πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β™ŸοΈ Microsoft: Happy 2025. Here’s 161 Security Updates β™ŸοΈ

Microsoft today unleashed updates to plug a whopping 161 security vulnerabilities in Windows and related software, including three "zeroday" weaknesses that are already under active attack. Redmond's inaugural Patch Tuesday of 2025 bundles more fixes than the company has shipped in one go since 2017.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ As Tensions Mount With China, Taiwan Sees Surge in Cyberattacks πŸ•΅οΈβ€β™‚οΈ

In 2024, the Taiwanese government saw the daily average of attempted attacks by China double to 2.4 million, with a focus on government targets and telecommunications firms.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update πŸ–‹οΈ

Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software portfolio, including three zerodays that have been actively exploited in attacks. Of the 161 flaws, 11 are rated Critical, and 149 are rated Important in severity. One other flaw, a nonMicrosoft CVE related to a Windows Secure Boot bypass CVE20247344, has not been assigned.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks πŸ–‹οΈ

Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead to information disclosure, privilege escalation, and remote code execution. Horizon3.ai researcher Naveen Sunkavally, in a technical report detailing the findings, said the "vulnerabilities are trivial to reverse and exploit." The list of identified flaws is as follows .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation πŸ–‹οΈ

The U.S. Department of Justice DoJ on Tuesday disclosed that a courtauthorized operation allowed the Federal Bureau of Investigation FBI to delete PlugX malware from over 4,250 infected computers as part of a "multimonth law enforcement operation." PlugX, also known as Korplug, is a remote access trojan RAT widely used by threat actors associated with the People's Republic of China PRC.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Australia Launches β€˜Countering Foreign Interference’ Initiative to Safeguard Sovereignty and Democracy πŸ¦…

Overview Foreign interference poses a persistent and evolving threat to Australias sovereignty, democracy, and national interests. Recognizing the critical importance of addressing these risks, the Australian Government has launched the Countering Foreign Interference in Australia Working Together Towards a More Secure Australia initiative. This comprehensive strategy outlines measures to identify, mitigate, and prevent foreign interference while empowering individuals and organizations to protect themselves. Defining Foreign Interference Foreign interference encompasses activities conducted on behalf of foreign powers that pose threats to individuals, infrastructure, or institutions. Unlike foreign influence, which operates transparently, foreign interference relies on cl...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Secureworks Exposes North Korean Links to Fraudulent Crowdfunding πŸ“”

Secureworks Counter Threat Unit CTU has identified links between North Korean IT workers and fraudulent crowdfunding activities, with the group known as Nickle Tapestry orchestrating scams to support North Korean interests.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Patches Eight Zero-Days to Start the Year πŸ“”

Patch Tuesday saw Microsoft fix eight zerodays, three of which are being actively exploited.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fortinet Confirms Critical Zero-Day Vulnerability in Firewalls πŸ“”

The security provider published mitigation measures to prevent exploitation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Vulnerability management complexity is leaving enterprises at serious risk πŸ“’

Fragmented data and siloed processes mean remediation is taking too long.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are turning Amazon S3 bucket encryption against customers in new ransomware campaign – and they’ve already claimed two victims πŸ“’

Attackers are using AWS serverside encryption to conduct ransomware attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
🧠 ISC2 Cybersecurity Workforce Study: Shortage of AI skilled workers 🧠

AI has made an impact everywhere else across the tech world, so it should surprise no one that the 2024 ISC2 Cybersecurity Workforce Study saw artificial intelligence AI jump into the top five list of security skills. Its not just the need for workers with securityrelated AI skills. The Workforce Study also takes a deep The post ISC2 Cybersecurity Workforce Study Shortage of AI skilled workers appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool πŸ–‹οΈ

As many as six security vulnerabilities have been disclosed in the popular Rsync filesynchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client. "Attackers can take control of a malicious server and readwrite arbitrary files of any connected client," the CERT Coordination Center CERTCC said in an advisory. "Sensitive data, such as SSH keys,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The High-Stakes Disconnect For ICS/OT Security πŸ–‹οΈ

Why does ICSOT need specific controls and its own cybersecurity budget today? Because treating ICSOT security with an IT security playbook isnt just ineffectiveits high risk. In the rapidly evolving domain of cybersecurity, the specific challenges and needs for Industrial Control Systems ICS and Operational Technology OT security distinctly stand out from traditional IT security. ICSOT.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Multi-Cloud Adoption Surges Amid Rising Security Concerns πŸ“”

A new report from Fortinet reveals increased adoption of multicloud strategies and hybrid implementations combining onpremises and public cloud infrastructure.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese PlugX Malware Deleted in Global Law Enforcement Operation πŸ“”

The FBI deleted Chinese PlugX malware from thousands of devices in the US, using a technique developed by French cybersecurity firm Sekoia.io.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Illicit Crypto-Inflows Set to Top $51bn in a Year πŸ“”

Chainalysis estimates threat actors made at least 51bn through crypto crime in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Fortinet’s Authentication Bypass Zero-Day: Mitigation Strategies and IoCs for Enhanced Security πŸ¦…

Overview Fortinet has disclosed a critical authentication bypass vulnerability affecting FortiOS and FortiProxy systems, identified as CVE202455591. With a CVSS score of 9.6, this vulnerability allows unauthenticated attackers to execute unauthorized code or commands, granting them superadmin privileges. The exploitation of this vulnerability has already been observed in the wild, stressing the urgency for affected organizations to act immediately. Key Details Vulnerability Summary CVE202455591 arises from a flaw in the Node.js websocket module, specifically within FortiOS and FortiProxy, where an alternate path or channel can bypass authentication mechanisms CWE288. This allows remote attackers to gain administrative access and compromise device configurations. Affe...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Enhancing Health Care Cybersecurity: Bridging HIPAA Gaps with Innovation 🦿

The proposed HIPAA Security Rule introduces mandatory measures to prevent malicious cyberattacks in health care.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 CyberGhost VPN Review (2025): Features, Pricing, and Security 🦿

In this comprehensive review of CyberGhost VPN, we cover its features, pricing, security, and overall performance. Find out if this is the right VPN for you.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains πŸ–‹οΈ

Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016 crowdfunding scam. The new evidence suggests that Pyongyangbased threamoret groups may have pulled off illicit moneymaking scams that predate the use of IT workers, SecureWorks Counter Threat Unit CTU said in a report shared with The Hacker.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity