πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Phishing Campaign Baits Hook With Malicious Amazon PDFs πŸ•΅οΈβ€β™‚οΈ

In their discovery, researchers found 31 PDF files linking to these phishing websites, none of which have been yet submitted to VirusTotal.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OAuth Flaw Exposed Millions of Airline Users to Account Takeovers πŸ•΅οΈβ€β™‚οΈ

The nowfixed vulnerability involved a major travel services company that's integrated with dozens of airline websites worldwide.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Lynx Ransomware Group 'Industrializes' Cybercrime With Affiliates πŸ•΅οΈβ€β™‚οΈ

The ransomware group provides everything an affiliate could want to breach and attack victims, including a quality controlled recruitment system to engage even more criminals.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents πŸ–‹οΈ

The advanced persistent threat APT group known as UAC0063 has been observed leveraging legitimate documents obtained by infiltrating one victim to attack another target with the goal of delivering a known malware dubbed HATVIBE. "This research focuses on completing the picture of UAC0063's operations, particularly documenting their expansion beyond their initial focus on Central Asia,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer πŸ–‹οΈ

Broadcom has alerted of a highseverity security flaw in VMware Avi Load Balancer that could be weaponized by malicious actors to gain entrenched database access. The vulnerability, tracked as CVE202522217 CVSS score 8.6, has been described as an unauthenticated blind SQL injection. "A malicious user with network access may be able to use specially crafted SQL queries to gain database.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability πŸ–‹οΈ

Cybersecurity researchers are warning that a critical zeroday vulnerability impacting Zyxel CPE Series devices is seeing active exploitation attempts in the wild. "Attackers can leverage this vulnerability to execute arbitrary commands on affected devices, leading to complete system compromise, data exfiltration, or network infiltration," GreyNoise researcher Glenn Thorpe said in an alert.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Scores of Critical UK Government IT Systems Have Major Security Holes πŸ“”

The National Audit Office warns of major gaps in cyber resilience across UK government departments.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ NAO warns that UK government doesn't know how vulnerable its IT systems are πŸ“’

A report from the audit watchdog has found creaking legacy systems and a severe cyber skills shortage.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 7 Tips for Strategically Saying "No" in Cybersecurity πŸ•΅οΈβ€β™‚οΈ

Cybersecurity can't always be "Department of No," but saying yes all the time is not the answer. Here is how to enable innovation gracefully without adding risk to the organization.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CrowdStrike Highlights Magnitude of Insider Risk πŸ•΅οΈβ€β™‚οΈ

The impetus for CrowdStrike's new professional services came from last year's Famous Chollima threat actors, which used fake IT workers to infiltrate organizations and steal data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI in Cybersecurity: What's Effective and What’s Not – Insights from 200 Experts πŸ–‹οΈ

Curious about the buzz around AI in cybersecurity? Wonder if it's just a shiny new toy in the tech world or a serious game changer? Let's unpack this together in a nottobemissed webinar that goes beyond the hype to explore the real impact of AI on cybersecurity. Join Ravid Circus, a seasoned pro in cybersecurity and AI, as we peel back the layers of AI in cybersecurity through a revealing.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits πŸ–‹οΈ

A team of security researchers from Georgia Institute of Technology and Ruhr University Bochum has demonstrated two new sidechannel attacks targeting Apple silicon that could be exploited to leak sensitive information from web browsers like Safari and Google Chrome. The attacks have been codenamed Data Speculation Attacks via Load Address Prediction on Apple Silicon SLAP and Breaking the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How Interlock Ransomware Infects Healthcare Organizations πŸ–‹οΈ

Ransomware attacks have reached an unprecedented scale in the healthcare sector, exposing vulnerabilities that put millions at risk. Recently, UnitedHealth revealed that 190 million Americans had their personal and healthcare data stolen during the Change Healthcare ransomware attack, a figure that nearly doubles the previously disclosed total.  This breach shows just how deeply ransomware.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution πŸ–‹οΈ

A critical security flaw has been disclosed in the Cacti opensource network monitoring and fault management framework that could allow an authenticated attacker to achieve remote code execution on susceptible instances. The flaw, tracked as CVE202522604, carries a CVSS score of 9.1 out of a maximum of 10.0. "Due to a flaw in the multiline SNMP result parser, authenticated users can inject.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese GenAI Startup DeepSeek Sparks Global Privacy Debate πŸ“”

Government agencies and privacy watchdogs have started investigating the Chinese AI chatbot provider over data privacy concerns.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Breakout Time Accelerates 22% as Cyber-Attacks Speed Up πŸ“”

ReliaQuest warns threat actor innovation and infostealer activity helped to accelerate breakout time by 22 in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… New ICS Vulnerabilities Discovered in Schneider Electric and B&R Automation Systems πŸ¦…

Overview The U.S. Cybersecurity and Infrastructure Security Agency CISA issued two urgent advisories regarding serious ICS vulnerabilities in industrial control systems ICS products. These ICS vulnerabilities, identified in Schneider Electric's RemoteConnect and SCADAPack x70 Utilities, as well as BR Automation's Runtime software, pose online risks to critical infrastructure systems worldwide. The ICS vulnerabilities, if exploited, could lead to potentially devastating impacts on the integrity, confidentiality, and availability of systems within energy, critical manufacturing, and other essential sectors. Schneider Electrics Vulnerability in RemoteConnect and SCADAPack x70 Utilities The ICS vulnerability in Schneider Electrics RemoteConnect and SCADAPack x70 Utilities arises...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… Australia’s Health Sector Receives $6.4 Million Cybersecurity Boost with New Threat Information-Sharing Network πŸ¦…

The Australian Government has awarded a 6.4 million grant to CIISAC Australia, enabling the establishment of a new Health Cyber Sharing Network HCSN. This initiative is designed to facilitate the rapid exchange of critical cyber threat information within Australia's healthcare industry, which has become a target for cyberattacks. The recent surge in cyberattacks on Australian healthcare organizations, including hospitals and health insurance providers, has highlighted the pressing need for enhanced cybersecurity measures. In response, the Australian Government has made healthcare the priority sector for its formal funding efforts. This grant is part of a broader strategy to address the vulnerabilities in the nations health sector and ensure it is better equipped to handle the cybe...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 AI and cloud vulnerabilities aren’t the only threats facing CISOs today 🧠

With cloud infrastructure and, more recently, artificial intelligence AI systems becoming prime targets for attackers, security leaders are laserfocused on defending these highprofile areas. Theyre right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks. However, this heightened attention to emerging threats makes The post AI and cloud vulnerabilities arent the only threats facing CISOs today appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Threat Actors Exploit Government Websites for Phishing πŸ“”

Cybercriminals exploit government websites using open redirects and phishing tactics, bypassing secure email gateway protections.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top 8 Penetration Testing Tools to Enhance Your Security 🦿

Penetration testing is vital in keeping an organizations digital assets secure. Here are the top picks among the latest pen testing tools and software.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity