that infiltrated over 100 firms.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” APK Malformation Found in Thousands of Android Malware Samples πŸ“”

APK malformation tactic now appears in over 3000 Android malware samples evading static analysis.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack πŸ“”

Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Four Nationally Significant Cyberattacks Every Week β€” Is the UK Ready? πŸ¦…

The tempo of UK cyberattacks has shifted from sporadic disruption to something far more systemic. When incidents reach a frequency of four national events each week, the issue stops being purely technical and becomes structural. It raises a more uncomfortable question than whether attacks will happen it asks whether UK cybersecurity readiness is evolving fast enough to keep pace with a threat environment that is no longer linear, but compounding. The latest assessment from the National Cyber Security Centre NCSC reveals a sharp escalation in UK national cyber threats. In the 12 months leading to September 2025, 204 incidents were classified as nationally significant, more than double the 89 recorded in the previous year. This is the highest figure on record. The Acceleration of UK...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Bluesky Outage: Coordinated Traffic Attack Causes Widespread Errors 🦿

Blueskys DDoS attack caused outages for a second day, disrupting feeds, notifications, and search across the platform. The post Bluesky Outage Coordinated Traffic Attack Causes Widespread Errors appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 New Phishing Attack Turns n8n Into On-Demand Malware Machine 🦿

Hackers are abusing n8n workflows to deliver malware and evade detection, according to Cisco Talos, using trusted automation to bypass security defenses. The post New Phishing Attack Turns n8n Into OnDemand Malware Machine appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Anthropic Releases Opus 4.7, Not as β€˜Broadly Capable’ as Mythos AI 🦿

Anthropic launches Opus 4.7 with improved coding and reasoning, as its more broadly capable Mythos AI remains restricted over security concerns. The post Anthropic Releases Opus 4.7, Not as Broadly Capable as Mythos AI appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Clothing Retailer Patches Website Flaw Exposing Customer Data 🦿

A clothing retailer patched a website flaw that exposed customer data via order links, highlighting risks associated with predictable URL structures. The post Clothing Retailer Patches Website Flaw Exposing Customer Data appeared first on TechRepublic.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet πŸ–‹οΈ

Threat actors are exploiting security flaws in TBK DVR and endoflife EoL TPLink WiFi routers to deploy Miraibotnet variants on compromised devices, according to findings from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack targeting TBK DVR devices has been found to exploit CVE20243721 CVSS score 6.3, a mediumseverity command injection vulnerability affecting.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ That data breach alert might be a trap πŸš€

Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data πŸ–‹οΈ

In 2024, compromised service accounts and forgotten API keys were behind 68 of cloud breaches. Not phishing. Not weak passwords. Unmanaged nonhuman identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials service accounts, API tokens, AI agent connections, and OAuth grants. When projects end or employees leave, most.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims πŸ–‹οΈ

Grinex, a Kyrgyzstanincorporated cryptocurrency exchange sanctioned by the U.K. and the U.S. last year, said it's suspending operations after it blamed Western intelligence agencies for a 13.74 million hack. The exchange said it fell victim to what it described as a largescale cyber attack that bore hallmarks of foreign intelligence agency involvement. This attack led to the theft of over 1.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity