πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Three Russians Charged with Crypto Mixer Money Laundering πŸ“”

Three Russian men have been indicted on money laundering charges connected to cryptocurrency mixers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Telefonica Breach Hits 20,000 Employees and Exposes Jira Details πŸ“”

Telefonica has confirmed a breach of its internal ticketing system exposing more than 236,000 lines of customer data.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WEF Warns of Growing Cyber Inequity Amid Escalating Complexities in Cyberspace πŸ“”

A new WEF report highlighted growing disparities in the cyber capabilities of different types of organizations and regions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January] πŸ–‹οΈ

The cyber worlds been buzzing this week, and its all about staying ahead of the bad guys. From sneaky software bugs to advanced hacking tricks, the risks are real, but so are the ways to protect yourself. In this recap, well break down whats happening, why it matters, and what you can do to stay secure. Lets turn awareness into action and keep one step ahead.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ransomware on ESXi: The mechanization of virtualized attacks πŸ–‹οΈ

In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, with the average ransom demand skyrocketing to 5 million. With approximately 8,000 ESXi hosts exposed directly to the internet according to Shodan, the operational and business impact of these attacks is profound. Most of the Ransomware strands that are attacking ESXi servers nowadays, are variants of the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CyberSecurity Malaysia Flags Major Threats in Chrome and WordPress – Are You Safe? πŸ¦…

Google Chrome and WordPress users face highseverity security threats. CyberSecurity Malaysia advises immediate updates to prevent potential exploits and safeguard data. Overview CyberSecurity Malaysia has recently notified users of critical vulnerabilities in two widely used software platforms Google Chrome and the WordPress File Upload plugin. If exploited, these vulnerabilities could allow attackers to execute arbitrary code, escalate privileges, or cause disruptions. Security updates have been issued, and users are strongly advised to apply these updates immediately to protect their systems. This article provides an indepth look at these vulnerabilities, their potential impacts, affected products, and recommended mitigation actions. Google Chrome Security Update Goo...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Phishing campaign targets developers with fake CrowdStrike job offers πŸ“’

Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Ransomware Group Uses AI to Develop Nefarious Tools πŸ“”

Researchers at Check Point said FunkSec operators appear to use AI for malware development.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Bitwarden vs 1Password: Battle of the Best – Who Wins? 🦿

Bitwarden and 1Password are two of the top password managers. Find out which password manager is the best for you using this comprehensive comparison.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Inside the Active Threats of Ivanti’s Exploited Vulnerabilities πŸ¦…

Threats, exploitation, and mitigation of Ivantis two critical actively exploited vulnerabilitiesCVE20250282 and CVE20250283affecting its Connect Secure, Policy Secure, and Neurons for ZTA Gateways. Overview On January 8, 2025, Ivanti disclosed two critical vulnerabilitiesCVE20250282 and CVE20250283affecting its Connect Secure, Policy Secure, and Neurons for ZTA Gateways. These vulnerabilities expose enterprises to unauthenticated remote code execution RCE and privilege escalation risks. While Ivanti has released patches to address these issues, threat actor exploitation, particularly of CVE20250282, has prompted a global response. This blog aims to provide detailed insights into these vulnerabilities and their exploitation, offering valuable guidance for mitigating risks. A ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft 365 MFA Outage Fixed πŸ“”

Microsoft confirmed an outage of its multifactor authentication system impacting access to Microsoft 365, causing login failures and service disruption.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ The Shifting Landscape of Open Source Security πŸ•΅οΈβ€β™‚οΈ

By focusing on vigilant security practices, responsible AI deployment, and alignment with global regulatory standards, the OSS community can make 2025 a transformative year for security.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners πŸ–‹οΈ

A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform has come under active exploitation in the wild to deploy backdoors and cryptocurrency miners. Cloud security firm Wiz said it's currently responding to "multiple incidents" involving the weaponization of CVE202450603 CVSS score 10.0, a maximum severity bug that could result in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results πŸ•΅οΈβ€β™‚οΈ

Threat actors are targeting people searching for pirated or cracked software with fake downloaders that include infostealing malware such as Lumma and Vidar.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Telefonica Breach Exposes Jira Tickets, Customer Data πŸ•΅οΈβ€β™‚οΈ

The Hellcat ransomware group has stolen roughly 5,000 documents, potentially containing confidential information, from the telecom giant's internal database.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 How CTEM is providing better cybersecurity resilience for organizations 🧠

Organizations today continuously face a number of fastmoving cyber threats that regularly challenge the effectiveness of their cybersecurity defenses. However, to keep pace, businesses need a proactive and adaptive approach to their security planning and execution. Cyber threat exposure management CTEM is an effective way to achieve this goal. It provides organizations with a reliable The post How CTEM is providing better cybersecurity resilience for organizations appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russian Malware Campaign Hits Central Asian Diplomatic Files πŸ“”

Diplomatic entities in Kazakhstan and Central Asia have been targeted by UAC0063 using weaponized Word docs deploying HATVIBE malware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Cracks Down on Malicious Copilot AI Use πŸ•΅οΈβ€β™‚οΈ

According to the tech giant, it has observed a threat group seeking out vulnerable customer accounts using generative AI, then creating tools to abuse these services.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cloud Attackers Exploit Max-Critical Aviatrix RCE Flaw πŸ•΅οΈβ€β™‚οΈ

The security vulnerability tracked as CVE202450603, which rates 10 out of 10 on the CVSS scale, enables unauthenticated remote code execution on affected systems, which cyberattackers are using to plant malware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 US Chip Export Rule Proposes Limits to Thwart Chinese GPUs 🦿

The Biden administration states the rule will prevent U.S. chips from passing to China through countries loosely allied or not politically allied with the U.S.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Monday added a second security flaw impacting BeyondTrust Privileged Remote Access PRA and Remote Support RS products to the Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation in the wild. The vulnerability in question is CVE202412686 CVSS score 6.6, a mediumseverity bug that could.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity