πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ CISA and FBI Warn Fast Flux is Powering Resilient Malware, C2, and Phishing Networks πŸ–‹οΈ

Cybersecurity agencies from Australia, Canada, New Zealand, and the United States have published a joint advisory about the risks associated with a technique called fast flux that has been adopted by threat actors to obscure a commandandcontrol C2 channel. "'Fast flux' is a technique used to obfuscate the locations of malicious servers through rapidly changing Domain Name System DNS.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA and FBI Warn Fast Flux is Powering Resilient Malware, C2, and Phishing Networks πŸ–‹οΈ

Cybersecurity agencies from Australia, Canada, New Zealand, and the United States have published a joint advisory about the risks associated with a technique called fast flux that has been adopted by threat actors to obscure a commandandcontrol C2 channel. "'Fast flux' is a technique used to obfuscate the locations of malicious servers through rapidly changing Domain Name System DNS.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Darknet’s Xanthorox AI Offers Customizable Tools for Hackers πŸ“”

Xanthorox AI, a selfcontained system for offensive cyber operations, has emerged on darknet forums.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Darknet’s Xanthorox AI Offers Customizable Tools for Hackers πŸ“”

Xanthorox AI, a selfcontained system for offensive cyber operations, has emerged on darknet forums.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Darknet’s Xanthorox AI Offers Customizable Tools for Hackers πŸ“”

Xanthorox AI, a selfcontained system for offensive cyber operations, has emerged on darknet forums.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Scattered Spider's 'King Bob' Pleads Guilty to Cyber Charges πŸ•΅οΈβ€β™‚οΈ

The 20yearold was arrested in January 2024 alongside four other group members who carried out related cybercriminal acts, earning them similar charges.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: VPN Exploits, Oracle's Silent Breach, ClickFix Surge and More πŸ–‹οΈ

Today, every unpatched system, leaked password, and overlooked plugin is a doorway for attackers. Supply chains stretch deep into the code we trust, and malware hides not just in shady apps but in job offers, hardware, and cloud services we rely on every day. Hackers dont need sophisticated exploits anymore. Sometimes, your credentials and a little social engineering are enough. This week,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Darknet’s Xanthorox AI Offers Customizable Tools for Hackers πŸ“”

Xanthorox AI, a selfcontained system for offensive cyber operations, has emerged on darknet forums.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: VPN Exploits, Oracle's Silent Breach, ClickFix Surge and More πŸ–‹οΈ

Today, every unpatched system, leaked password, and overlooked plugin is a doorway for attackers. Supply chains stretch deep into the code we trust, and malware hides not just in shady apps but in job offers, hardware, and cloud services we rely on every day. Hackers dont need sophisticated exploits anymore. Sometimes, your credentials and a little social engineering are enough. This week,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: VPN Exploits, Oracle's Silent Breach, ClickFix Surge and More πŸ–‹οΈ

Today, every unpatched system, leaked password, and overlooked plugin is a doorway for attackers. Supply chains stretch deep into the code we trust, and malware hides not just in shady apps but in job offers, hardware, and cloud services we rely on every day. Hackers dont need sophisticated exploits anymore. Sometimes, your credentials and a little social engineering are enough. This week,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ PoisonSeed Exploits CRM Accounts to Launch Cryptocurrency Seed Phrase Poisoning Attacks πŸ–‹οΈ

A malicious campaign dubbed PoisonSeed is leveraging compromised credentials associated with customer relationship management CRM tools and bulk email providers to send spam messages containing cryptocurrency seed phrases in an attempt to drain victims' digital wallets. "Recipients of the bulk spam are targeted with a cryptocurrency seed phrase poisoning attack," Silent Push said in an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Vodafone Urges UK Cybersecurity Policy Reforms as SME Cyber-Attack Costs Reach Β£3.4bn πŸ“”

Vodafone Business has urged the UK government to implement policy changes, including improvements to the Cyber Essentials scheme and tax incentives for cybersecurity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Vodafone Urges UK Cybersecurity Policy Reforms as SME Cyber-Attack Costs Reach Β£3.4bn πŸ“”

Vodafone Business has urged the UK government to implement policy changes, including improvements to the Cyber Essentials scheme and tax incentives for cybersecurity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Autonomous, GenAI-Driven Attacker Platform Enters the Chat πŸ•΅οΈβ€β™‚οΈ

"Xanthorox AI" provides a modular GenAI platform for offensive cyberattacks, which supplies a modelagnostic, onestop shop for developing a range of cybercriminal operations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Vodafone Urges UK Cybersecurity Policy Reforms as SME Cyber-Attack Costs Reach Β£3.4bn πŸ“”

Vodafone Business has urged the UK government to implement policy changes, including improvements to the Cyber Essentials scheme and tax incentives for cybersecurity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Vodafone Urges UK Cybersecurity Policy Reforms as SME Cyber-Attack Costs Reach Β£3.4bn πŸ“”

Vodafone Business has urged the UK government to implement policy changes, including improvements to the Cyber Essentials scheme and tax incentives for cybersecurity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Security Theater: Vanity Metrics Keep You Busy - and Exposed πŸ–‹οΈ

After more than 25 years of mitigating risks, ensuring compliance, and building robust security programs for Fortune 500 companies, Ive learned that looking busy isnt the same as being secure.  Its an easy trap for busy cybersecurity leaders to fall into. We rely on metrics that tell a story of the tremendous efforts were expending how many vulnerabilities we patched, how fast we.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Security Theater: Vanity Metrics Keep You Busy - and Exposed πŸ–‹οΈ

After more than 25 years of mitigating risks, ensuring compliance, and building robust security programs for Fortune 500 companies, Ive learned that looking busy isnt the same as being secure.  Its an easy trap for busy cybersecurity leaders to fall into. We rely on metrics that tell a story of the tremendous efforts were expending how many vulnerabilities we patched, how fast we.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Government Backs Britain’s First Cyber Seed Fund, Worth Β£50m πŸ“”

Osney Capitals new fund is the first to focus exclusively on earlystage UK cybersecurity.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Security Theater: Vanity Metrics Keep You Busy - and Exposed πŸ–‹οΈ

After more than 25 years of mitigating risks, ensuring compliance, and building robust security programs for Fortune 500 companies, Ive learned that looking busy isnt the same as being secure.  Its an easy trap for busy cybersecurity leaders to fall into. We rely on metrics that tell a story of the tremendous efforts were expending how many vulnerabilities we patched, how fast we.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign πŸ“”

Security researchers from ExtensionTotal have found nine malicious extensions in Visual Studio Code, Microsofts lightweight sourcecode editor.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity