πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Ransomware Attacks Surge to Record High in December 2024 πŸ“”

NCC Group observed 574 global ransomware attacks in December, the highest monthly volume it has recorded.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese Cyberspies Target South Korean VPN in Supply Chain Attack πŸ•΅οΈβ€β™‚οΈ

Advanced persistent threat group PlushDaemon, active since 2019, is using a sophisticated modular backdoor to collect data from infected systems in South Korea.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Trump Pardons 'Silk Road' Dark Web Drug Market Creator πŸ•΅οΈβ€β™‚οΈ

The pardon comes after 11 years in prison for Ross Ulbricht, who was sentenced to life without parole on several charges, including computer hacking, distribution of narcotics, and money laundering.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Trump Overturns Biden Rules on AI Development, Security πŸ•΅οΈβ€β™‚οΈ

The new administration moved quickly to remove any constraints on AI development and collected 500 billion in investment pledges for an Americanowned AI joint venture.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for Ransomware πŸ–‹οΈ

Google on Wednesday shed light on a financially motivated threat actor named TRIPLESTRENGTH for its opportunistic targeting of cloud environments for cryptojacking and onpremise ransomware attacks. "This actor engaged in a variety of threat activity, including cryptocurrency mining operations on hijacked cloud resources and ransomware activity," the tech giant's cloud division said in its 11th.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9) πŸ–‹οΈ

Cisco has released software updates to address a critical security flaw impacting Meeting Management that could permit a remote, authenticated attacker to gain administrator privileges on susceptible instances. The vulnerability, tracked as CVE202520156, carries a CVSS score of 9.9 out 10.0. It has been described as a privilege escalation flaw in the REST API of Cisco Meeting Management. "This.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ QakBot-Linked BC Malware Adds Enhanced DNS Tunneling and Remote Access Features πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a new BackConnect BC malware that has been developed by threat actors linked to the infamous QakBot loader. "BackConnect is a common feature or module utilized by threat actors to maintain persistence and perform tasks," Walmart's Cyber Intelligence team told The Hacker News. "The BackConnects in use were 'DarkVNC' alongside the IcedID.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Trump Pardons Silk Road Founder Ulbricht πŸ“”

President Trump has pardoned the founder of original dark web marketplace Silk Road.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
😱1
πŸ“” New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing πŸ“”

Cybercriminals are selling access to the malicious GenAI chatbot via Telegram, providing rapid assistance for a range of nefarious activities, according to Abnormal Security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ–‹οΈ How to Eliminate Identity-Based Threats πŸ–‹οΈ

Despite significant investments in advanced technologies and employee training programs, credential and userbased attacks remain alarmingly prevalent, accounting for 5080 of enterprise breaches1,2. While identitybased attacks continue to dominate as the leading cause of security incidents, the common approach to identity security threats is still threat reduction, implementing layers of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation πŸ–‹οΈ

SonicWall is alerting customers of a critical security flaw impacting its Secure Mobile Access SMA 1000 Series appliances that it said has been likely exploited in the wild as a zeroday. The vulnerability, tracked as CVE202523006, is rated 9.8 out of a maximum of 10.0 on the CVSS scoring system. "Preauthentication deserialization of untrusted data vulnerability has been identified in the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Research: The State of Web Exposure 2025 πŸ–‹οΈ

Are your websites leaking sensitive data? New research reveals that 45 of thirdparty apps access user info without proper authorization, and 53 of risk exposures in Retail are due to the excessive use of tracking tools. Learn how to uncover and mitigate these hidden threats and risksdownload the full report here. New research by web exposure management specialist Reflectiz reveals several.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ LinkedIn faces lawsuit amid claims it shared users' private messages to train AI models πŸ“’

LinkedIn faces a lawsuit in the US amid allegations that it shared Premium members' private messages to train AI models.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cisco Fixes Critical Vulnerability in Meeting Management πŸ“”

The network equipment giant urged customers to patch immediately.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Security Needs to Start Saying 'No' Again πŸ•΅οΈβ€β™‚οΈ

The rush to say 'yes' allows cybersecurity teams to avoid hard conversations with business stakeholders, but also risks losing their ability to effectively protect organizations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Aircraft Collision Avoidance Systems Hit by High-Severity ICS Vulnerability πŸ¦…

Overview  A pair of vulnerabilities in the Traffic Alert and Collision Avoidance System TCAS II for avoiding midair collisions were among 20 vulnerabilities reported by Cyble in its weekly Industrial Control System ICS Vulnerability Intelligence Report.  The midair collision system flaws have been judged at low risk of being exploited, but one of the vulnerabilities does not presently have a fix. They could potentially be exploited from adjacent networks.  Other ICS vulnerabilities covered in the January 1521 Cyble report to subscribers include flaws in critical manufacturing, energy and other critical infrastructure systems. The full report is available for subscribers, but Cyble is publishing information on the TCAS vulnerabilities in the public interest.  TCAS II Vulnerabil...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISOs Dramatically Increase Boardroom Influence but Still Lack Soft Skills πŸ“”

Splunk reveals that 82 of CISOs now report directly to the CEO, but many lack EQ.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Doti AI Launches Platform to Securely Find Enterprise Data πŸ•΅οΈβ€β™‚οΈ

The AIpowered work platform helps organizations securely identify and access internal enterprise data as part of business processes and workflows.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CERT-UA Warns of Malicious AnyDesk Requests Under the Pretext of Phony β€œSecurity Audits” πŸ¦…

Overview  Government entities and organizations in Ukraine are on high alert after the Computer Emergency Response Team of Ukraine CERTUA uncovered a social engineering campaign targeting unsuspecting users with malicious AnyDesk requests.     The attackers are impersonating CERTUA, a legitimate government agency, to trick victims into granting remote access to their computers using AnyDesk, a popular remote desktop application.     Heres a breakdown of the attack and how to stay safe  Deceptive Tactics  Impersonation Attackers are using the CERTUA name, logo, and even a specific AnyDesk ID 1518341498, though this may change to establish trust with potential victims.     Pretext for Access The attackers claim to be conducting a "security audit" to check the level of prote...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Password management startup Passbolt secures $8 million to shake up credential security πŸ“’

Password management startup Passbolt has secured 8 million in funding as part of a Series A investment round.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 Taking the fight to the enemy: Cyber persistence strategy gains momentum 🧠

The nature of cyber warfare has evolved rapidly over the last decade, forcing the worlds governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence actively hunting down threats before they materialize has become the new frontier. This shift, spearheaded by The post Taking the fight to the enemy Cyber persistence strategy gains momentum appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity