πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ RansomHub Taps FakeUpdates to Target US Government Sector πŸ•΅οΈβ€β™‚οΈ

A ransomware activity wave using the SocGholish MaaS framework for initial access also has affected banking and consulting firms in the US, Taiwan, and Japan since the beginning of the year.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 iPhone-Android: A Major Privacy Upgrade is Coming Soon 🦿

This breakthrough will finally allow secure, encrypted messaging between different mobile platforms.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Medusa Ransomware Strikes 300+ Targets: FBI & CISA Urge Immediate Action to #StopRansomware 🦿

Medusa ransomware now operates as a RaaS model, recruiting affiliates from criminal forums to launch attacks, encrypt data, and extort victims worldwide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Amazon’s Controversial Change to Echo’s Privacy Settings Takes Effect Soon 🦿

Amazon is mandating cloudbased processing for Echo voice commands, removing local storage and disabling Alexas voice ID to expand its generative AI capabilities.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure πŸ–‹οΈ

A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proofofconcept PoC a mere 30 hours after public disclosure. The vulnerability, tracked as CVE202524813, affects the below versions Apache Tomcat 11.0.0M1 to 11.0.2 Apache Tomcat 10.1.0M1 to 10.1.34 Apache Tomcat 9.0.0M1 to 9.0.98 It concerns a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cloudflare Introduces E2E Post-Quantum Cryptography Protections πŸ“”

Cloudflare introduces E2E postquantum cryptography, enhancing security against quantum threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK's Online Safety Act: Ofcom Can Now Issue Sanctions πŸ“”

From March 17, Ofcom will enforce rules requiring tech platforms operating in the UK to remove illegal content, including child abuse material.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Researchers Confirm BlackLock as Eldorado Rebrand πŸ“”

DarkAtlas researchers have uncovered a direct link between BlackLock and the Eldorado ransomware group, confirming a rebranded identity of the notorious threat actor.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets πŸ–‹οΈ

Microsoft is calling attention to a novel remote access trojan RAT named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data. The malware contains capabilities to "steal information from the target system, such as credentials stored in the browser, digital wallet information, data stored.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets πŸ–‹οΈ

Microsoft is calling attention to a novel remote access trojan RAT named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data. The malware contains capabilities to "steal information from the target system, such as credentials stored in the browser, digital wallet information, data stored.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Healthcare organizations need to shake up email security practices πŸ“’

Microsoft 365 is the source of almost half of all healthcare email breaches, thanks mainly to misconfigurations in security settings.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Improve Okta Security in Four Steps πŸ–‹οΈ

While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts. Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation πŸ–‹οΈ

Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the Chinaaligned MirrorFace threat actor that targeted a diplomatic organization in the European Union with a backdoor known as ANEL. The attack, detected by ESET in late August 2024, singled out a Central European diplomatic institute with lures related to Word Expo, which is scheduled to kick off in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse πŸ–‹οΈ

At least four different threat actors have been identified as involved in an updated version of a massive ad fraud and residential proxy scheme called BADBOX, painting a picture of an interconnected cybercrime ecosystem. This includes SalesTracker Group, MoYu Group, Lemon Group, and LongTV, according to new findings from the HUMAN Satori Threat Intelligence and Research team, published in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Third of UK Supply Chain Relies on β€œChinese Military” Companies πŸ“”

Bitsight reveals that UK companies are more exposed to cyber risk than global peers via their digital supply chains.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Millions of RSA encryption keys could be vulnerable to attack πŸ“’

Millions of RSA encryption keys contain major flaws, making them vulnerable to attack, according to new research.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Dashlane Review 2025: Features, Pricing, and Security 🦿

Dashlanes zeroknowledge encryption and intuitive user interface make it a compelling password manager. Read our full Dashlane review to learn more.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Large-Scale Malicious App Campaign Bypassing Android Security πŸ“”

Bitdefender said the malicious app campaign has resulted in more than 60 million downloads of malicious apps from the Google Play Store.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads πŸ–‹οΈ

Cybersecurity researchers have warned about a largescale ad fraud campaign that has leveraged hundreds of malicious apps published on the Google Play Store to serve fullscreen ads and conduct phishing attacks. "The apps display outofcontext ads and even try to persuade victims to give away credentials and credit card information in phishing attacks," Bitdefender said in a report shared with.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 16.8 Billion Records Exposed as Data Breaches Increase 6% πŸ“”

Flashpoint data points to a surge in data breaches fueled by compromised credentials, ransomware and exploits.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… IT Vulnerability Report: Cyble Urges Fixes for Apple, PHP Flaws πŸ¦…

Cyble IT Vulnerability Report Cyble Urges Fixes for Apple, PHP Flaws " dataimagecaption"Cyble IT Vulnerability Report Cyble Urges Fixes for Apple, PHP Flaws " datamediumfile"httpscyble.comwpcontentuploads202503CybleBlogsVulnerabilityApple300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202503CybleBlogsVulnerabilityApple1024x512.jpg" title"IT Vulnerability Report Cyble Urges Fixes for Apple, PHP Flaws 1" Overview Cybles vulnerability intelligence unit analyzed 17 vulnerabilities in a report to clients last week and highlighted two that are at exceptionally high risk of exploitation. Cyble Research and Intelligence Labs CRIL researchers also investigated 6 vulnerability exploits claimed by threat actors on the dark web, including a purported zeroday exploit for a Local Pri...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity