πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ¦… Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras πŸ¦…

Cyble Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras. " dataimagecaption"Cyble Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras " datamediumfile"httpscyble.comwpcontentuploads202503CybleBlogsIvanti300x150.png" datalargefile"httpscyble.comwpcontentuploads202503CybleBlogsIvanti1024x512.png" title"Cyble Sensors Detect Exploit Attempts on Ivanti, AVTECH IP Cameras  1" Overview  Vulnerabilities in Ivanti products, AVTECH IP cameras, and WordPress plugins have recently been among the dozens of attempted exploits detected by Cyble honeypot sensors.  The attack attempts were detailed in the threat intelligence companys weekly sensor intelligence reports to clients. The Cyble reports have also examined persistent attacks against Linux systems and net...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Millions of 23andMe users’ genetic data could be up for grabs – and experts worry it’s a looming privacy nightmare πŸ“’

DNA testing company 23andMe has filed for bankruptcy protection, raising questions about the future of the company and the personal data it holds.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Fake file converter tools are on the rise – here’s what you need to know πŸ“’

The FBI has issued an alert over the rise of fake file converter tools available online after observing a spate of scams and ransomware attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Oracle breach claims spark war of words with security researchers πŸ“’

A war of words has erupted between Oracle and cybersecurity researchers following claims the company suffered a security breach.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OPSEC Nightmare: Leaking US Military Plans to a Reporter πŸ•΅οΈβ€β™‚οΈ

Experts say the leakage of US military plans to a reporter this month reflects a severe operational security failure on the part of US leadership.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ South African Poultry Company Reports $1M Loss After Cyber Intrusion πŸ•΅οΈβ€β™‚οΈ

The company reports that no sensitive information was breached or stolen in the cyber intrusion and that its operations are running normally again.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Accused Snowflake Attacker 'Judische' Agrees to US Extradition πŸ•΅οΈβ€β™‚οΈ

Though there is no confirmation as to when this extradition will occur, Alexander Moucka agreed to be transferred in writing before a judge.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 5 Considerations for a Data Loss Prevention Rollout πŸ•΅οΈβ€β™‚οΈ

Strong DLP can be a gamechanger but it can also become a slowmoving, overcomplicated mess if not executed properly.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Meet the Low-Key Access Broker Supercharging Russian State Cybercrime πŸ•΅οΈβ€β™‚οΈ

Raspberry Robin breaks into organizations and sells access to Russian threat actors, including the military cyber unit behind attempted coups, assassinations, and influence operations throughout Europe.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 23andMe Bankruptcy Filing May Put Sensitive Data at Risk πŸ•΅οΈβ€β™‚οΈ

Security experts worry the company's Chapter 11 status and aim to sell its assets could allow threat actors to exploit and misuse the genetic information it collected.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 After Detecting 30B Phishing Attempts, Microsoft Adds Even More AI to Its Security Copilot 🦿

Microsoft is partnering with top firms to launch new AI security tools, boosting breach analysis, threat detection, and AI model protection across cloud platforms.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Europol Warns Criminal Networks Are Embracing AI, Making Fraud Smarter and Harder to Detect 🦿

The same qualities that make AI revolutionary accessibility, adaptability and sophistication also make it a powerful tool for criminal networks, Europol says.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
πŸ–‹οΈ Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks πŸ–‹οΈ

Google has released outofband fixes to address a highseverity security flaw in its Chrome browser for Windows that it said has been exploited in the wild as part of attacks targeting organizations in Russia.  The vulnerability, tracked as CVE20252783, has been described as a case of "incorrect handle provided in unspecified circumstances in Mojo on Windows." Mojo refers to a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Security Flaws Found in VMware Tools and CrushFTP β€” High Risk, No Workaround πŸ–‹οΈ

Broadcom has issued security patches to address a highseverity security flaw in VMware Tools for Windows that could lead to an authentication bypass. Tracked as CVE202522230, the vulnerability is rated 7.8 on the tenpoint Common Vulnerability Scoring System CVSS. "VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control," Broadcom said in an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker πŸ–‹οΈ

A new investigation has unearthed nearly 200 unique commandandcontrol C2 domains associated with a malware called Raspberry Robin. "Raspberry Robin also known as Roshtyak or Storm0856 is a complex and evolving threat actor that provides initial access broker IAB services to numerous criminal groups, many of which have connections to Russia," Silent Push said in a report shared with The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years πŸ–‹οΈ

A major telecommunications company located in Asia was allegedly breached by Chinese statesponsored hackers who spent over four years inside its systems, according to a new report from incident response firm Sygnia. The cybersecurity company is tracking the activity under the name Weaver Ant, describing the threat actor as stealthy and highly persistent. The name of the telecom provider was not.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface πŸ–‹οΈ

Organizations now use an average of 112 SaaS applicationsa number that keeps growing. In a 2024 study, 49 of 644 respondents who frequently used Microsoft 365 believed that they had less than 10 apps connected to the platform, despite the fact that aggregated data indicated over 1,000 Microsoft 365 SaaStoSaaS connections on average per deployment. And thats just one major SaaS provider.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps πŸ–‹οΈ

Cybersecurity researchers are calling attention to an Android malware campaign that leverages Microsoft's .NET Multiplatform App UI .NET MAUI framework to create bogus banking and social media apps targeting Indian and Chinesespeaking users. "These threats disguise themselves as legitimate apps, targeting users to steal sensitive information," McAfee Labs researcher Dexter Shin said. .NET.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Android Malware Uses .NET MAUI to Evade Detection πŸ“”

McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user information through fake apps.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybercriminals Use Atlantis AIO to Target 140+ Platforms πŸ“”

Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NIST Warns of Significant Limitations in AI/ML Security Mitigations πŸ“”

NIST has urged more research and emphasis on developing mitigations for attacks on AI and ML systems.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity