πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ FBI Warns of Document Converter Tools Due to Uptick in Scams πŸ•΅οΈβ€β™‚οΈ

The FBI's Denver field office says the tools will convert documents while also dropping malware and scraping users' systems for sensitive data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical 'IngressNightmare' Vulns Imperil Kubernetes Environments πŸ•΅οΈβ€β™‚οΈ

More than 40 of all Internetfacing container orchestration clusters are at risk.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ China-Nexus APT 'Weaver Ant' Caught in Yearslong Web Shell Attack πŸ•΅οΈβ€β™‚οΈ

The persistent threat actor was caught using sophisticated Web shell techniques against an unnamed telecommunications company in Asia.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ US Weakens Disinformation Defenses, as Russia & China Ramp Up πŸ•΅οΈβ€β™‚οΈ

Russia and China spend billions of dollars on state media, propaganda, and disinformation, while the Trump administration has slashed funding for US agencies.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ FCC Investigates China-Backed Tech Suppliers for Evading US Operations Ban πŸ•΅οΈβ€β™‚οΈ

FCC chair warns these companies may still be operating in the US because they don't believe that being added to its "Covered List" poses any serious risk.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Oracle Denies Claim of Oracle Cloud Breach of 6M Records πŸ•΅οΈβ€β™‚οΈ

A threat actor posted data on BreachForums from an alleged supply chain attack that affected more than 140K tenants, claiming to have compromised the cloud via a zeroday flaw in WebLogic, researchers say.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication πŸ–‹οΈ

A set of five critical security shortcomings have been disclosed in the Ingress NGINX Controller for Kubernetes that could result in unauthenticated remote code execution, putting over 6,500 clusters at immediate risk by exposing the component to the public internet. The vulnerabilities CVE202524513, CVE202524514, CVE20251097, CVE20251098, and CVE20251974 , assigned a CVSS score of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Adds Inline Data Protection to Edge for Business to Block GenAI Data Leaks πŸ–‹οΈ

Microsoft on Monday announced a new feature called inline data protection for its enterprisefocused Edge for Business web browser. The native data security control is designed to prevent employees from sharing sensitive companyrelated data into consumer generative artificial intelligence GenAI apps like OpenAI ChatGPT, Google Gemini, and DeepSeek. The list will be expanded over time to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ VanHelsing RaaS Launch: 3 Victims, $5K Entry Fee, Multi-OS, and Double Extortion Tactics πŸ–‹οΈ

A ransomwareasaservice RaaS operation called VanHelsing has already claimed three victims since it launched on March 7, 2025, demanding ransoms as high as 500,000. "The RaaS model allows a wide range of participants, from experienced hackers to newcomers, to get involved with a 5,000 deposit. Affiliates keep 80 of the ransom payments, while the core operators earn 20," Check Point said.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” VanHelsingRaaS Expands Rapidly in Cybercrime Market πŸ“”

VanHelsingRaaS, a new ransomwareasaservice program, infected three victims within two weeks of release, demanding ransoms of 500,000.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ukraine Railway Systems Hit by Targeted Cyber-Attack πŸ“”

Ukraines national railway company has suffered a largescale cyberattack, disrupting online services and operations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Authorities Seize 1842 Devices in Africa’s Cybercrime Crackdown πŸ“”

Authorities in seven African countries have arrested 306 suspects and seized 1842 devices in Operation Red Card.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust πŸ–‹οΈ

Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation codenamed Red Card that took place between November 2024 and February 2025. The coordinated effort "aims to disrupt and dismantle crossborder criminal networks which cause significant harm to individuals and businesses," INTERPOL said, adding it.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras πŸ¦…

Cyble Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras. " dataimagecaption"Cyble Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras " datamediumfile"httpscyble.comwpcontentuploads202503CybleBlogsIvanti300x150.png" datalargefile"httpscyble.comwpcontentuploads202503CybleBlogsIvanti1024x512.png" title"Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras  1" Overview  Vulnerabilities in Ivanti products, AVTECH IP cameras, and WordPress plugins have recently been among the dozens of attempted exploits detected by Cyble honeypot sensors.  The attack attempts were detailed in the threat intelligence companys weekly sensor intelligence reports to clients. The Cyble reports have also examined persistent attacks against Linux systems and net...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Millions of 23andMe users’ genetic data could be up for grabs – and experts worry it’s a looming privacy nightmare πŸ“’

DNA testing company 23andMe has filed for bankruptcy protection, raising questions about the future of the company and the personal data it holds.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Fake file converter tools are on the rise – here’s what you need to know πŸ“’

The FBI has issued an alert over the rise of fake file converter tools available online after observing a spate of scams and ransomware attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Oracle breach claims spark war of words with security researchers πŸ“’

A war of words has erupted between Oracle and cybersecurity researchers following claims the company suffered a security breach.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OPSEC Nightmare: Leaking US Military Plans to a Reporter πŸ•΅οΈβ€β™‚οΈ

Experts say the leakage of US military plans to a reporter this month reflects a severe operational security failure on the part of US leadership.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ South African Poultry Company Reports $1M Loss After Cyber Intrusion πŸ•΅οΈβ€β™‚οΈ

The company reports that no sensitive information was breached or stolen in the cyber intrusion and that its operations are running normally again.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Accused Snowflake Attacker 'Judische' Agrees to US Extradition πŸ•΅οΈβ€β™‚οΈ

Though there is no confirmation as to when this extradition will occur, Alexander Moucka agreed to be transferred in writing before a judge.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 5 Considerations for a Data Loss Prevention Rollout πŸ•΅οΈβ€β™‚οΈ

Strong DLP can be a gamechanger but it can also become a slowmoving, overcomplicated mess if not executed properly.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity