πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Black 'Magic' Targets Enterprise Juniper Routers With Backdoor πŸ•΅οΈβ€β™‚οΈ

Such routers typically lack endpoint detection and response protection, are in front of a firewall, and don't run monitoring software like Sysmon, making the attacks harder to detect.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Phishing Emails Targeting Australian Firms Rise by 30% in 2024 🦿

For the APAC region as a whole, credential phishing attacks rose by 30.5 between 2023 and 2024.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 GhostGPT: Uncensored Chatbot Used by Cyber Criminals for Malware Creation, Scams 🦿

Researchers from Abnormal Security discovered an advert for the chatbot on a cybercrime forum and tested its capabilities by asking it to create a DocuSign phishing email.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits πŸ–‹οΈ

An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known security flaws impacting the devices' firmware as well as misconfigured security features. "These weren't obscure, cornercase vulnerabilities," security vendor Eclypsium said in a report shared with The Hacker News. "Instead these were very wellknown issues that we wouldn't expect to see.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks πŸ–‹οΈ

Cybersecurity researchers are calling attention to a new malware campaign that leverages fake CAPTCHA verification checks to deliver the infamous Lumma information stealer. "The campaign is global, with Netskope Threat Labs tracking victims targeted in Argentina, Colombia, the United States, the Philippines, and other countries around the world," Leandro Fres, senior threat research engineer at.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Research: The State of Web Exposure 2025 πŸ–‹οΈ

Are your websites leaking sensitive data? New research reveals that 45 of thirdparty apps access user info without proper authorization, and 53 of risk exposures in Retail are due to the excessive use of tracking tools. Learn how to uncover and mitigate these hidden threats and risksdownload the full report here. New research by web exposure management specialist Reflectiz reveals several.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Custom Backdoor Exploiting Magic Packet Vulnerability in Juniper Routers πŸ–‹οΈ

Enterprisegrade Juniper Networks routers have become the target of a custom backdoor as part of a campaign dubbed Jmagic. According to the Black Lotus Labs team at Lumen Technologies, the activity is so named for the fact that the backdoor continuously monitors for a "magic packet" sent by the threat actor in TCP traffic.  "Jmagic campaign marks the rare occasion of malware designed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chained Vulnerabilities Exploited in Ivanti Cloud Service Appliances πŸ“”

Threat actors chained Ivanti CSA vulnerabilities for RCE, credential theft webshell deployment.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Bookmakers Ramp Up Efforts to Combat Arbitrage Betting Fraud πŸ“”

Arbitrage betting fraud rises, forcing bookmakers to adopt stricter measures against automated scams.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cloudflare CDN Bug Outs User Locations on Signal, Discord πŸ•΅οΈβ€β™‚οΈ

Attackers can use a zero or oneclick flaw to send a malicious image to targets an image that can deanonymize a user within seconds, posing a threat to journalists, activists, hackers, and others whose locations are sensitive.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Tesla Gear Gets Hacked Multiple Times in Pwn2Own Contests πŸ•΅οΈβ€β™‚οΈ

The first team to successfully hack the electric vehicle maker's charger won 50,000 for their ingenuity.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ War Game Pits China Against Taiwan in All-Out Cyberwar πŸ•΅οΈβ€β™‚οΈ

At Black Hat and DEF CON, cybersecurity experts were asked to game out how Taiwan could protect its communications and power infrastructure in case of invasion by China.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations πŸ–‹οΈ

Google has launched a new feature called Identity Check for supported Android devices that locks sensitive settings behind biometric authentication when outside of trusted locations. "When you turn on Identity Check, your device will require explicit biometric authentication to access certain sensitive resources when you're outside of trusted locations," Google said in a post announcing the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds Five-Year-Old jQuery XSS Flaw to Exploited Vulnerabilities List πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday placed a nowpatched security flaw impacting the popular jQuery JavaScript library to its Known Exploited Vulnerabilities KEV catalog, based on evidence of active exploitation. The mediumseverity vulnerability is CVE202011023 CVSS score 6.16.9, a nearly fiveyearold crosssite scripting XSS bug that could be.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware Gangs Linked by Shared Code and Ransom Notes πŸ“”

SentinelOne researchers highlighted similarities in the approaches used by the HellCat and Morpheus ransomware groups, suggesting shared infrastructure.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations πŸ–‹οΈ

The U.S. Department of Justice DoJ on Thursday indicted two North Korean nationals, a Mexican national, and two of its own citizens for their alleged involvement in the ongoing fraudulent information technology IT worker scheme that seeks to generate revenue for the Democratic People's Republic of Korea DPRK in violation of international sanctions. The action targets Jin SungIl , Pak.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ How to enable M365 Copilot for your organisation πŸ“’

Maximising the value of technology in an evolving defence sector.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are using Microsoft Teams to conduct β€œemail bombing” attacks πŸ“’

Experts told ITPro that tactics like this are on the rise, and employees must be trained effectively.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISOs are gaining more influence in the boardroom, and it’s about time πŸ“’

CISO influence in the Csuite and boardrooms is growing, new research shows, as enterprises focus heavily on cybersecurity capabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 2025 State of SaaS Backup and Recovery Report πŸ–‹οΈ

The modern workplace has undergone a seismic transformation over recent years, with hybrid work becoming the norm and businesses rapidly adopting cloudbased SoftwareasaService SaaS applications to facilitate it. SaaS applications like Microsoft 365 and Google Workspace have now become the backbone of business operations, enabling seamless collaboration and productivity. However, this.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russian Scammers Target Crypto Influencers with Infostealers πŸ“”

Crazy Evil, a group of crypto scammers, exploit NFTs and cryptocurrencies with malware targeting influencers and tech professionals.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity