πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” VanHelsingRaaS Expands Rapidly in Cybercrime Market πŸ“”

VanHelsingRaaS, a new ransomwareasaservice program, infected three victims within two weeks of release, demanding ransoms of 500,000.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ukraine Railway Systems Hit by Targeted Cyber-Attack πŸ“”

Ukraines national railway company has suffered a largescale cyberattack, disrupting online services and operations.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Authorities Seize 1842 Devices in Africa’s Cybercrime Crackdown πŸ“”

Authorities in seven African countries have arrested 306 suspects and seized 1842 devices in Operation Red Card.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust πŸ–‹οΈ

Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation codenamed Red Card that took place between November 2024 and February 2025. The coordinated effort "aims to disrupt and dismantle crossborder criminal networks which cause significant harm to individuals and businesses," INTERPOL said, adding it.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras πŸ¦…

Cyble Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras. " dataimagecaption"Cyble Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras " datamediumfile"httpscyble.comwpcontentuploads202503CybleBlogsIvanti300x150.png" datalargefile"httpscyble.comwpcontentuploads202503CybleBlogsIvanti1024x512.png" title"Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras  1" Overview  Vulnerabilities in Ivanti products, AVTECH IP cameras, and WordPress plugins have recently been among the dozens of attempted exploits detected by Cyble honeypot sensors.  The attack attempts were detailed in the threat intelligence companys weekly sensor intelligence reports to clients. The Cyble reports have also examined persistent attacks against Linux systems and net...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Millions of 23andMe users’ genetic data could be up for grabs – and experts worry it’s a looming privacy nightmare πŸ“’

DNA testing company 23andMe has filed for bankruptcy protection, raising questions about the future of the company and the personal data it holds.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Fake file converter tools are on the rise – here’s what you need to know πŸ“’

The FBI has issued an alert over the rise of fake file converter tools available online after observing a spate of scams and ransomware attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Oracle breach claims spark war of words with security researchers πŸ“’

A war of words has erupted between Oracle and cybersecurity researchers following claims the company suffered a security breach.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OPSEC Nightmare: Leaking US Military Plans to a Reporter πŸ•΅οΈβ€β™‚οΈ

Experts say the leakage of US military plans to a reporter this month reflects a severe operational security failure on the part of US leadership.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ South African Poultry Company Reports $1M Loss After Cyber Intrusion πŸ•΅οΈβ€β™‚οΈ

The company reports that no sensitive information was breached or stolen in the cyber intrusion and that its operations are running normally again.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Accused Snowflake Attacker 'Judische' Agrees to US Extradition πŸ•΅οΈβ€β™‚οΈ

Though there is no confirmation as to when this extradition will occur, Alexander Moucka agreed to be transferred in writing before a judge.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 5 Considerations for a Data Loss Prevention Rollout πŸ•΅οΈβ€β™‚οΈ

Strong DLP can be a gamechanger but it can also become a slowmoving, overcomplicated mess if not executed properly.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Meet the Low-Key Access Broker Supercharging Russian State Cybercrime πŸ•΅οΈβ€β™‚οΈ

Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 23andMe Bankruptcy Filing May Put Sensitive Data at Risk πŸ•΅οΈβ€β™‚οΈ

Security experts worry the company's Chapter 11 status and aim to sell its assets could allow threat actors to exploit and misuse the genetic information it collected.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 After Detecting 30B Phishing Attempts, Microsoft Adds Even More AI to Its Security Copilot 🦿

Microsoft is partnering with top firms to launch new AI security tools, boosting breach analysis, threat detection, and AI model protection across cloud platforms.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Europol Warns Criminal Networks Are Embracing AI, Making Fraud Smarter and Harder to Detect 🦿

The same qualities that make AI revolutionary accessibility, adaptability and sophistication also make it a powerful tool for criminal networks, Europol says.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
πŸ–‹οΈ Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks πŸ–‹οΈ

Google has released outofband fixes to address a highseverity security flaw in its Chrome browser for Windows that it said has been exploited in the wild as part of attacks targeting organizations in Russia.  The vulnerability, tracked as CVE20252783, has been described as a case of "incorrect handle provided in unspecified circumstances in Mojo on Windows." Mojo refers to a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Security Flaws Found in VMware Tools and CrushFTP β€” High Risk, No Workaround πŸ–‹οΈ

Broadcom has issued security patches to address a highseverity security flaw in VMware Tools for Windows that could lead to an authentication bypass. Tracked as CVE202522230, the vulnerability is rated 7.8 on the tenpoint Common Vulnerability Scoring System CVSS. "VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control," Broadcom said in an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker πŸ–‹οΈ

A new investigation has unearthed nearly 200 unique commandandcontrol C2 domains associated with a malware called Raspberry Robin. "Raspberry Robin also known as Roshtyak or Storm0856 is a complex and evolving threat actor that provides initial access broker IAB services to numerous criminal groups, many of which have connections to Russia," Silent Push said in a report shared with The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years πŸ–‹οΈ

A major telecommunications company located in Asia was allegedly breached by Chinese statesponsored hackers who spent over four years inside its systems, according to a new report from incident response firm Sygnia. The cybersecurity company is tracking the activity under the name Weaver Ant, describing the threat actor as stealthy and highly persistent. The name of the telecom provider was not.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface πŸ–‹οΈ

Organizations now use an average of 112 SaaS applicationsa number that keeps growing. In a 2024 study, 49 of 644 respondents who frequently used Microsoft 365 believed that they had less than 10 apps connected to the platform, despite the fact that aggregated data indicated over 1,000 Microsoft 365 SaaStoSaaS connections on average per deployment. And thats just one major SaaS provider.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity