πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ New Startups Focus on Deepfakes, Data-in-Motion & Model Security πŸ•΅οΈβ€β™‚οΈ

In times of unprecedented change, innovative mindsets and attentiveness of startup culture make for a community everyone can leverage to understand the world and guard against its dangers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Windscribe VPN Review (2025): Features, Pricing, and Security 🦿

We evaluate the features, performance, security, and pricing of Windscribe VPN to help you determine if it's a reliable VPN service for your needs.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New AI Rule Aims to Prevent Misuse of US Technology πŸ“”

A new Interim Final Rule on Artificial Intelligence Diffusion issued in the US strengthens security, streamlines chip sales and prevents misuse of AI technology.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Browser-Based Cyber-Threats Surge as Email Malware Declines πŸ“”

Browserbased cyberthreats surged in 2024, with credential abuse and infostealers on the rise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation πŸ–‹οΈ

Microsoft has shed light on a nowpatched security flaw impacting Apple macOS that, if successfully exploited, could have allowed an attacker running as "root" to bypass the operating system's System Integrity Protection SIP and install malicious kernel drivers by loading thirdparty kernel extensions. The vulnerability in question is CVE202444243 CVSS score 5.5, a mediumseverity bug.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google OAuth Vulnerability Exposes Millions via Failed Startup Domains πŸ–‹οΈ

New research has pulled back the curtain on a "deficiency" in Google's "Sign in with Google" authentication flow that exploits a quirk in domain ownership to gain access to sensitive data. "Google's OAuth login doesn't protect against someone purchasing a failed startup's domain and using it to recreate email accounts for former employees," Truffle Security cofounder and CEO Dylan Ayrey said.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Zero-Day Security Bug Likely Fueling Fortinet Firewall Attacks πŸ•΅οΈβ€β™‚οΈ

An ongoing campaign targeting FortiGate devices with management interfaces exposed on the public Internet is leading to unauthorized administrative logins and configuration changes, creating new accounts, and performing SSL VPN authentication.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Rings in 2025 With Record Security Update πŸ•΅οΈβ€β™‚οΈ

Company has issued patches for an unprecedented 159 CVEs, including eight zerodays, three of which attackers are already exploiting.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Apple Bug Allows Root Protections Bypass Without Physical Access πŸ•΅οΈβ€β™‚οΈ

Emergent macOS vulnerability lets adversaries circumvent Apple's System Integrity Protection SIP by loading thirdparty kernels.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FBI Wraps Up Eradication Effort of Chinese 'PlugX' Malware πŸ•΅οΈβ€β™‚οΈ

Two hacker groups were paid to develop malware targeting victims in the US, Europe, and Asia, as well as various Chinese dissident groups.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Australian Government Agencies Failing to Keep Up With Cyber Security Change 🦿

Cyber security maturity declines among Australian government agencies in 2024, as legacy IT systems hinder progress under the Essential Eight framework.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Microsoft: Happy 2025. Here’s 161 Security Updates β™ŸοΈ

Microsoft today unleashed updates to plug a whopping 161 security vulnerabilities in Windows and related software, including three "zeroday" weaknesses that are already under active attack. Redmond's inaugural Patch Tuesday of 2025 bundles more fixes than the company has shipped in one go since 2017.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ As Tensions Mount With China, Taiwan Sees Surge in Cyberattacks πŸ•΅οΈβ€β™‚οΈ

In 2024, the Taiwanese government saw the daily average of attempted attacks by China double to 2.4 million, with a focus on government targets and telecommunications firms.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update πŸ–‹οΈ

Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software portfolio, including three zerodays that have been actively exploited in attacks. Of the 161 flaws, 11 are rated Critical, and 149 are rated Important in severity. One other flaw, a nonMicrosoft CVE related to a Windows Secure Boot bypass CVE20247344, has not been assigned.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks πŸ–‹οΈ

Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead to information disclosure, privilege escalation, and remote code execution. Horizon3.ai researcher Naveen Sunkavally, in a technical report detailing the findings, said the "vulnerabilities are trivial to reverse and exploit." The list of identified flaws is as follows .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation πŸ–‹οΈ

The U.S. Department of Justice DoJ on Tuesday disclosed that a courtauthorized operation allowed the Federal Bureau of Investigation FBI to delete PlugX malware from over 4,250 infected computers as part of a "multimonth law enforcement operation." PlugX, also known as Korplug, is a remote access trojan RAT widely used by threat actors associated with the People's Republic of China PRC.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Australia Launches β€˜Countering Foreign Interference’ Initiative to Safeguard Sovereignty and Democracy πŸ¦…

Overview Foreign interference poses a persistent and evolving threat to Australias sovereignty, democracy, and national interests. Recognizing the critical importance of addressing these risks, the Australian Government has launched the Countering Foreign Interference in Australia Working Together Towards a More Secure Australia initiative. This comprehensive strategy outlines measures to identify, mitigate, and prevent foreign interference while empowering individuals and organizations to protect themselves. Defining Foreign Interference Foreign interference encompasses activities conducted on behalf of foreign powers that pose threats to individuals, infrastructure, or institutions. Unlike foreign influence, which operates transparently, foreign interference relies on cl...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Secureworks Exposes North Korean Links to Fraudulent Crowdfunding πŸ“”

Secureworks Counter Threat Unit CTU has identified links between North Korean IT workers and fraudulent crowdfunding activities, with the group known as Nickle Tapestry orchestrating scams to support North Korean interests.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Patches Eight Zero-Days to Start the Year πŸ“”

Patch Tuesday saw Microsoft fix eight zerodays, three of which are being actively exploited.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fortinet Confirms Critical Zero-Day Vulnerability in Firewalls πŸ“”

The security provider published mitigation measures to prevent exploitation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Vulnerability management complexity is leaving enterprises at serious risk πŸ“’

Fragmented data and siloed processes mean remediation is taking too long.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity