πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” UK CNI Security Leaders Express Confidence in Cybersecurity, Despite 95% Breach Rate πŸ“”

Bridewell has released its annual report on critical infrastructure security leaders perceived cybersecurity maturity and threats.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Police Arrest 422 in Major Fraud Crackdown πŸ“”

Februarys Operation Henhouse resulted in hundreds of arrests and the seizure of 7.5m.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over Half a Million Hit by Pennsylvania Schools Union Breach πŸ“”

The Pennsylvania State Education Association PSEA has sent breach notifications to over 500,000 current and former members.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NCSC Sets 2035 Deadline for Post-Quantum Cryptography Migration πŸ“”

New NCSC guidance sets out a threephase migration to postquantum cryptography, designed to ensure all systems are protected from quantum attacks by 2035.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
🌊 Next Level Device Management with Google MDM for Windows 🌊

Google Workspace now provides robust Windows device management a truly advanced mobile device management solution from Google. This solution makes enrolling and managing all your devices effortless while keeping everything centralized in your Google Workspace environment. Every device is automatically assigned to the corresponding user since Google Workspace is, first and foremost, an Identity The post Next Level Device Management with Google MDM for Windows appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Are We Closing the Gender Gap in Cybersecurity? πŸ•΅οΈβ€β™‚οΈ

Answer Nope. But let's look at the trends because they matter for security.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Rooted Devices 250 Times More Vulnerable to Compromise πŸ“”

Rooted devices are 250 times more vulnerable to security incidents, Zimperium warned.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CISA Warns of Active Exploitation with Three New Vulnerabilities Added to KEV Catalog πŸ¦…

CISA Warns of Active Exploitation with Three New Vulnerabilities Added to KEV Catalog  CVE20251316 " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202503CISAWarnsofActiveExploitationwithThreeNewVulnerabilitiesAddedtoKEVCatalog300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202503CISAWarnsofActiveExploitationwithThreeNewVulnerabilitiesAddedtoKEVCatalog.jpg" title"CISA Warns of Active Exploitation with Three New Vulnerabilities Added to KEV Catalog  1" One of the most concerning vulnerabilities in the new CISA catalog is CVE20251316, which affects the Edimax IC7100 IP Camera. This vulnerability, identified on March 4, 2025, is an OS Command Injection Vulnerability that allows attackers to execute arbitrary commands on the device remotely.   The Edimax IC7100 ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Hybrid Threats and AI Form the DNA of EU’s Organized Threat Landscape in 2025: Europol πŸ¦…

Cyble Hybrid Threats and AI Form the DNA of EUs Organized Threat Landscape in 2025 Europol  " dataimagecaption"Cyble Hybrid Threats and AI Form the DNA of EUs Organized Threat Landscape in 2025 Europol  " datamediumfile"httpscyble.comwpcontentuploads202503CybleBlogsEuropol1300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202503CybleBlogsEuropol11024x512.jpg" title"Hybrid Threats and AI Form the DNA of EUs Organized Threat Landscape in 2025 Europol  2" Overview  The Europol released the EUSOCTA 2025 report, which offers a comprehensive look into the complex dynamics shaping serious and organized crime across Europe.  Europols analysis provides insight into the increasing intersection of cybercriminal activities, hybrid threats, and the exploitation of emerging technologies. ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users πŸ–‹οΈ

YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russianspeaking users. "What's intriguing about this malware is how much it collects," Kaspersky said in an analysis. "It grabs account information from VPN and gaming clients, and all kinds of network utilities like ngrok, Playit, Cyberduck, FileZilla, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FishMonger APT Group Linked to I-SOON in Espionage Campaigns πŸ“”

The FishMonger APT Group has been linked with ISOON, targeting governments, NGOs and think tanks in cyberespionage campaigns.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ukraine Defense Sector Under Attack Via Dark Crystal RAT πŸ•΅οΈβ€β™‚οΈ

The UNC200 threat group, active since last summer, has been utilizing the Signal messaging app to social engineer targets into downloading an infostealing remote access Trojan.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories' CI/CD Secrets Exposed πŸ–‹οΈ

The supply chain attack involving the GitHub Action "tjactionschangedfiles" started as a highlytargeted attack against one of Coinbase's opensource projects, before evolving into something more widespread in scope. "The payload was focused on exploiting the public CICD flow of one of their open source projects agentkit, probably with the purpose of leveraging it for further compromises,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories' CI/CD Secrets Exposed πŸ–‹οΈ

The supply chain attack involving the GitHub Action "tjactionschangedfiles" started as a highlytargeted attack against one of Coinbase's opensource projects, before evolving into something more widespread in scope. "The payload was focused on exploiting the public CICD flow of one of their open source projects agentkit, probably with the purpose of leveraging it for further compromises,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Is the Middle East's Race to Digitize a Threat to Infrastructure? πŸ•΅οΈβ€β™‚οΈ

As the region continues with its ambitious road map, cybersecurity must be woven into every step of the process.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Account Hijackers Target Victims Via Semrush Ads πŸ“”

Threat actors are looking to compromise Google accounts to further malvertising and data theft.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Teen Boys at Risk of Sextortion as 74% Lack Basic Awareness πŸ“”

The UKs National Crime Agency has launched a new campaign designed to raise awareness of sextortion among teenage boys.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks πŸ–‹οΈ

A critical security flaw has been disclosed in the Next.js React framework that could be potentially exploited to bypass authorization checks under certain conditions. The vulnerability, tracked as CVE202529927, carries a CVSS score of 9.1 out of 10.0. "Next.js uses an internal header xmiddlewaresubrequest to prevent recursive requests from triggering infinite loops," Next.js said in an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ“’ Security experts warn of β€˜contradictory confidence’ over critical infrastructure threats πŸ“’

Almost all critical national infrastructure CNI organizations in the UK 95 experienced a data breach in the last year, according to new research.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… FizzBuzz to FogDoor: Targeted Malware Campaign Exploits Job-Seeking Developers πŸ¦…

Cyble FogDoor FizzBuzz " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202503FizzbuzzFogDoor300x150.png" datalargefile"httpscyble.comwpcontentuploads202503FizzbuzzFogDoor1024x512.png" title"FizzBuzz to FogDoor Targeted Malware Campaign Exploits JobSeeking Developers 1" Key Takeaways A GitHub repository masqueraded as a coding challenge to deceive developers, particularly targeting Polishspeaking job seekers Opening the provided ISO file triggers a PowerShell script that installs a backdoor named FogDoor and steals sensitive data. The backdoor retrieves commands from a social media profile and exfiltrates stolen data using temporary webhook services, making detection more difficult. The malware extracts browser cookies, saved credentials, installed application...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More πŸ–‹οΈ

A quiet tweak in a popular opensource tool opened the door to a supply chain breachwhat started as a targeted attack quickly spiraled, exposing secrets across countless projects. That wasnt the only stealth move. A new allinone malware is silently stealing passwords, crypto, and controlwhile hiding in plain sight. And over 300 Android apps joined the chaos, running ad.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity