πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems πŸ–‹οΈ

Veeam has released security updates to address a critical security flaw impacting its Backup Replication software that could lead to remote code execution. The vulnerability, tracked as CVE202523120, carries a CVSS score of 9.9 out of 10.0. It affects 12.3.0.310 and all earlier version 12 builds. "A vulnerability allowing remote code execution RCE by authenticated domain users," the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model πŸ–‹οΈ

Cybersecurity isn't just another checkbox on your business agenda. It's a fundamental pillar of survival. As organizations increasingly migrate their operations to the cloud, understanding how to protect your digital assets becomes crucial. The shared responsibility model, exemplified through Microsoft 365's approach, offers a framework for comprehending and implementing effective cybersecurity.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Data πŸ–‹οΈ

The governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore are likely customers of spyware developed by Israeli company Paragon Solutions, according to a new report from The Citizen Lab. Paragon, founded in 2019 by Ehud Barak and Ehud Schneorson, is the maker of a surveillance tool called Graphite that's capable of harvesting sensitive data from instant messaging applications.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers πŸ–‹οΈ

Regulatory compliance is no longer just a concern for large enterprises. Small and midsized businesses SMBs are increasingly subject to strict data protection and security regulations, such as HIPAA, PCIDSS, CMMC, GDPR, and the FTC Safeguards Rule. However, many SMBs struggle to maintain compliance due to limited IT resources, evolving regulatory requirements, and complex security challenges.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA has added a highseverity security flaw impacting NAKIVO Backup Replication software to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation. The vulnerability in question is CVE202448248 CVSS score 8.6, an absolute path traversal bug that could allow an unauthenticated attacker to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages πŸ–‹οΈ

The Computer Emergency Response Team of Ukraine CERTUA is warning of a new campaign that targets the defense sectors with Dark Crystal RAT aka DCRat. The campaign, detected earlier this month, has been found to target both employees of enterprises of the defenseindustrial complex and individual representatives of the Defense Forces of Ukraine. The activity involves.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK CNI Security Leaders Express Confidence in Cybersecurity, Despite 95% Breach Rate πŸ“”

Bridewell has released its annual report on critical infrastructure security leaders perceived cybersecurity maturity and threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Police Arrest 422 in Major Fraud Crackdown πŸ“”

Februarys Operation Henhouse resulted in hundreds of arrests and the seizure of 7.5m.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over Half a Million Hit by Pennsylvania Schools Union Breach πŸ“”

The Pennsylvania State Education Association PSEA has sent breach notifications to over 500,000 current and former members.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NCSC Sets 2035 Deadline for Post-Quantum Cryptography Migration πŸ“”

New NCSC guidance sets out a threephase migration to postquantum cryptography, designed to ensure all systems are protected from quantum attacks by 2035.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
🌊 Next Level Device Management with Google MDM for Windows 🌊

Google Workspace now provides robust Windows device management a truly advanced mobile device management solution from Google. This solution makes enrolling and managing all your devices effortless while keeping everything centralized in your Google Workspace environment. Every device is automatically assigned to the corresponding user since Google Workspace is, first and foremost, an Identity The post Next Level Device Management with Google MDM for Windows appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Are We Closing the Gender Gap in Cybersecurity? πŸ•΅οΈβ€β™‚οΈ

Answer Nope. But let's look at the trends because they matter for security.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Rooted Devices 250 Times More Vulnerable to Compromise πŸ“”

Rooted devices are 250 times more vulnerable to security incidents, Zimperium warned.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CISA Warns of Active Exploitation with Three New Vulnerabilities Added to KEV Catalog πŸ¦…

CISA Warns of Active Exploitation with Three New Vulnerabilities Added to KEV Catalog  CVE20251316 " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202503CISAWarnsofActiveExploitationwithThreeNewVulnerabilitiesAddedtoKEVCatalog300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202503CISAWarnsofActiveExploitationwithThreeNewVulnerabilitiesAddedtoKEVCatalog.jpg" title"CISA Warns of Active Exploitation with Three New Vulnerabilities Added to KEV Catalog  1" One of the most concerning vulnerabilities in the new CISA catalog is CVE20251316, which affects the Edimax IC7100 IP Camera. This vulnerability, identified on March 4, 2025, is an OS Command Injection Vulnerability that allows attackers to execute arbitrary commands on the device remotely.   The Edimax IC7100 ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Hybrid Threats and AI Form the DNA of EU’s Organized Threat Landscape in 2025: Europol πŸ¦…

Cyble Hybrid Threats and AI Form the DNA of EUs Organized Threat Landscape in 2025 Europol  " dataimagecaption"Cyble Hybrid Threats and AI Form the DNA of EUs Organized Threat Landscape in 2025 Europol  " datamediumfile"httpscyble.comwpcontentuploads202503CybleBlogsEuropol1300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202503CybleBlogsEuropol11024x512.jpg" title"Hybrid Threats and AI Form the DNA of EUs Organized Threat Landscape in 2025 Europol  2" Overview  The Europol released the EUSOCTA 2025 report, which offers a comprehensive look into the complex dynamics shaping serious and organized crime across Europe.  Europols analysis provides insight into the increasing intersection of cybercriminal activities, hybrid threats, and the exploitation of emerging technologies. ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users πŸ–‹οΈ

YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russianspeaking users. "What's intriguing about this malware is how much it collects," Kaspersky said in an analysis. "It grabs account information from VPN and gaming clients, and all kinds of network utilities like ngrok, Playit, Cyberduck, FileZilla, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FishMonger APT Group Linked to I-SOON in Espionage Campaigns πŸ“”

The FishMonger APT Group has been linked with ISOON, targeting governments, NGOs and think tanks in cyberespionage campaigns.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ukraine Defense Sector Under Attack Via Dark Crystal RAT πŸ•΅οΈβ€β™‚οΈ

The UNC200 threat group, active since last summer, has been utilizing the Signal messaging app to social engineer targets into downloading an infostealing remote access Trojan.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories' CI/CD Secrets Exposed πŸ–‹οΈ

The supply chain attack involving the GitHub Action "tjactionschangedfiles" started as a highlytargeted attack against one of Coinbase's opensource projects, before evolving into something more widespread in scope. "The payload was focused on exploiting the public CICD flow of one of their open source projects agentkit, probably with the purpose of leveraging it for further compromises,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories' CI/CD Secrets Exposed πŸ–‹οΈ

The supply chain attack involving the GitHub Action "tjactionschangedfiles" started as a highlytargeted attack against one of Coinbase's opensource projects, before evolving into something more widespread in scope. "The payload was focused on exploiting the public CICD flow of one of their open source projects agentkit, probably with the purpose of leveraging it for further compromises,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Is the Middle East's Race to Digitize a Threat to Infrastructure? πŸ•΅οΈβ€β™‚οΈ

As the region continues with its ambitious road map, cybersecurity must be woven into every step of the process.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity