πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Nearly 600 Phishing Domains Emerge Following Bybit Heist πŸ“”

BforeAI researchers discover 596 suspicious Bybitthemed domains designed to defraud visitors.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… Ransomware Attack Levels Remain High as Major Change Looms πŸ¦…

Cyble Ransomware Attack Levels Remain High as Major Change Looms " dataimagecaption"Cyble Ransomware Attack Levels Remain High as Major Change Looms " datamediumfile"httpscyble.comwpcontentuploads202504CybleBlogsRansomwareAttacksRaaS300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202504CybleBlogsRansomwareAttacksRaaS.jpg" title"Ransomware Attack Levels Remain High as Major Change Looms 1" March saw notable events, including a potential change at the top of the ransomware world, persistently high attacks, and the emergence of new groups. March 2025 ended on a surprising note when the onionbased data leak site DLS of RansomHub the largest ransomware group over the last year went offline, fueling speculation of a possible takeover. A few days later, rival DragonForce claimed ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Medusa Rides Momentum From Ransomware-as-a-Service Pivot πŸ•΅οΈβ€β™‚οΈ

Shifting to a RaaS business model has accelerated the group's growth, and targeting critical industries like healthcare, legal, and manufacturing hasn't hurt either.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Verizon Call Filter API flaw could’ve exposed millions of Americans’ call records πŸ“’

A security flaw in Verizon's Call Filter app couldve allowed threat actors to access details of incoming calls for another user, a security researcher has found.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 DDoS Attacks Now Key Weapons in Geopolitical Conflicts, NETSCOUT Warns 🦿

Hackers now use AI and botnets to launch powerful DDoS attacks, bypassing security and overwhelming servers as law enforcement struggles to keep up.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Minnesota Tribe Struggles After Ransomware Attack πŸ•΅οΈβ€β™‚οΈ

Hotel and casino operations for the Lower Sioux Indians have been canceled or postponed, and the local health center is redirecting those needing medical or dental care.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe β™ŸοΈ

A Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30 years is facing questions about his credentials and an inquiry from the Federal Bureau of Investigation FBI. Legal experts say the inquiry could be grounds to reopen a number of adjudicated cases in which the expert's testimony may have been pivotal.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Gmail Is Not a Secure Way to Send Sensitive Comms: A Friendly Reminder πŸ•΅οΈβ€β™‚οΈ

New endtoend Gmail encryption alone isn't secure enough for an enterprise's most sensitive and prized data, experts say.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ CISA Warns: Old DNS Trick 'Fast Flux' Is Still Thriving πŸ•΅οΈβ€β™‚οΈ

An old DNS switcheroo technique is still helping attackers keep their infrastructure alive. But is it really a pressing issue in 2025?.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… IT Vulnerability Report: VMware, Microsoft Fixes Urged by Cyble πŸ¦…

Cyble IT Vulnerability Report VMware, Microsoft Fixes Urged by Cyble " dataimagecaption"Cyble IT Vulnerability Report VMware, Microsoft Fixes Urged by Cyble " datamediumfile"httpscyble.comwpcontentuploads202504CybleBlogsITVulnerabilityReport300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202504CybleBlogsITVulnerabilityReport.jpg" title"IT Vulnerability Report VMware, Microsoft Fixes Urged by Cyble 1" Overview Cybles vulnerability intelligence unit examined 30 vulnerabilities and 14 dark web exploit claims in recent reports to clients and flagged eight of the vulnerabilities as meriting highpriority attention by security teams. Cyble said the eight vulnerabilities found in products from Microsoft, VMware, Apple, Google, and others can lead to system compromise, data bre...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google’s Sec-Gemini v1 Takes on Hackers & Outperforms Rivals by 11% 🦿

SecGemini v1 has access to realtime cybersecurity data from trusted sources including Google Threat Intelligence, Mandiants attack reports, and the Open Source Vulnerabilities database.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 What Is Cyber Threat Hunting? 🌊

Cyber threat hunting is a proactive approach of searching networks, endpoints, and datasets to uncover hidden cyber threats that have bypassed traditional security measures. Threat hunting in cybersecurity is not just about reacting to alerts its about actively seeking out malicious activities and advanced persistent threats that lurk beneath the surface, potentially causing significant damage The post What Is Cyber Threat Hunting? appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA and FBI Warn Fast Flux is Powering Resilient Malware, C2, and Phishing Networks πŸ–‹οΈ

Cybersecurity agencies from Australia, Canada, New Zealand, and the United States have published a joint advisory about the risks associated with a technique called fast flux that has been adopted by threat actors to obscure a commandandcontrol C2 channel. "'Fast flux' is a technique used to obfuscate the locations of malicious servers through rapidly changing Domain Name System DNS.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign πŸ“”

Security researchers from ExtensionTotal have found nine malicious extensions in Visual Studio Code, Microsofts lightweight sourcecode editor.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign πŸ“”

Security researchers from ExtensionTotal have found nine malicious extensions in Visual Studio Code, Microsofts lightweight sourcecode editor.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign πŸ“”

Security researchers from ExtensionTotal have found nine malicious extensions in Visual Studio Code, Microsofts lightweight sourcecode editor.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: VPN Exploits, Oracle's Silent Breach, ClickFix Surge and More πŸ–‹οΈ

Today, every unpatched system, leaked password, and overlooked plugin is a doorway for attackers. Supply chains stretch deep into the code we trust, and malware hides not just in shady apps but in job offers, hardware, and cloud services we rely on every day. Hackers dont need sophisticated exploits anymore. Sometimes, your credentials and a little social engineering are enough. This week,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Google’s Sec-Gemini v1 Takes on Hackers & Outperforms Rivals by 11% 🦿

SecGemini v1 has access to realtime cybersecurity data from trusted sources including Google Threat Intelligence, Mandiants attack reports, and the Open Source Vulnerabilities database.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign πŸ“”

Security researchers from ExtensionTotal have found nine malicious extensions in Visual Studio Code, Microsofts lightweight sourcecode editor.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 What Is Cyber Threat Hunting? 🌊

Cyber threat hunting is a proactive approach of searching networks, endpoints, and datasets to uncover hidden cyber threats that have bypassed traditional security measures. Threat hunting in cybersecurity is not just about reacting to alerts its about actively seeking out malicious activities and advanced persistent threats that lurk beneath the surface, potentially causing significant damage The post What Is Cyber Threat Hunting? appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ ToddyCat APT Targets ESET Bug to Load Silent Malware πŸ•΅οΈβ€β™‚οΈ

Researchers found the threat actor attempting to use the nowpatched flaw to load and execute a malicious dynamic link library on infected systems.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity