πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface πŸ–‹οΈ

Organizations now use an average of 112 SaaS applicationsa number that keeps growing. In a 2024 study, 49 of 644 respondents who frequently used Microsoft 365 believed that they had less than 10 apps connected to the platform, despite the fact that aggregated data indicated over 1,000 Microsoft 365 SaaStoSaaS connections on average per deployment. And thats just one major SaaS provider.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps πŸ–‹οΈ

Cybersecurity researchers are calling attention to an Android malware campaign that leverages Microsoft's .NET Multiplatform App UI .NET MAUI framework to create bogus banking and social media apps targeting Indian and Chinesespeaking users. "These threats disguise themselves as legitimate apps, targeting users to steal sensitive information," McAfee Labs researcher Dexter Shin said. .NET.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Android Malware Uses .NET MAUI to Evade Detection πŸ“”

McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user information through fake apps.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybercriminals Use Atlantis AIO to Target 140+ Platforms πŸ“”

Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NIST Warns of Significant Limitations in AI/ML Security Mitigations πŸ“”

NIST has urged more research and emphasis on developing mitigations for attacks on AI and ML systems.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” China-Linked Weaver Ant Hackers Exposed After Four-Year Telco Infiltration πŸ“”

Sygnia has uncovered Weaver Ant, a Chinese threat actor that spied on telecommunications networks for years.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Dark Web Mentions of Malicious AI Tools Spike 200% πŸ“”

Kela researchers detect a 200 increase in dark web chatter about malicious AI tools.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” IngressNightmare: Four Critical Bugs Found in 40% of Cloud Systems πŸ“”

Wiz Security finds four critical RCE vulnerabilities in the Ingress NGINX Controller for Kubernetes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Public-Private Ops Net Big Wins Against African Cybercrime πŸ•΅οΈβ€β™‚οΈ

Three cybersecurity firms worked with Interpol and authorities in Nigeria, South Africa, Rwanda, and four other African nations to arrest more than 300 cybercriminals.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack πŸ“’

Troy Hunt, the security blogger behind databreach site Have I Been Pwned, has fallen victim to a phishing attack targeting his email subscriber list.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms πŸ–‹οΈ

Threat actors are leveraging an ecrime tool called Atlantis AIO MultiChecker to automate credential stuffing attacks, according to findings from Abnormal Security. Atlantis AIO "has emerged as a powerful weapon in the cybercriminal arsenal, enabling attackers to test millions of stolen credentials in rapid succession," the cybersecurity company said in an analysis. Credential stuffing is a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Government’s New Fraud Strategy to Focus on Tech-Enabled Threats πŸ“”

The UK governments new fraud minister will today announce plans for a newly expanded fraud strategy.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ENISA Probes Space Threat Landscape in New Report πŸ“”

EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How PAM Mitigates Insider Threats: Preventing Data Breaches, Privilege Misuse, and More πŸ–‹οΈ

When people think of cybersecurity threats, they often picture external hackers breaking into networks. However, some of the most damaging breaches stem from within organizations. Whether through negligence or malicious intent, insiders can expose your organization to significant cybersecurity risks. According to Verizon's 2024 Data Breach Investigations Report, 57 of companies experience over.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ These five countries recorded the most third-party data breaches last year πŸ“’

Singapore and the Netherlands are the world's leading hotspots for thirdparty data breaches, with more than seveninten organizations falling victim last year.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ETSI Publishes New Quantum-Safe Encryption Standards πŸ“”

Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control KEMAC, enabling quantumsecure encryption.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks πŸ–‹οΈ

Google has released outofband fixes to address a highseverity security flaw in its Chrome browser for Windows that has been exploited in the wild as part of attacks targeting organizations in Russia.  The vulnerability, tracked as CVE20252783, has been described as a case of "incorrect handle provided in unspecified circumstances in Mojo on Windows." Mojo refers to a collection of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious npm Package Modifies Local 'ethers' Library to Launch Reverse Shell Attacks πŸ–‹οΈ

Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting the opensource ecosystem. The packages in question are ethersprovider2 and ethersproviderz, with the former downloaded 73 times to date since it was published on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience πŸ–‹οΈ

A boxer derives the greatest advantage from his sparring partner Epictetus, 50135 AD Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and circle. Red throws out three jabs, feints a fourth, andBANGlands a right hand on Blue down the center. This wasnt Blues first day and despite his solid defense in front of the mirror, he feels the pressure.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Testing Framework Helps Evaluate Sandboxes πŸ•΅οΈβ€β™‚οΈ

The AntiMalware Testing Standards Organization published a Sandbox Evaluation Framework to set a standard among various sandbox offerings that help protect organizations from rising threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malicious npm Packages Deliver Sophisticated Reverse Shells πŸ“”

A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity