πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks πŸ–‹οΈ

Google has released outofband fixes to address a highseverity security flaw in its Chrome browser for Windows that has been exploited in the wild as part of attacks targeting organizations in Russia.  The vulnerability, tracked as CVE20252783, has been described as a case of "incorrect handle provided in unspecified circumstances in Mojo on Windows." Mojo refers to a collection of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious npm Package Modifies Local 'ethers' Library to Launch Reverse Shell Attacks πŸ–‹οΈ

Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting the opensource ecosystem. The packages in question are ethersprovider2 and ethersproviderz, with the former downloaded 73 times to date since it was published on.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience πŸ–‹οΈ

A boxer derives the greatest advantage from his sparring partner Epictetus, 50135 AD Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and circle. Red throws out three jabs, feints a fourth, andBANGlands a right hand on Blue down the center. This wasnt Blues first day and despite his solid defense in front of the mirror, he feels the pressure.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Testing Framework Helps Evaluate Sandboxes πŸ•΅οΈβ€β™‚οΈ

The AntiMalware Testing Standards Organization published a Sandbox Evaluation Framework to set a standard among various sandbox offerings that help protect organizations from rising threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malicious npm Packages Deliver Sophisticated Reverse Shells πŸ“”

A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware πŸ–‹οΈ

The threat actor known as EncryptHub exploited a recentlypatched security vulnerability in Microsoft Windows as a zeroday to deliver a wide range of malware families, including backdoors and information stealers such as Rhadamanthys and StealC. "In this attack, the threat actor manipulates .msc files and the Multilingual User Interface Path MUIPath to download and execute malicious payload,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment πŸ–‹οΈ

The Russianspeaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor's tradecraft. The activity, observed by Romanian cybersecurity company Bitdefender, involves the deployment of a neverbeforeseen ransomware strain dubbed QWCrypt. RedCurl, also called Earth Kapre and Red Wolf, has a history of orchestrating.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ 'Lucid' Phishing-as-a-Service Exploits Faults in iMessage, Android RCS πŸ•΅οΈβ€β™‚οΈ

Cybercriminals in China have figured out how to undermine the strengths of mobile messaging protocols.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Threat Actors Abuse Trust in Cloud Collaboration Platforms πŸ“”

Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Healthcare systems are rife with exploits β€” and ransomware gangs have noticed πŸ“’

Nearly nineinten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ ESET looks to β€˜empower’ partners with cybersecurity portfolio updates πŸ“’

Cybersecurity solutions provider ESET has launched a series of updates to its business portfolio and ESET PROTECT platform to help partners tackle growing security challenges.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ NHS supplier hit with Β£3m fine for security failings that led to attack πŸ“’

The Information Commissioner's Office ICO said Advanced Computer Software Group failed to use appropriate security measures before the 2022 attack, which put the personal information of tens of thousands of NHS patients at risk.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ OpenAI announces five-fold increase in bug bounty reward πŸ“’

OpenAI has announced a slew of new cybersecurity initiatives, including a 500 increase to the maximum award for its bug bounty program.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Iran's MOIS-Linked APT34 Spies on Allies Iraq & Yemen πŸ•΅οΈβ€β™‚οΈ

The Islamic Republic is keeping its enemies close and its friends closer, with espionage attacks aimed at nearby neighbors.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hoff's Rule: People First πŸ•΅οΈβ€β™‚οΈ

Dark Reading Confidential Episode 5 Christofer Hoff, chief secure technology officer at LastPass, shares the human side of the story of how he led his team through a major cyber incident and built from the ground up a security team and security culture.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How CISA Cuts Impact Election Security πŸ•΅οΈβ€β™‚οΈ

State and federal security experts weighed in on the impact that budgetary and personnel cuts to CISA will have on election security as a whole.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OpenAI Bumps Up Bug Bounty Reward to $100K in Security Update πŸ•΅οΈβ€β™‚οΈ

The artificial intelligence research company previously had its maximum payout set at 20,000 before exponentially raising the reward.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ DoJ Recovers $5M Lost in BEC Fraud Against Workers' Union πŸ•΅οΈβ€β™‚οΈ

The union received a spoofed email that led to the loss of 6.4 million, much of it transferred to other accounts or to a cryptocurrency exchange.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Fake DeepSeek Ads Spread Malware to Google Users πŸ•΅οΈβ€β™‚οΈ

Popularity of the generative AI platform makes it an obvious choice for cybercriminals abusing Googlesponsored search results, according to researchers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ High-Severity Cloud Security Alerts Tripled in 2024 πŸ•΅οΈβ€β™‚οΈ

Attackers aren't just spending more time targeting the cloud they're ruthlessly stealing more sensitive data and accessing more critical systems than ever before.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection 🦿

Microsofts .NET MAUI lets developers build crossplatform apps in C, but its use of binary blob files poses new risks by bypassing Androids DEXbased security checks.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity