πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Mozilla Patches Critical Firefox Bug Similar to Chrome’s Recent Zero-Day Vulnerability πŸ–‹οΈ

Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely days after Google patched a similar flaw in Chrome that came under active exploitation as a zeroday. The security vulnerability, CVE20252857, has been described as a case of an incorrect handle that could lead to a sandbox escape. "Following the recent Chrome sandbox escape .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records πŸ–‹οΈ

Cybersecurity researchers have shed light on a new phishingasaservice PhaaS platform that leverages the Domain Name System DNS mail exchange MX records to serve fake login pages that impersonate about 114 brands. DNS intelligence firm Infoblox is tracking the actor behind the PhaaS, the phishing kit, and the related activity under the moniker Morphing Meerkat. "The threat actor behind.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Repurpose RansomHub's EDRKillShifter in Medusa, BianLian, and Play Attacks πŸ–‹οΈ

A new analysis has uncovered connections between affiliates of RansomHub and other ransomware groups like Medusa, BianLian, and Play. The connection stems from the use of a custom tool that's designed to disable endpoint detection and response EDR software on compromised hosts, according to ESET. The EDR killing tool, dubbed EDRKillShifter, was first documented as used by RansomHub actors in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware πŸ–‹οΈ

An advanced persistent threat APT group with ties to Pakistan has been attributed to the creation of a fake website masquerading as India's public sector postal system as part of a campaign designed to infect both Windows and Android users in the country. Cybersecurity company CYFIRMA has attributed the campaign with medium confidence to a threat actor called APT36, which is also known as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and How to Fix It πŸ–‹οΈ

Whether its CRMs, project management tools, payment processors, or lead management tools your workforce is using SaaS applications by the pound. Organizations often rely on traditional CASB solutions for protecting against malicious access and data exfiltration, but these fall short for protecting against shadow SaaS, data damage, and more. A new report, Understanding SaaS Security Risks Why.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Top 3 MS Office Exploits Hackers Use in 2025 – Stay Alert! πŸ–‹οΈ

Hackers have long used Word and Excel documents as delivery vehicles for malware, and in 2025, these tricks are far from outdated. From phishing schemes to zeroclick exploits, malicious Office files are still one of the easiest ways into a victims system. Here are the top three Microsoft Officebased exploits still making the rounds this year and what you need to know to avoid them. 1.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platforms πŸ–‹οΈ

An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote Chineselanguage gambling platforms has ballooned to compromise approximately 150,000 sites to date. "The threat actor has slightly revamped their interface but is still relying on an iframe injection to display a fullscreen overlay in the visitor's browser," cside security analyst Himanshu.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA has added two sixyearold security flaws impacting Sitecore CMS and Experience Platform XP to its Known Exploited Vulnerabilities KEV catalog, based on evidence of active exploitation. The vulnerabilities are listed below CVE20199874 CVSS score 9.8 A deserialization vulnerability in the Sitecore.Security.AntiCSRF.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems πŸ–‹οΈ

A critical security flaw has been disclosed in NetApp SnapCenter that, if successfully exploited, could allow privilege escalation. SnapCenter is an enterprisefocused software that's used to manage data protection across applications, databases, virtual machines, and file systems, offering the ability to backup, restore, and clone data resources. The vulnerability, tracked as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CoffeeLoader Malware Loader Linked to SmokeLoader Operations πŸ“”

Newly identified CoffeeLoader uses multiple evasion techniques and persistence mechanisms to deploy payloads and bypass endpoint security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” PJobRAT Malware Targets Users in Taiwan via Fake Apps πŸ“”

PJobRAT malware targets Taiwan Android users, stealing data through fake messaging platforms.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” No MFA? Expect Hefty Fines, UK’s ICO Warns πŸ“”

The ICOs Deputy Commissioner told Infosecurity that organizations that fail to implement MFA and suffer a breach can expect heavy penalties.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese Spy Group FamousSparrow Back with a Vengeance, Targets US πŸ“”

Once considered inactive, the Chinese cyber espionage group FamousSparrow has reemerged, targeting organizations across the US, Mexico and Honduras.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NCA Warns of Sadistic Online β€œCom” Networks πŸ“”

The UKs National Crime Agency is warning of a growing cyber and physical threat from homegrown teens.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NCSC Urges Domain Registrars to Improve Security πŸ“”

The UKs National Cyber Security Centre has released new guidance to help domain registrars enhance security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SecurityScorecard Observes Surge in Third-Party Breaches πŸ“”

In its 2025 Global ThirdParty Breach Report, SecurityScorecard has found that 35.5 of all cyber breaches in 2024 were thirdparty related, up from 29 in 2023.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Hacktivists Increasingly Target France for Its Diplomatic Efforts πŸ¦…

Cyble Hacktivists Increasingly Target France for Its Diplomatic Efforts " dataimagecaption"Cyble Hacktivists Increasingly Target France for Its Diplomatic Efforts " datamediumfile"httpscyble.comwpcontentuploads202503CybleBlogsHacktivistsFrance300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202503CybleBlogsHacktivistsFrance1024x512.jpg" title"Hacktivists Increasingly Target France for Its Diplomatic Efforts 1" According to a Cyble report sent to clients recently, France is increasingly becoming a target of hacktivists for its active role in international diplomacy and in ongoing conflicts in Ukraine and the Middle East. Frances role in those conflicts has drawn the ire of proRussian and proPalestinian hacktivist groups, Cyble said, as those hacktivists have found ideological ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuity πŸ–‹οΈ

Long gone are the days when a simple backup in a data center was enough to keep a business secure. While backups store information, they do not guarantee business continuity during a crisis. With IT disasters far too common and downtime burning through budgets, modern IT environments require solutions that go beyond storage and enable instant recovery to minimize downtime and data loss. This is.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Developers spend 17 hours a week on security β€” but don't consider it a top priority πŸ“’

More work on DevSecOps has been identified as a top priority for developer teams.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Morphing Meerkat PhaaS Platform Spoofs 100+ Brands πŸ“”

A PhaaS platform, dubbed 'Morphing Meerkat,' uses DNS MX records to spoof over 100 brands and steal credentials, according to Infoblox Threat Intel.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Trump CISA Cuts Threaten US Election Integrity, Experts Warn πŸ“”

Expert speakers discussed the impact of reported cutbacks to CISA on the ability of local officials to protect against surging cyberattacks on US election infrastructure.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity