πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users πŸ–‹οΈ

YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russianspeaking users. "What's intriguing about this malware is how much it collects," Kaspersky said in an analysis. "It grabs account information from VPN and gaming clients, and all kinds of network utilities like ngrok, Playit, Cyberduck, FileZilla, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FishMonger APT Group Linked to I-SOON in Espionage Campaigns πŸ“”

The FishMonger APT Group has been linked with ISOON, targeting governments, NGOs and think tanks in cyberespionage campaigns.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ukraine Defense Sector Under Attack Via Dark Crystal RAT πŸ•΅οΈβ€β™‚οΈ

The UNC200 threat group, active since last summer, has been utilizing the Signal messaging app to social engineer targets into downloading an infostealing remote access Trojan.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories' CI/CD Secrets Exposed πŸ–‹οΈ

The supply chain attack involving the GitHub Action "tjactionschangedfiles" started as a highlytargeted attack against one of Coinbase's opensource projects, before evolving into something more widespread in scope. "The payload was focused on exploiting the public CICD flow of one of their open source projects agentkit, probably with the purpose of leveraging it for further compromises,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories' CI/CD Secrets Exposed πŸ–‹οΈ

The supply chain attack involving the GitHub Action "tjactionschangedfiles" started as a highlytargeted attack against one of Coinbase's opensource projects, before evolving into something more widespread in scope. "The payload was focused on exploiting the public CICD flow of one of their open source projects agentkit, probably with the purpose of leveraging it for further compromises,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Is the Middle East's Race to Digitize a Threat to Infrastructure? πŸ•΅οΈβ€β™‚οΈ

As the region continues with its ambitious road map, cybersecurity must be woven into every step of the process.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Account Hijackers Target Victims Via Semrush Ads πŸ“”

Threat actors are looking to compromise Google accounts to further malvertising and data theft.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Teen Boys at Risk of Sextortion as 74% Lack Basic Awareness πŸ“”

The UKs National Crime Agency has launched a new campaign designed to raise awareness of sextortion among teenage boys.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks πŸ–‹οΈ

A critical security flaw has been disclosed in the Next.js React framework that could be potentially exploited to bypass authorization checks under certain conditions. The vulnerability, tracked as CVE202529927, carries a CVSS score of 9.1 out of 10.0. "Next.js uses an internal header xmiddlewaresubrequest to prevent recursive requests from triggering infinite loops," Next.js said in an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ“’ Security experts warn of β€˜contradictory confidence’ over critical infrastructure threats πŸ“’

Almost all critical national infrastructure CNI organizations in the UK 95 experienced a data breach in the last year, according to new research.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… FizzBuzz to FogDoor: Targeted Malware Campaign Exploits Job-Seeking Developers πŸ¦…

Cyble FogDoor FizzBuzz " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202503FizzbuzzFogDoor300x150.png" datalargefile"httpscyble.comwpcontentuploads202503FizzbuzzFogDoor1024x512.png" title"FizzBuzz to FogDoor Targeted Malware Campaign Exploits JobSeeking Developers 1" Key Takeaways A GitHub repository masqueraded as a coding challenge to deceive developers, particularly targeting Polishspeaking job seekers Opening the provided ISO file triggers a PowerShell script that installs a backdoor named FogDoor and steals sensitive data. The backdoor retrieves commands from a social media profile and exfiltrates stolen data using temporary webhook services, making detection more difficult. The malware extracts browser cookies, saved credentials, installed application...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More πŸ–‹οΈ

A quiet tweak in a popular opensource tool opened the door to a supply chain breachwhat started as a targeted attack quickly spiraled, exposing secrets across countless projects. That wasnt the only stealth move. A new allinone malware is silently stealing passwords, crypto, and controlwhile hiding in plain sight. And over 300 Android apps joined the chaos, running ad.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ VSCode Marketplace Removes Two Extensions Deploying Early-Stage Ransomware πŸ–‹οΈ

Cybersecurity researchers have uncovered two malicious extensions in the Visual Studio Code VSCode Marketplace that are designed to deploy ransomware that's under development to its users. The extensions, named "ahban.shiba" and "ahban.cychelloworld," have since been taken down by the marketplace maintainers. Both the extensions, per ReversingLabs, incorporate code that's designed to invoke a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Balance Password Security Against User Experience πŸ–‹οΈ

If given the choice, most users are likely to favor a seamless experience over complex security measures, as they dont prioritize strong password security. However, balancing security and usability doesnt have to be a zerosum game. By implementing the right best practices and tools, you can strike a balance between robust password security and a frictionless user experience UX. This article.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” California AG Reminds 23andMe Customers of Data Deletion Rights Amid Bankruptcy Filing πŸ“”

Two years after a data breach that compromised almost seven million customers, 23andMe's CEO has resigned as the company files for bankruptcy.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Building ransomware resilience to avoid paying out πŸ“’

Amid an impending ransom payment ban, businesses should work to improve their incident response strategies and knowledge of prominent threat groups.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Stopping Deepfakes in Financial Services Will Require New Processes: Cyble πŸ¦…

Stopping Deepfakes in Financial Services Will Require New Processes Cyble " dataimagecaption"Stopping Deepfakes in Financial Services Will Require New Processes Cyble " datamediumfile"httpscyble.comwpcontentuploads202503CybleBlogsDeepfake300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202503CybleBlogsDeepfake.jpg" title"Stopping Deepfakes in Financial Services Will Require New Processes Cyble 1" The rise of AIgenerated deepfakes has placed the financial services industry and its customers at the epicenter of this growing cyber threat.  Whether deepfake fraud is hitting consumers, commercial accounts, or financial institutions themselves, organizations in the banking and financial services sector will need new processes and cybersecurity controls to address this new generat...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese Hacker Group Tracked Back to iSoon APT Operation πŸ•΅οΈβ€β™‚οΈ

The group, called FishMonger or Aquatic Panda, is working under contract for the Chinese government to steal data from governmental organizations, Catholic charities, NGOs, think tanks, and more.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FBI Warns of Document Converter Tools Due to Uptick in Scams πŸ•΅οΈβ€β™‚οΈ

The FBI's Denver field office says the tools will convert documents while also dropping malware and scraping users' systems for sensitive data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical 'IngressNightmare' Vulns Imperil Kubernetes Environments πŸ•΅οΈβ€β™‚οΈ

More than 40 of all Internetfacing container orchestration clusters are at risk.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ China-Nexus APT 'Weaver Ant' Caught in Yearslong Web Shell Attack πŸ•΅οΈβ€β™‚οΈ

The persistent threat actor was caught using sophisticated Web shell techniques against an unnamed telecommunications company in Asia.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity