πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β™ŸοΈ How Each Pillar of the 1st Amendment is Under Attack β™ŸοΈ

In an address to Congress this month, President Trump claimed he had "brought free speech back to America." But barely two months into his second term, the president has waged an unprecedented attack on the First Amendment rights of journalists, students, universities, government workers, lawyers and judges. This story explores a slew of recent actions by the Trump administration that threaten to undermine all five pillars of the First Amendment to the U.S. Constitution, which guarantees freedoms concerning speech, religion, the media, the right to assembly, and the right to petition the government and seek redress for wrongs.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images πŸ–‹οΈ

Threat actors are using the "muplugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. muplugins, short for mustuse plugins, refers to plugins in a special directory "wpcontentmuplugins" that are automatically executed by WordPress without the need to enable them explicitly via the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🚨 Vulnerability affecting Next.js web development framework 🚨

The NCSC is encouraging UK organisations to take immediate action to mitigate a vulnerability CVE202529927 affecting the Next.js framework used to build web applications.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Law enforcement needs to fight fire with fire on AI threats πŸ“’

UK law enforcement agencies have been urged to employ a more proactive approach to AIrelated cyber crime as threats posed by the technology accelerate.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More πŸ–‹οΈ

Every week, someone somewhere slips upand threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a tooconvenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks? Step behind the curtain with us this week as we explore breaches born from routine oversightsand the unexpected.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ClickFake Interview Campaign by Lazarus Targets Crypto Job Seekers πŸ“”

New ClickFake Interview campaign attributed to the Lazarus Group targets crypto professionals with fake job offers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images πŸ–‹οΈ

Threat actors are using the "muplugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. muplugins, short for mustuse plugins, refers to plugins in a special directory "wpcontentmuplugins" that are automatically executed by WordPress without the need to enable them explicitly via the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images πŸ–‹οΈ

Threat actors are using the "muplugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. muplugins, short for mustuse plugins, refers to plugins in a special directory "wpcontentmuplugins" that are automatically executed by WordPress without the need to enable them explicitly via the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images πŸ–‹οΈ

Threat actors are using the "muplugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. muplugins, short for mustuse plugins, refers to plugins in a special directory "wpcontentmuplugins" that are automatically executed by WordPress without the need to enable them explicitly via the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Infostealer malware: What’s the threat to businesses? πŸ“’

To counter the rising threat of infostealer malware, security teams must be vigilant and practice rigorous patching.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 5 Impactful AWS Vulnerabilities You're Responsible For πŸ–‹οΈ

If you're using AWS, it's easy to assume your cloud security is handled but that's a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment remains the customers responsibility. Think of AWS security like protecting a building AWS provides strong walls and a solid roof, but it's up to the customer to handle the locks, install the alarm systems,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ClickFake Interview Campaign by Lazarus Targets Crypto Job Seekers πŸ“”

New ClickFake Interview campaign attributed to the Lazarus Group targets crypto professionals with fake job offers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images πŸ–‹οΈ

Threat actors are using the "muplugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. muplugins, short for mustuse plugins, refers to plugins in a special directory "wpcontentmuplugins" that are automatically executed by WordPress without the need to enable them explicitly via the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images πŸ–‹οΈ

Threat actors are using the "muplugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. muplugins, short for mustuse plugins, refers to plugins in a special directory "wpcontentmuplugins" that are automatically executed by WordPress without the need to enable them explicitly via the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images πŸ–‹οΈ

Threat actors are using the "muplugins" directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. muplugins, short for mustuse plugins, refers to plugins in a special directory "wpcontentmuplugins" that are automatically executed by WordPress without the need to enable them explicitly via the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More πŸ–‹οΈ

Every week, someone somewhere slips upand threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a tooconvenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks? Step behind the curtain with us this week as we explore breaches born from routine oversightsand the unexpected.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More πŸ–‹οΈ

Every week, someone somewhere slips upand threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a tooconvenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks? Step behind the curtain with us this week as we explore breaches born from routine oversightsand the unexpected.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” EU Commission to Invest €1.3bn in Cybersecurity and AI πŸ“”

The funding will go to several projects within the Digital Europe Programme DIGITAL work program for 2025 to 2027.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More πŸ–‹οΈ

Every week, someone somewhere slips upand threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a tooconvenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks? Step behind the curtain with us this week as we explore breaches born from routine oversightsand the unexpected.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber criminals widen the net to target tradespeople πŸ“’

Tradespeople are being warned to take the potential of cyber attacks more seriously after new research showed almost twothirds had fallen victim to at least one successful attempt in the past.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” EU Commission to Invest €1.3bn in Cybersecurity and AI πŸ“”

The funding will go to several projects within the Digital Europe Programme DIGITAL work program for 2025 to 2027.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity