πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Have We Reached a Distroless Tipping Point? πŸ–‹οΈ

Theres a virtuous cycle in technology that pushes the boundaries of whats being built and how its being used. A new technology development emerges and captures the world's attention. People start experimenting and discover novel applications, use cases, and approaches to maximize the innovation's potential. These use cases generate significant value, fueling demand for the next iteration of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Ivanti Flaw Actively Exploited to Deploy TRAILBLAZE and BRUSHFIRE Malware πŸ–‹οΈ

Ivanti has disclosed details of a nowpatched critical security vulnerability impacting its Connect Secure that has come under active exploitation in the wild. The vulnerability, tracked as CVE202522457 CVSS score 9.0, concerns a case of a stackbased buffer overflow that could be exploited to execute arbitrary code on affected systems. "A stackbased buffer overflow in Ivanti Connect.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers πŸ–‹οΈ

A novice cybercrime actor has been observed leveraging the services of a Russian bulletproof hosting BPH provider called Proton66 to facilitate their operations. The findings come from DomainTools, which detected the activity after it discovered a phony website named cybersecureprotect.com hosted on Proton66 that masqueraded as an antivirus service. The threat intelligence firm said it.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CERT-UA Reports Cyberattacks Targeting Ukrainian State Systems with WRECKSTEEL Malware πŸ–‹οΈ

The Computer Emergency Response Team of Ukraine CERTUA has revealed that no less than three cyber attacks were recorded against state administration bodies and critical infrastructure facilities in the country with an aim to steal sensitive data. The campaign, the agency said, involved the use of compromised email accounts to send phishing messages containing links pointing to legitimate.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Flaw in Apache Parquet Allows Remote Attackers to Execute Arbitrary Code πŸ–‹οΈ

A maximum severity security vulnerability has been disclosed in Apache Parquet's Java Library that, if successfully exploited, could allow a remote attacker to execute arbitrary code on susceptible instances. Apache Parquet is a free and opensource columnar data file format that's designed for efficient data processing and retrieval, providing support for complex data, highperformance.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware πŸ–‹οΈ

Microsoft is warning of several phishing campaigns that are leveraging taxrelated themes to deploy malware and steal credentials. "These campaigns notably use redirection methods such as URL shorteners and QR codes contained in malicious attachments and abuse legitimate services like filehosting services and business profile pages to avoid detection," Microsoft said in a report shared with The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware πŸ–‹οΈ

The North Korean threat actors behind Contagious Interview have adopted the increasingly popular ClickFix social engineering tactic to lure job seekers in the cryptocurrency sector to deliver a previously undocumented Gobased backdoor called GolangGhost on Windows and macOS systems. The new activity, assessed to be a continuation of the campaign, has been codenamed ClickFake Interview by.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI Threats Are Evolving Fast β€” Learn Practical Defense Tactics in this Expert Webinar πŸ–‹οΈ

The rules have changed. Again. Artificial intelligence is bringing powerful new tools to businesses. But it's also giving cybercriminals smarter ways to attack. Theyre moving quicker, targeting more precisely, and slipping past old defenses without being noticed. And here's the harsh truth If your security strategy hasnt evolved with AI in mind, youre already behind. But youre not aloneand.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock πŸ–‹οΈ

AI holds the promise to revolutionize all sectors of enterprisefrom fraud detection and content personalization to customer service and security operations. Yet, despite its potential, implementation often stalls behind a wall of security, legal, and compliance hurdles. Imagine this alltoofamiliar scenario A CISO wants to deploy an AIdriven SOC to handle the overwhelming volume of security.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a new vulnerability impacting Google's Quick Share data transfer utility for Windows that could be exploited to achieve a denialofservice DoS or send arbitrary files to a target's device without their approval. The flaw, tracked as CVE202410668 CVSS score 5.9, is a bypass for two of the 10 shortcomings that were originally disclosed by.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices πŸ–‹οΈ

Counterfeit versions of popular smartphone models that are sold at reduced prices have been found to be preloaded with a modified version of an Android malware called Triada. "More than 2,600 users in different countries have encountered the new version of Triada, the majority in Russia," Kaspersky said in a report. The infections were recorded between March 13 and 27, 2025.  Triada is the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cyber Agencies Warn of Fast Flux Threat Bypassing Network Defenses πŸ“”

A joint cybersecurity advisory warns organizations globally about the defense gap in detecting and blocking fast flux techniques, which are exploited for malicious activities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Tj-actions Supply Chain Attack Traced Back to Single GitHub Token Compromise πŸ“”

The threat actors initially attempted to compromise projects associated with the Coinbase cryptocurrency exchange, said Palo Alto Networks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Chinese State Hackers Exploiting Newly Disclosed Ivanti Flaw πŸ“”

Mandiant warned that Chinese espionage actor UNC5221 is actively exploiting a critical Ivanti vulnerability, which can lead to remote code execution.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Major Online Platform for Child Exploitation Dismantled πŸ“”

An international law enforcement operation has shut down Kidflix, a platform for child sexual exploitation with 1.8m registered users.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CrushFTP Vulnerability Exploited Following Disclosure Issues πŸ“”

A critical authentication bypass flaw in CrushFTP is under active exploitation following a mishandled disclosure process.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Amateur Hacker Leverages Russian Bulletproof Hosting Server to Spread Malware πŸ“”

The cybercriminal uses the service of Proton66, an infamous Russianbased bulletproof hosting provider, to deploy malware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Sensitive Data Breached in Highline Schools Ransomware Incident πŸ“”

Highline Public Schools revealed that sensitive personal, financial and medical data was accessed by ransomware attackers during the September 2024 incident.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over Half of Attacks on Electricity and Water Firms Are Destructive πŸ“”

Semperis claims 62 of water and electricity providers were hit by cyberattacks in the past year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Nearly 600 Phishing Domains Emerge Following Bybit Heist πŸ“”

BforeAI researchers discover 596 suspicious Bybitthemed domains designed to defraud visitors.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… Ransomware Attack Levels Remain High as Major Change Looms πŸ¦…

Cyble Ransomware Attack Levels Remain High as Major Change Looms " dataimagecaption"Cyble Ransomware Attack Levels Remain High as Major Change Looms " datamediumfile"httpscyble.comwpcontentuploads202504CybleBlogsRansomwareAttacksRaaS300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202504CybleBlogsRansomwareAttacksRaaS.jpg" title"Ransomware Attack Levels Remain High as Major Change Looms 1" March saw notable events, including a potential change at the top of the ransomware world, persistently high attacks, and the emergence of new groups. March 2025 ended on a surprising note when the onionbased data leak site DLS of RansomHub the largest ransomware group over the last year went offline, fueling speculation of a possible takeover. A few days later, rival DragonForce claimed ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity