πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ¦… Hacktivists Increasingly Target France for Its Diplomatic Efforts πŸ¦…

Cyble Hacktivists Increasingly Target France for Its Diplomatic Efforts " dataimagecaption"Cyble Hacktivists Increasingly Target France for Its Diplomatic Efforts " datamediumfile"httpscyble.comwpcontentuploads202503CybleBlogsHacktivistsFrance300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202503CybleBlogsHacktivistsFrance1024x512.jpg" title"Hacktivists Increasingly Target France for Its Diplomatic Efforts 1" According to a Cyble report sent to clients recently, France is increasingly becoming a target of hacktivists for its active role in international diplomacy and in ongoing conflicts in Ukraine and the Middle East. Frances role in those conflicts has drawn the ire of proRussian and proPalestinian hacktivist groups, Cyble said, as those hacktivists have found ideological ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuity πŸ–‹οΈ

Long gone are the days when a simple backup in a data center was enough to keep a business secure. While backups store information, they do not guarantee business continuity during a crisis. With IT disasters far too common and downtime burning through budgets, modern IT environments require solutions that go beyond storage and enable instant recovery to minimize downtime and data loss. This is.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Developers spend 17 hours a week on security β€” but don't consider it a top priority πŸ“’

More work on DevSecOps has been identified as a top priority for developer teams.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Morphing Meerkat PhaaS Platform Spoofs 100+ Brands πŸ“”

A PhaaS platform, dubbed 'Morphing Meerkat,' uses DNS MX records to spoof over 100 brands and steal credentials, according to Infoblox Threat Intel.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Trump CISA Cuts Threaten US Election Integrity, Experts Warn πŸ“”

Expert speakers discussed the impact of reported cutbacks to CISA on the ability of local officials to protect against surging cyberattacks on US election infrastructure.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Security researchers hack BlackLock ransomware gang in push back against rising threat actor πŸ“’

BlackLock's reputation may not recover as analysts publish extensive details of its victims and associated accounts.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… TsarBot: A New Android Banking Trojan Targeting Over 750 Banking, Finance, and Cryptocurrency Applications πŸ¦…

Cyble TsarBot A New Android Banking Trojan Targeting Over 750 Banking, Finance, and Cryptocurrency Applications " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202503TsarBot300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202503TsarBot.jpg" title"TsarBot A New Android Banking Trojan Targeting Over 750 Banking, Finance, and Cryptocurrency Applications 1" Key Takeaways A new Android Banking Trojan, TsarBot, targets over 750 applications globally, including banking, finance, cryptocurrency, and ecommerce apps. TsarBot spreads via phishing sites masquerading as legitimate financial platforms and is installed through a dropper disguised as Google Play Services. It uses overlay attacks to steal banking credentials, credit card details, and login credentials ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Qualys discovers three bypasses of Ubuntu's unprivileged user namespace restrictions πŸ“’

Combined with other vulnerabilities, the flaws could lead to full system access.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection πŸ–‹οΈ

Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that's designed to download and execute secondary payloads. The malware, according to Zscaler ThreatLabz, shares behavioral similarities with another known malware loader known as SmokeLoader.  "The purpose of the malware is to download and execute secondstage payloads while evading.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA πŸ–‹οΈ

Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt, and SMA, that could be exploited by a bad actor to seize control of devices or execute code remotely, posing severe risks to electrical grids.  The vulnerabilities have been collectively codenamed SUNDOWN by Forescout Vedere Labs. "The new vulnerabilities can be.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine πŸ–‹οΈ

Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT. "The file names use Russian words related to the movement of troops in Ukraine as a lure," Cisco Talos researcher Guilherme Venere said in a report published last week. "The PowerShell downloader contacts geofenced servers located in Russia and Germany to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ How Each Pillar of the 1st Amendment is Under Attack β™ŸοΈ

In an address to Congress this month, President Trump claimed he had "brought free speech back to America." But barely two months into his second term, the president has waged an unprecedented attack on the First Amendment rights of journalists, students, universities, government workers, lawyers and judges. This story explores a slew of recent actions by the Trump administration that threaten to undermine all five pillars of the First Amendment to the U.S. Constitution, which guarantees freedoms concerning speech, religion, the media, the right to assembly, and the right to petition the government and seek redress for wrongs.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ How Each Pillar of the 1st Amendment is Under Attack β™ŸοΈ

In an address to Congress this month, President Trump claimed he had "brought free speech back to America." But barely two months into his second term, the president has waged an unprecedented attack on the First Amendment rights of journalists, students, universities, government workers, lawyers and judges. This story explores a slew of recent actions by the Trump administration that threaten to undermine all five pillars of the First Amendment to the U.S. Constitution, which guarantees freedoms concerning speech, religion, the media, the right to assembly, and the right to petition the government and seek redress for wrongs.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ How Each Pillar of the 1st Amendment is Under Attack β™ŸοΈ

In an address to Congress this month, President Trump claimed he had "brought free speech back to America." But barely two months into his second term, the president has waged an unprecedented attack on the First Amendment rights of journalists, students, universities, government workers, lawyers and judges. This story explores a slew of recent actions by the Trump administration that threaten to undermine all five pillars of the First Amendment to the U.S. Constitution, which guarantees freedoms concerning speech, religion, the media, the right to assembly, and the right to petition the government and seek redress for wrongs.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images πŸ–‹οΈ

Threat actors are using the "muplugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. muplugins, short for mustuse plugins, refers to plugins in a special directory "wpcontentmuplugins" that are automatically executed by WordPress without the need to enable them explicitly via the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🚨 Vulnerability affecting Next.js web development framework 🚨

The NCSC is encouraging UK organisations to take immediate action to mitigate a vulnerability CVE202529927 affecting the Next.js framework used to build web applications.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Law enforcement needs to fight fire with fire on AI threats πŸ“’

UK law enforcement agencies have been urged to employ a more proactive approach to AIrelated cyber crime as threats posed by the technology accelerate.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More πŸ–‹οΈ

Every week, someone somewhere slips upand threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a tooconvenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks? Step behind the curtain with us this week as we explore breaches born from routine oversightsand the unexpected.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ClickFake Interview Campaign by Lazarus Targets Crypto Job Seekers πŸ“”

New ClickFake Interview campaign attributed to the Lazarus Group targets crypto professionals with fake job offers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images πŸ–‹οΈ

Threat actors are using the "muplugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. muplugins, short for mustuse plugins, refers to plugins in a special directory "wpcontentmuplugins" that are automatically executed by WordPress without the need to enable them explicitly via the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images πŸ–‹οΈ

Threat actors are using the "muplugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. muplugins, short for mustuse plugins, refers to plugins in a special directory "wpcontentmuplugins" that are automatically executed by WordPress without the need to enable them explicitly via the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity