πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Iran's MOIS-Linked APT34 Spies on Allies Iraq & Yemen πŸ•΅οΈβ€β™‚οΈ

The Islamic Republic is keeping its enemies close and its friends closer, with espionage attacks aimed at nearby neighbors.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hoff's Rule: People First πŸ•΅οΈβ€β™‚οΈ

Dark Reading Confidential Episode 5 Christofer Hoff, chief secure technology officer at LastPass, shares the human side of the story of how he led his team through a major cyber incident and built from the ground up a security team and security culture.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How CISA Cuts Impact Election Security πŸ•΅οΈβ€β™‚οΈ

State and federal security experts weighed in on the impact that budgetary and personnel cuts to CISA will have on election security as a whole.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OpenAI Bumps Up Bug Bounty Reward to $100K in Security Update πŸ•΅οΈβ€β™‚οΈ

The artificial intelligence research company previously had its maximum payout set at 20,000 before exponentially raising the reward.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ DoJ Recovers $5M Lost in BEC Fraud Against Workers' Union πŸ•΅οΈβ€β™‚οΈ

The union received a spoofed email that led to the loss of 6.4 million, much of it transferred to other accounts or to a cryptocurrency exchange.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Fake DeepSeek Ads Spread Malware to Google Users πŸ•΅οΈβ€β™‚οΈ

Popularity of the generative AI platform makes it an obvious choice for cybercriminals abusing Googlesponsored search results, according to researchers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ High-Severity Cloud Security Alerts Tripled in 2024 πŸ•΅οΈβ€β™‚οΈ

Attackers aren't just spending more time targeting the cloud they're ruthlessly stealing more sensitive data and accessing more critical systems than ever before.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection 🦿

Microsofts .NET MAUI lets developers build crossplatform apps in C, but its use of binary blob files poses new risks by bypassing Androids DEXbased security checks.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Which Top Cybersecurity Role of 2024 Was Featured in 64,000+ Job Postings? 🦿

IT and security workforce management firm CyberSN surveyed job listings from 2022 to 2024. Yes, decreases in demand for some job titles may be related to AI.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ When Getting Phished Puts You in Mortal Danger β™ŸοΈ

Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those currently targeting Russians searching online for organizations that are fighting the Kremlin war machine, can cost you your freedom or your life.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps πŸ–‹οΈ

An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise of chat apps. "PJobRAT can steal SMS messages, phone contacts, device and app information, documents, and media files from infected Android devices," Sophos security researcher Pankaj Kohli said in a Thursday analysis. PJobRAT, first.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts πŸ–‹οΈ

Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon sensitive information such as environment variables from compromised systems. "Some of these packages have lived on npmjs.com for over 9 years, and provide legitimate functionality to blockchain developers," Sonatype researcher Ax Sharma said. "However, ... the latest.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mozilla Patches Critical Firefox Bug Similar to Chrome’s Recent Zero-Day Vulnerability πŸ–‹οΈ

Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely days after Google patched a similar flaw in Chrome that came under active exploitation as a zeroday. The security vulnerability, CVE20252857, has been described as a case of an incorrect handle that could lead to a sandbox escape. "Following the recent Chrome sandbox escape .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records πŸ–‹οΈ

Cybersecurity researchers have shed light on a new phishingasaservice PhaaS platform that leverages the Domain Name System DNS mail exchange MX records to serve fake login pages that impersonate about 114 brands. DNS intelligence firm Infoblox is tracking the actor behind the PhaaS, the phishing kit, and the related activity under the moniker Morphing Meerkat. "The threat actor behind.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Repurpose RansomHub's EDRKillShifter in Medusa, BianLian, and Play Attacks πŸ–‹οΈ

A new analysis has uncovered connections between affiliates of RansomHub and other ransomware groups like Medusa, BianLian, and Play. The connection stems from the use of a custom tool that's designed to disable endpoint detection and response EDR software on compromised hosts, according to ESET. The EDR killing tool, dubbed EDRKillShifter, was first documented as used by RansomHub actors in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware πŸ–‹οΈ

An advanced persistent threat APT group with ties to Pakistan has been attributed to the creation of a fake website masquerading as India's public sector postal system as part of a campaign designed to infect both Windows and Android users in the country. Cybersecurity company CYFIRMA has attributed the campaign with medium confidence to a threat actor called APT36, which is also known as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and How to Fix It πŸ–‹οΈ

Whether its CRMs, project management tools, payment processors, or lead management tools your workforce is using SaaS applications by the pound. Organizations often rely on traditional CASB solutions for protecting against malicious access and data exfiltration, but these fall short for protecting against shadow SaaS, data damage, and more. A new report, Understanding SaaS Security Risks Why.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Top 3 MS Office Exploits Hackers Use in 2025 – Stay Alert! πŸ–‹οΈ

Hackers have long used Word and Excel documents as delivery vehicles for malware, and in 2025, these tricks are far from outdated. From phishing schemes to zeroclick exploits, malicious Office files are still one of the easiest ways into a victims system. Here are the top three Microsoft Officebased exploits still making the rounds this year and what you need to know to avoid them. 1.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platforms πŸ–‹οΈ

An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote Chineselanguage gambling platforms has ballooned to compromise approximately 150,000 sites to date. "The threat actor has slightly revamped their interface but is still relying on an iframe injection to display a fullscreen overlay in the visitor's browser," cside security analyst Himanshu.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA has added two sixyearold security flaws impacting Sitecore CMS and Experience Platform XP to its Known Exploited Vulnerabilities KEV catalog, based on evidence of active exploitation. The vulnerabilities are listed below CVE20199874 CVSS score 9.8 A deserialization vulnerability in the Sitecore.Security.AntiCSRF.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems πŸ–‹οΈ

A critical security flaw has been disclosed in NetApp SnapCenter that, if successfully exploited, could allow privilege escalation. SnapCenter is an enterprisefocused software that's used to manage data protection across applications, databases, virtual machines, and file systems, offering the ability to backup, restore, and clone data resources. The vulnerability, tracked as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity