πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Alleged LockBit developer extradited to the US πŸ“’

A RussianIsraeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year πŸ–‹οΈ

An unpatched security flaw impacting the Edimax IC7100 network camera is being exploited by threat actors to deliver Mirat botnet malware variants since at least May 2024. The vulnerability in question is CVE20251316 CVSS v4 score 9.3, a critical operating system command injection flaw that an attacker could exploit to achieve remote code execution on susceptible devices by means of a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users' Actions πŸ–‹οΈ

Malicious actors are exploiting Cascading Style Sheets CSS, which are used to style and format the layout of web pages, to bypass spam filters and track users' actions. That's according to new findings from Cisco Talos, which said such malicious activities can compromise a victim's security and privacy. "The features available in CSS allow attackers and spammers to track users' actions and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Legislators Demand Transparency in Apple's UK Backdoor Court Fight πŸ“”

A bipartisan delegation of US Congresspeople and Senators has asked the hearing between the UK government and Apple to be made public.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How 'Open Innovation' Can Help Solve Problems Faster, Better & Cheaper πŸ•΅οΈβ€β™‚οΈ

Cybersecurity is not just a technical challenge but also a very human one. The more humans that organizations can get involved, the more diverse perspectives and experiences that can be tapped into.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OAuth Attacks Target Microsoft 365, GitHub πŸ•΅οΈβ€β™‚οΈ

In a cyber twist, attackers behind two of the campaigns are using the apps to redirect users to phishing and malware distribution sites.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ ClickFix Attack Compromises 100+ Car Dealership Sites πŸ•΅οΈβ€β™‚οΈ

The ClickFix attack tactic seems to be gaining traction among threat actors.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Denmark Warns of Increased Cyber Espionage Against Telecom Sector πŸ•΅οΈβ€β™‚οΈ

A new threat assessment from the Danish Civil Protection Authority SAMSIK warned of cyberattacks targeting the telecommunications sector after citing a wave of incidents hitting European organizations the past few years.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Apache Tomcat RCE Vulnerability Under Fire With 2-Step Exploit πŸ•΅οΈβ€β™‚οΈ

The researchers who discovered the initial assault warned that the simple, staged attack is just the beginning for advanced exploit sequences that will test cyber defenses in new and more difficult ways.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ RansomHub Taps FakeUpdates to Target US Government Sector πŸ•΅οΈβ€β™‚οΈ

A ransomware activity wave using the SocGholish MaaS framework for initial access also has affected banking and consulting firms in the US, Taiwan, and Japan since the beginning of the year.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 iPhone-Android: A Major Privacy Upgrade is Coming Soon 🦿

This breakthrough will finally allow secure, encrypted messaging between different mobile platforms.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Medusa Ransomware Strikes 300+ Targets: FBI & CISA Urge Immediate Action to #StopRansomware 🦿

Medusa ransomware now operates as a RaaS model, recruiting affiliates from criminal forums to launch attacks, encrypt data, and extort victims worldwide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Amazon’s Controversial Change to Echo’s Privacy Settings Takes Effect Soon 🦿

Amazon is mandating cloudbased processing for Echo voice commands, removing local storage and disabling Alexas voice ID to expand its generative AI capabilities.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure πŸ–‹οΈ

A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proofofconcept PoC a mere 30 hours after public disclosure. The vulnerability, tracked as CVE202524813, affects the below versions Apache Tomcat 11.0.0M1 to 11.0.2 Apache Tomcat 10.1.0M1 to 10.1.34 Apache Tomcat 9.0.0M1 to 9.0.98 It concerns a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cloudflare Introduces E2E Post-Quantum Cryptography Protections πŸ“”

Cloudflare introduces E2E postquantum cryptography, enhancing security against quantum threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK's Online Safety Act: Ofcom Can Now Issue Sanctions πŸ“”

From March 17, Ofcom will enforce rules requiring tech platforms operating in the UK to remove illegal content, including child abuse material.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Researchers Confirm BlackLock as Eldorado Rebrand πŸ“”

DarkAtlas researchers have uncovered a direct link between BlackLock and the Eldorado ransomware group, confirming a rebranded identity of the notorious threat actor.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets πŸ–‹οΈ

Microsoft is calling attention to a novel remote access trojan RAT named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data. The malware contains capabilities to "steal information from the target system, such as credentials stored in the browser, digital wallet information, data stored.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets πŸ–‹οΈ

Microsoft is calling attention to a novel remote access trojan RAT named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data. The malware contains capabilities to "steal information from the target system, such as credentials stored in the browser, digital wallet information, data stored.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Healthcare organizations need to shake up email security practices πŸ“’

Microsoft 365 is the source of almost half of all healthcare email breaches, thanks mainly to misconfigurations in security settings.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Improve Okta Security in Four Steps πŸ–‹οΈ

While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts. Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity