πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Counterfeit Phones Carrying Hidden Revamped Triada Malware πŸ•΅οΈβ€β™‚οΈ

The malware, first discovered in 2016, has been updated over the years, and the latest version is now hiding in the firmware of counterfeit mobile phones.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Runtime Ventures Launches New Fund for Seed, Pre-Seed Startups πŸ•΅οΈβ€β™‚οΈ

Cofounders Michael Sutton and David Endler raised 32 million to invest in early stage cybersecurity startups as well as to provide mentoring support.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Social Engineering Just Got Smarter πŸ•΅οΈβ€β™‚οΈ

Polices that forbid employees from divulging company details are worthless if the same information can be obtained from sources employees have no control over.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Emerging Risks Require IT/OT Collaboration to Secure Physical Systems πŸ•΅οΈβ€β™‚οΈ

With an increase in cyberphysical attacks that can cause significant disruptions, financial fallout and safety concerns for victim organizations, IT and OT security teams cannot keep working in silos.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Google Quick Share Bug Bypasses Allow Zero-Click File Transfer πŸ•΅οΈβ€β™‚οΈ

Google addresses patch bypasses for CVE202438272 and CVE202438271, part of the previously announced "QuickShell" silent RCE attack chain against Windows users.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Israel Enters 'Stage 3' of Cyber Wars With Iran Proxies πŸ•΅οΈβ€β™‚οΈ

While Israel and Iranian proxies fight it out IRL, their conflict in cyberspace has developed in parallel. These days attacks have decelerated, but advanced in sophistication.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Benchmarks Find β€˜DeepSeek-V3-0324 Is More Vulnerable Than Qwen2.5-Max’ 🦿

While the latest iteration of Qwen2.5Max outperforms DeepSeekV3 on security, the AI model lags behind its competition in several other areas.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Windows 11 Forces Microsoft Account Sign In & Removes Bypass Trick Option 🦿

Microsoft is killing the Windows 11 bypass trick soon, all setups will require internet and a Microsoft Account, leaving privacyconscious users with fewer options.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 North Korean Hackers Disguised as IT Workers Targeting UK, European Companies, Google Finds 🦿

The attackers pose as legitimate remote IT workers, looking to both generate revenue and access sensitive company data through employment. "Europe needs to wake up fast, according to Googles Jamie Collier.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Payment Fraud Detection and Prevention: Here’s All To Know 🦿

Here are the most common and latest advancements in payment fraud strategies and payment fraud prevention tools for protecting your business.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 8 Best Enterprise Password Managers 🦿

Explore the best enterprise password managers that provide security and centralized control for managing and protecting passwords across your organization.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google DeepMind Proposes AI β€˜Monitors’ to Police Hyperintelligent Models 🦿

DeepMinds approach to AGI safety and security splits threats into four categories. One solution could be a monitor AI.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SpotBugs Access Token Theft Identified as Root Cause of GitHub Supply Chain Attack πŸ–‹οΈ

The cascading supply chain attack that initially targeted Coinbase before becoming more widespread to single out users of the "tjactionschangedfiles" GitHub Action has been traced further back to the theft of a personal access token PAT related to SpotBugs. "The attackers obtained initial access by taking advantage of the GitHub Actions workflow of SpotBugs, a popular opensource tool for.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Have We Reached a Distroless Tipping Point? πŸ–‹οΈ

Theres a virtuous cycle in technology that pushes the boundaries of whats being built and how its being used. A new technology development emerges and captures the world's attention. People start experimenting and discover novel applications, use cases, and approaches to maximize the innovation's potential. These use cases generate significant value, fueling demand for the next iteration of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Ivanti Flaw Actively Exploited to Deploy TRAILBLAZE and BRUSHFIRE Malware πŸ–‹οΈ

Ivanti has disclosed details of a nowpatched critical security vulnerability impacting its Connect Secure that has come under active exploitation in the wild. The vulnerability, tracked as CVE202522457 CVSS score 9.0, concerns a case of a stackbased buffer overflow that could be exploited to execute arbitrary code on affected systems. "A stackbased buffer overflow in Ivanti Connect.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers πŸ–‹οΈ

A novice cybercrime actor has been observed leveraging the services of a Russian bulletproof hosting BPH provider called Proton66 to facilitate their operations. The findings come from DomainTools, which detected the activity after it discovered a phony website named cybersecureprotect.com hosted on Proton66 that masqueraded as an antivirus service. The threat intelligence firm said it.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CERT-UA Reports Cyberattacks Targeting Ukrainian State Systems with WRECKSTEEL Malware πŸ–‹οΈ

The Computer Emergency Response Team of Ukraine CERTUA has revealed that no less than three cyber attacks were recorded against state administration bodies and critical infrastructure facilities in the country with an aim to steal sensitive data. The campaign, the agency said, involved the use of compromised email accounts to send phishing messages containing links pointing to legitimate.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Flaw in Apache Parquet Allows Remote Attackers to Execute Arbitrary Code πŸ–‹οΈ

A maximum severity security vulnerability has been disclosed in Apache Parquet's Java Library that, if successfully exploited, could allow a remote attacker to execute arbitrary code on susceptible instances. Apache Parquet is a free and opensource columnar data file format that's designed for efficient data processing and retrieval, providing support for complex data, highperformance.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware πŸ–‹οΈ

Microsoft is warning of several phishing campaigns that are leveraging taxrelated themes to deploy malware and steal credentials. "These campaigns notably use redirection methods such as URL shorteners and QR codes contained in malicious attachments and abuse legitimate services like filehosting services and business profile pages to avoid detection," Microsoft said in a report shared with The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware πŸ–‹οΈ

The North Korean threat actors behind Contagious Interview have adopted the increasingly popular ClickFix social engineering tactic to lure job seekers in the cryptocurrency sector to deliver a previously undocumented Gobased backdoor called GolangGhost on Windows and macOS systems. The new activity, assessed to be a continuation of the campaign, has been codenamed ClickFake Interview by.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI Threats Are Evolving Fast β€” Learn Practical Defense Tactics in this Expert Webinar πŸ–‹οΈ

The rules have changed. Again. Artificial intelligence is bringing powerful new tools to businesses. But it's also giving cybercriminals smarter ways to attack. Theyre moving quicker, targeting more precisely, and slipping past old defenses without being noticed. And here's the harsh truth If your security strategy hasnt evolved with AI in mind, youre already behind. But youre not aloneand.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity