πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” ClickFake Interview Campaign by Lazarus Targets Crypto Job Seekers πŸ“”

New ClickFake Interview campaign attributed to the Lazarus Group targets crypto professionals with fake job offers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Qakbot Resurfaces in Fresh Wave of ClickFix Attacks πŸ•΅οΈβ€β™‚οΈ

Attackers post links to fake websites on LinkedIn to ask people to complete malicious CAPTCHA challenges that install malware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Seizes $8.2m from Romance Baiting Scammers πŸ“”

The DoJ has managed to recoup over 8m from scammers, stolen in romance baiting schemes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” EU Commission to Invest €1.3bn in Cybersecurity and AI πŸ“”

The funding will go to several projects within the Digital Europe Programme DIGITAL work program for 2025 to 2027.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NCSC Urges Users to Patch Next.js Flaw Immediately πŸ“”

The UKs National Cyber Security Agency has called on Next.js users to patch CVE202529927.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Seizes $8.2m from Romance Baiting Scammers πŸ“”

The DoJ has managed to recoup over 8m from scammers, stolen in romance baiting schemes.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What are business logic vulnerabilities? πŸ“’

Business logic vulnerabilities let attackers exploit design flaws in software, bypassing security controls to manipulate pricing, authentication, and more.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ ITPro launches Picks 2025 Awards πŸ“’

We will be celebrating the best of the best in cybersecurity in June...

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Oracle Cloud Users Urged to Take Action πŸ•΅οΈβ€β™‚οΈ

Although Oracle has denied its cloud infrastructure services were breached, security experts recommend Oracle customers independently verify if they were affected and take measures to reduce exposure to potential fallout.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CoffeeLoader Malware Is Stacked With Vicious Evasion Tricks πŸ•΅οΈβ€β™‚οΈ

Nextlevel malware represents a new era of malicious code developed specifically to get around modern security software like digital forensics tools and EDR, new research warns.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ DoJ Seizes Over $8M From Sprawling Pig Butchering Scheme πŸ•΅οΈβ€β™‚οΈ

The department was able to trace the stolen funds to three main cryptocurrency accounts after being routed through a series of other platforms.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISA Warns of Resurge Malware Connected to Ivanti Vuln πŸ•΅οΈβ€β™‚οΈ

Threat actors are exploiting a vulnerability in Ivanti Connect Secure first disclosed by the vendor in January.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top Tech Conferences & Events to Add to Your Calendar in 2025 🦿

A great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our tech events guide.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp πŸ–‹οΈ

The threat actors behind the zeroday exploitation of a recentlypatched security vulnerability in Microsoft Windows have been found to deliver two new backdoors called SilentPrism and DarkWisp. The activity has been attributed to a suspected Russian hacking group called Water Gamayun, which is also known as EncryptHub and LARVA208. "The threat actor deploys payloads primarily by means of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Malware Variant RESURGE Exploits Ivanti Vulnerability πŸ“”

CISA recommends immediate action to address malware variant RESURGE exploiting Ivanti vulnerability CVE20250282.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apple Fined €150 Million by French Regulator Over Discriminatory ATT Consent Practices πŸ–‹οΈ

Apple has been hit with a fine of 150 million 162 million by France's competition watchdog over the implementation of its App Tracking Transparency ATT privacy framework. The Autorit de la concurrence said it's imposing a financial penalty against Apple for abusing its dominant position as a distributor of mobile applications for iOS and iPadOS devices between April 26, 2021 and July 25,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
πŸ“’ ReliaQuest targets international growth, agentic AI gains with $500 million investment πŸ“’

Cybersecurity firm ReliaQuest has raised 500 million as part of a funding round aimed at accelerating international growth and product development.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ ReliaQuest targets international growth, agentic AI gains with $500 million investment πŸ“’

Cybersecurity firm ReliaQuest has raised 500 million as part of a funding round aimed at accelerating international growth and product development.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Former GCHQ intern risked national security after taking home top secret data πŸ“’

A former GCHQ intern has pleaded guilty to transferring data from a topsecret computer onto his work phone.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Former GCHQ intern risked national security after taking home top secret data πŸ“’

A former GCHQ intern has pleaded guilty to transferring data from a topsecret computer onto his work phone.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download 🦿

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity