πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” New Phishing Campaign Targets Mobile Devices with Malicious PDFs πŸ“”

A novel phishing campaign identified by Zimperium targets mobile users with malicious PDFs, impersonating USPS to steal credentials.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SaaS Breaches Skyrocket 300% as Traditional Defenses Fall Short πŸ“”

Obsidian found that threat actors are focusing on SaaS applications to steal sensitive data, with most organizations' security measures not set up to deal with these attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Case for Proactive, Scalable Data Protection πŸ•΅οΈβ€β™‚οΈ

Whether you're facing growing data demands and increased cyber threats, or simply looking to futureproof your business, it's time to consider the longterm benefits of transitioning to a cloudfirst infrastructure.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 How secure are green data centers? Consider these 5 trends 🧠

As organizations increasingly measure environmental impact towards their sustainability goals, many are focusing on their data centers. KPMG found that the majority of the top 100 companies measure and report on their sustainability efforts. Because data centers consume a large amount of energy, Gartner predicts that by 2027, three in four organizations will have implemented The post How secure are green data centers? Consider these 5 trends appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs πŸ–‹οΈ

Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Gitrelated projects that, if successfully exploited, could permit an attacker to gain unauthorized access to a user's Git credentials. "Git implements a protocol called Git Credential Protocol to retrieve credentials from the credential helper," GMO Flatt Security researcher Ry0taK, who discovered the flaws.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Hidden Text Salting Disrupts Brand Name Detection Systems πŸ“”

A new phishing tactic has been identified by Cisco Talos, using hidden text salting to evade email security measures.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Customer Success Manager 🌊

The post Customer Success Manager appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… IT Vulnerability Report: 7-Zip, Windows and Fortinet Fixes Urged by Cyble πŸ¦…

Overview Cybles vulnerability intelligence report to clients last week examined highrisk flaws in 7Zip, Microsoft Windows, and Fortinet, among other products. It also examined dark web claims of a zeroday vulnerability in Apple iOS. In all, the report from Cyble Research and Intelligence Labs CRIL looked at 14 vulnerabilities and dark web exploits, including one vulnerability with a maximum CVSS severity score of 10.0 and another with more than 276,000 web exposures. Here are some of the vulnerabilities highlighted by Cybles vulnerability intelligence unit as meriting highpriority attention by security teams. The Top IT Vulnerabilities CVE202450603 is a 10.0severity OS Command Injection vulnerability in the Aviatrix Controller that could allow an unauthenticated user to ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Crisis Simulations: A Top 2025 Concern for CISOs πŸ•΅οΈβ€β™‚οΈ

CISOs are planning to adjust their budgets this year to reflect their growing concerns for cybersecurity preparedness in the event of a cyberattack.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Privacy-Preserving Federated Learning – Future Collaboration and Continued Research πŸͺ–

This post is the final blog in a series on privacypreserving federated learning . The series is a collaboration between NIST and the UK governments Responsible Technology Adoption Unit RTA, previously known as the Centre for Data Ethics and Innovation. Learn more and read all the posts published to date at NISTs Privacy Engineering Collaboration Space or RTAs blog . Reflections and Wider Considerations This is the final post in the series that began with reflections and learnings from the first USUK collaboration working with Privacy Enhancing Technologies PETs. Since the PETs Prize.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ•΅οΈβ€β™‚οΈ For $50, Cyberattackers Can Use GhostGPT to Write Malicious Code πŸ•΅οΈβ€β™‚οΈ

Malware writing is only one of several malicious activities for which the new, uncensored generative AI chatbot can be used.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Apple Patches Actively Exploited Zero-Day Vulnerability πŸ•΅οΈβ€β™‚οΈ

The Apple iOS 18.3 update fixes 28 other vulnerabilities identified by the tech company, though there is little information on them.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Change Healthcare Breach Impact Doubles to 190M People πŸ•΅οΈβ€β™‚οΈ

One of the largest data breaches in history was apparently twice as impactful as previously thought, with PII belonging to hundreds of millions of people sitting in the hands of cybercriminals.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ USPS Impersonators Tap Trust in PDFs in Smishing Attack Wave πŸ•΅οΈβ€β™‚οΈ

Attackers aim to steal people's personal and paymentcard data in the campaign, which dangles the threat of an undelivered package and has the potential to reach organizations in more than 50 countries.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ A Tumultuous Week for Federal Cybersecurity Efforts β™ŸοΈ

President Trump last week issued a flurry of executive orders that upended a number of government initiatives focused on improving the nation's cybersecurity posture. The president fired all advisors from the Department of Homeland Security's Cyber Safety Review Board, called for the creation of a strategic cryptocurrency reserve, and voided a Biden administration action that sought to reduce the risks that artificial intelligence poses to consumers, workers and national security.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More πŸ–‹οΈ

Apple has released software updates to address several security flaws across its portfolio, including a zeroday vulnerability that it said has been exploited in the wild. The vulnerability, tracked as CVE202524085, has been described as a useafterfree bug in the Core Media component that could permit a malicious application already installed on a device to elevate privileges. "Apple is.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks πŸ–‹οΈ

DeepSeek, the Chinese AI startup that has captured much of the artificial intelligence AI buzz in recent days, said it's restricting registrations on the service, citing malicious attacks. "Due to largescale malicious attacks on DeepSeek's services, we are temporarily limiting registrations to ensure continued service," the company said in an incident report page. "Existing users can log in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1πŸ€”1
πŸ“’ FBI issues guidance for enterprises as fake North Korean IT workers wreak havoc πŸ“’

The FBI has issued guidance for US enterprises to help counter the threat posed by fake North Korean IT worker scams.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ β€˜Wholly inaccurate and very significantly overstated’: TalkTalk confirms data breach probe – but says it's not as bad as claimed πŸ“’

UK telecoms firm TalkTalk has launched a data breach probe following reports a threat actor has stolen customer information.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI SOC Analysts: Propelling SecOps into the future πŸ–‹οΈ

Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up with everincreasing alert volumes and complexity, modernizing SOC automation strategies with AI has emerged as a critical solution. This blog explores how an AI SOC Analyst transforms alert management, addressing key SOC challenges while enabling faster investigations and responses. Security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations πŸ–‹οΈ

Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to commandandcontrol C2 infrastructure and stay under the radar. "ESXi appliances, which are unmonitored, are increasingly exploited as a persistence mechanism and gateway to access corporate networks widely," Sygnia.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity