πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security πŸ–‹οΈ

Google is making the biggest ever acquisition in its history by purchasing cloud security company Wiz in an allcash deal worth 32 billion. "This acquisition represents an investment by Google Cloud to accelerate two large and growing trends in the AI era improved cloud security and the ability to use multiple clouds multicloud," the tech giant said today. It added the acquisition, which is.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking πŸ–‹οΈ

A critical security vulnerability has been disclosed in AMI's MegaRAC Baseboard Management Controller BMC software that could allow an attacker to bypass authentication and carry out postexploitation actions. The vulnerability, tracked as CVE202454085, carries a CVSS v4 score of 10.0, indicating maximum severity. "A local or remote attacker can exploit the vulnerability by accessing the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Improve Okta Security in Four Steps πŸ–‹οΈ

While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts. Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ•΅οΈβ€β™‚οΈ Actively Exploited ChatGPT Bug Puts Organizations at Risk πŸ•΅οΈβ€β™‚οΈ

A serverside request forgery vulnerability in OpenAI's chatbot infrastructure can allow attackers to direct users to malicious URLs, leading to a range of threat activity.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Orion Security Startup Tackles Insider Threats With AI πŸ•΅οΈβ€β™‚οΈ

The data loss prevention company emerges from stealth with an AIpowered platform to help organizations distinguish between legitimate and risky activity.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Security Researcher Proves GenAI Tools Can Develop Google Chrome Infostealers πŸ“”

A Cato Networks researcher discovered a new LLM jailbreaking technique enabling the creation of passwordstealing malware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New β€˜Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence AIpowered code editors like GitHub Copilot and Cursor, causing them to inject malicious code. "This technique enables hackers to silently compromise AIgenerated code by injecting hidden malicious instructions into seemingly innocent.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Millions of RSA encryption keys could be vulnerable to attack πŸ“’

Millions of RSA encryption keys contain major flaws, making them vulnerable to attack, according to new research.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Google to Acquire Wiz for $32B in Multicloud Security Play πŸ•΅οΈβ€β™‚οΈ

The allcash deal offers a path for Google to better support cloud customers who have assets spread across public environments, including Azure and others.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Sounds Warning on Multifunctional 'StilachiRAT' πŸ•΅οΈβ€β™‚οΈ

The sneaky malware packs capabilities for system reconnaissance as well as credential and cryptocurrency theft.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Black Basta Leader in League With Russian Officials, Chat Logs Show πŸ•΅οΈβ€β™‚οΈ

Though the chat logs were leaked a month ago, analysts are now seeing that Russian officials may have assisted Black Basta members according, to the shared messages.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Extortion Reboot: Ransomware Crew Threatens Leak to Snowden πŸ•΅οΈβ€β™‚οΈ

Though the group initially stuck to classic ransomware TTPs before demanding the ransom, it went off script when it began threatening the group and detailing potential consequences the victim would face.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google Acquires Startup Wiz for $32B to Make β€˜Cybersecurity More Accessible And Simpler’ 🦿

Googles agreement to buy cloud security startup Wiz will face antitrust scrutiny amid Alphabets ongoing legal battles.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromise πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Tuesday added a vulnerability linked to the supply chain compromise of the GitHub Action, tjactionschangedfiles, to its Known Exploited Vulnerabilities KEV catalog. The highseverity flaw, tracked as CVE202530066 CVSS score 8.6, involves the breach of the GitHub Action to inject malicious code that enables a remote.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Keeper Security launches revamped partner program for 2025 πŸ“’

Keeper Security has announced an update to its partner program designed to help partners expand their cybersecurity offerings and drive new revenue.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why Cybersecurity Needs More Business-Minded Leaders πŸ•΅οΈβ€β™‚οΈ

The question is no longer "Are we compliant?" but "Are we truly resilient?".

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Watch This Webinar to Learn How to Eliminate Identity-Based Attacksβ€”Before They Happen πŸ–‹οΈ

In todays digital world, security breaches are all too common. Despite the many security tools and training programs available, identitybased attackslike phishing, adversaryinthemiddle, and MFA bypassremain a major challenge. Instead of accepting these risks and pouring resources into fixing problems after they occur, why not prevent attacks from happening in the first place? Our upcoming.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers πŸ–‹οΈ

The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users into downloading malware such as Lumma Stealer and Vidar Stealer. ClearFake, first highlighted in July 2023, is the name given to a threat activity cluster that employs fake web browser update baits on compromised WordPress as a malware distribution vector. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 5 Identity Threat Detection & Response Must-Haves for Super SaaS Security πŸ–‹οΈ

Identitybased attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication methods, and misused privileges. While many threat detection solutions focus on cloud, endpoint, and network threats, they overlook the unique risks posed by SaaS identity ecosystems. This blind spot is wreaking havoc on heavily SaaSreliant organizations big and small.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems πŸ–‹οΈ

Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data Acquisition SCADA system used in operational technology OT environments, that could allow malicious actors to take control of susceptible systems. "These vulnerabilities, if exploited, could grant unauthorized access to industrial control networks, potentially.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 752,000 Browser Phishing Attacks Mark 140% Increase YoY πŸ“”

A surge in browserbased phishing attacks has been recorded over the past year, with a 140 increase compared to 2023 according to Menlo Security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity