πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits πŸ–‹οΈ

A team of security researchers from Georgia Institute of Technology and Ruhr University Bochum has demonstrated two new sidechannel attacks targeting Apple silicon that could be exploited to leak sensitive information from web browsers like Safari and Google Chrome. The attacks have been codenamed Data Speculation Attacks via Load Address Prediction on Apple Silicon SLAP and Breaking the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How Interlock Ransomware Infects Healthcare Organizations πŸ–‹οΈ

Ransomware attacks have reached an unprecedented scale in the healthcare sector, exposing vulnerabilities that put millions at risk. Recently, UnitedHealth revealed that 190 million Americans had their personal and healthcare data stolen during the Change Healthcare ransomware attack, a figure that nearly doubles the previously disclosed total.  This breach shows just how deeply ransomware.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution πŸ–‹οΈ

A critical security flaw has been disclosed in the Cacti opensource network monitoring and fault management framework that could allow an authenticated attacker to achieve remote code execution on susceptible instances. The flaw, tracked as CVE202522604, carries a CVSS score of 9.1 out of a maximum of 10.0. "Due to a flaw in the multiline SNMP result parser, authenticated users can inject.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese GenAI Startup DeepSeek Sparks Global Privacy Debate πŸ“”

Government agencies and privacy watchdogs have started investigating the Chinese AI chatbot provider over data privacy concerns.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Breakout Time Accelerates 22% as Cyber-Attacks Speed Up πŸ“”

ReliaQuest warns threat actor innovation and infostealer activity helped to accelerate breakout time by 22 in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… New ICS Vulnerabilities Discovered in Schneider Electric and B&R Automation Systems πŸ¦…

Overview The U.S. Cybersecurity and Infrastructure Security Agency CISA issued two urgent advisories regarding serious ICS vulnerabilities in industrial control systems ICS products. These ICS vulnerabilities, identified in Schneider Electric's RemoteConnect and SCADAPack x70 Utilities, as well as BR Automation's Runtime software, pose online risks to critical infrastructure systems worldwide. The ICS vulnerabilities, if exploited, could lead to potentially devastating impacts on the integrity, confidentiality, and availability of systems within energy, critical manufacturing, and other essential sectors. Schneider Electrics Vulnerability in RemoteConnect and SCADAPack x70 Utilities The ICS vulnerability in Schneider Electrics RemoteConnect and SCADAPack x70 Utilities arises...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… Australia’s Health Sector Receives $6.4 Million Cybersecurity Boost with New Threat Information-Sharing Network πŸ¦…

The Australian Government has awarded a 6.4 million grant to CIISAC Australia, enabling the establishment of a new Health Cyber Sharing Network HCSN. This initiative is designed to facilitate the rapid exchange of critical cyber threat information within Australia's healthcare industry, which has become a target for cyberattacks. The recent surge in cyberattacks on Australian healthcare organizations, including hospitals and health insurance providers, has highlighted the pressing need for enhanced cybersecurity measures. In response, the Australian Government has made healthcare the priority sector for its formal funding efforts. This grant is part of a broader strategy to address the vulnerabilities in the nations health sector and ensure it is better equipped to handle the cybe...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🧠 AI and cloud vulnerabilities aren’t the only threats facing CISOs today 🧠

With cloud infrastructure and, more recently, artificial intelligence AI systems becoming prime targets for attackers, security leaders are laserfocused on defending these highprofile areas. Theyre right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks. However, this heightened attention to emerging threats makes The post AI and cloud vulnerabilities arent the only threats facing CISOs today appeared first on Security Intelligence.

πŸ“– Read more.

πŸ”— Via "Security Intelligence"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Threat Actors Exploit Government Websites for Phishing πŸ“”

Cybercriminals exploit government websites using open redirects and phishing tactics, bypassing secure email gateway protections.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top 8 Penetration Testing Tools to Enhance Your Security 🦿

Penetration testing is vital in keeping an organizations digital assets secure. Here are the top picks among the latest pen testing tools and software.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Old Ways of Vendor Risk Management Are No Longer Good Enough πŸ•΅οΈβ€β™‚οΈ

Managing thirdparty risk in the SaaS era demands a proactive, datadriven approach beyond checkbox compliance.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI Surge Drives Record 1205% Increase in API Vulnerabilities πŸ“”

AIrelated API vulnerabilities surged 1,205 in 2024, with 99 tied to API flaws, according to a new report by Wallarm.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Nation-State Hackers Abuse Gemini AI Tool πŸ“”

Google highlighted significant abuse of its Gemini LLM tool by nation state actors to support malicious activities, including research and malware development.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Hellcat Ransomware Gang Employs Humiliation Tactics πŸ“”

Cato Networks highlighted how the recently emerged HellCat ransomware group is using novel psychological tactics to court attention and pressurize victims.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks πŸ–‹οΈ

The North Korean threat actor known as the Lazarus Group has been observed leveraging a "webbased administrative platform" to oversee its commandandcontrol C2 infrastructure, giving the adversary the ability to centrally supervise all aspects of their campaigns. "Each C2 server hosted a webbased administrative platform, built with a React application and a Node.js API," SecurityScorecard's.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Mirai Variant β€˜Aquabot’ Exploits Mitel Device Flaws πŸ•΅οΈβ€β™‚οΈ

Yet another spinoff of the infamous DDoS botnet is exploiting a known vulnerability in active attacks, while its threat actors are promoting it on Telegram for other attackers to use as well, in a DDoSasaservice model.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Researchers Uncover Lazarus Group Admin Layer for C2 Servers πŸ•΅οΈβ€β™‚οΈ

The threat actor is using a sophisticated network of VPNs and proxies to centrally manage commandandcontrol servers from Pyongyang.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Unpatched Zyxel CPE Zero-Day Pummeled by Cyberattackers πŸ•΅οΈβ€β™‚οΈ

VulnCheck initially disclosed the critical commandinjection vulnerability CVE202440891 six months ago, but Zyxel has yet to mention its existence or offer users a patch to mitigate threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 DeepSeek Chatbot Beats OpenAI on App Store Leaderboard 🦿

The Chinese firm said training the model cost just 5.6 million. Alibaba Cloud followed with a new generative AI model, while Microsoft alleges DeepSeek distilled OpenAIs work.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
🦿 DeepSeek Chatbot Beats OpenAI on App Store Leaderboard 🦿

The Chinese firm said training the model cost just 5.6 million. Alibaba Cloud followed with a new generative AI model, while Microsoft alleges DeepSeek distilled OpenAIs work.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ PrintNightmare Aftermath: Windows Print Spooler is Better. What's Next? πŸ•΅οΈβ€β™‚οΈ

While Microsoft has boosted the security of Windows Print Spooler in the three years since the disclosure of the PrintNightmare vulnerability, the service remains a spooky threat that organizations cannot afford to ignore.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1