πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Half of Firms Stall Digital Projects as Cyber Warfare Risk Surges πŸ“”

Armis survey reveals that the growing threat of nationstate cyberattacks is disrupting digital transformation.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Warns of CrushFTP Vulnerability Exploitation in the Wild πŸ“”

The US Cybersecurity and Infrastructure Security Agency CISA has added CVE202531161 to its Known Exploited Vulnerabilities KEV catalog.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Boards Urged to Follow New Cyber Code of Practice πŸ“”

The British government has launched a new code of practice designed to boost corporate cyber governance.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 What Is EDR (Endpoint Detection and Response)? 🌊

Endpoint detection and Response EDR is a cybersecurity technology that provides continuous endpoint monitoring to detect, investigate, and respond to threats. EDR solutions empower security teams to quickly identify, understand, and mitigate risks by providing realtime visibility, automated threat containment, and detailed insights into the entire attack lifecycle.  How Does EDR Work? EDR software acts The post What Is EDR Endpoint Detection and Response? appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Releases April Android Update to Address Two Zero-Days πŸ“”

Googles latest Android update fixes 62 flaws, including two zerodays previously used in limited targeted attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 2 Android Zero-Day Bugs Under Active Exploit πŸ•΅οΈβ€β™‚οΈ

Neither security issue requires user interaction and one of the vulnerabilities was used to unlock a student activist's device in an attempt to install spyware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Amazon EC2 SSM Agent Flaw Patched After Privilege Escalation via Path Traversal πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a nowpatched security flaw in the Amazon EC2 Simple Systems Manager SSM Agent that, if successfully exploited, could permit an attacker to achieve privilege escalation and code execution. The vulnerability could permit an attacker to create directories in unintended locations on the filesystem, execute arbitrary scripts with root privileges,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listings πŸ–‹οΈ

Threat actors have been observed distributing malicious payloads such as cryptocurrency miner and clipper malware via SourceForge, a popular software hosting service, under the guise of cracked versions of legitimate applications like Microsoft Office. "One such project, officepackage, on the main website sourceforge.net, appears harmless enough, containing Microsoft Office addins copied from a.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Change Flaw πŸ–‹οΈ

Fortinet has released security updates to address a critical security flaw impacting FortiSwitch that could permit an attacker to make unauthorized password changes. The vulnerability, tracked as CVE202448887, carries a CVSS score of 9.3 out of a maximum of 10.0. "An unverified password change vulnerability CWE620 in FortiSwitch GUI may allow a remote unauthenticated attacker to modify.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 2 Android Zero-Day Bugs Under Active Exploit πŸ•΅οΈβ€β™‚οΈ

Neither security issue requires user interaction, and one of the vulnerabilities was used to unlock a student activist's device in an attempt to install spyware.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ UK Orgs Pull Back Digital Projects With Looming Threat of Cyberwarfare πŸ•΅οΈβ€β™‚οΈ

Artificial intelligence poses a significant concern when it comes to nationstate cyberthreats and AI's ability to supercharge attacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Google Cloud: China Achieves β€œCyber Superpower” Status πŸ“”

Google Clouds Sandra Joyce said that Chinese state actors advanced techniques and ability to stay undetected pose huge challenges.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… ICS Vulnerability Report: Energy, Manufacturing Device Fixes Urged by Cyble πŸ¦…

ICS Vulnerability Report " dataimagecaption"ICS Vulnerability Report " datamediumfile"httpscyble.comwpcontentuploads202504ICSVulnerabilityReport300x150.png" datalargefile"httpscyble.comwpcontentuploads202504ICSVulnerabilityReport1024x512.png" title"ICS Vulnerability Report Energy, Manufacturing Device Fixes Urged by Cyble  1" Overview The Cyble report, part of the latest ICS Vulnerability Report, examined 70 ICS, Operational Technology OT, and Supervisory Control and Data Acquisition SCADA vulnerabilities identified in 16 recent advisories issued by the U.S. Cybersecurity and Infrastructure Security Agency CISA. Cyble highlighted several critical industrial control system ICS vulnerabilities in recent reports to clients, with the most severe vulnerabilities reaching 9.8 to 9.9 ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… ICS Vulnerability Report: Energy, Manufacturing Device Fixes Urged by Cyble πŸ¦…

ICS Vulnerability Report " dataimagecaption"ICS Vulnerability Report " datamediumfile"httpscyble.comwpcontentuploads202504ICSVulnerabilityReport300x150.png" datalargefile"httpscyble.comwpcontentuploads202504ICSVulnerabilityReport1024x512.png" title"ICS Vulnerability Report Energy, Manufacturing Device Fixes Urged by Cyble  1" Overview The Cyble report, part of the latest ICS Vulnerability Report, examined 70 ICS, Operational Technology OT, and Supervisory Control and Data Acquisition SCADA vulnerabilities identified in 16 recent advisories issued by the U.S. Cybersecurity and Infrastructure Security Agency CISA. Cyble highlighted several critical industrial control system ICS vulnerabilities in recent reports to clients, with the most severe vulnerabilities reaching 9.8 to 9.9 ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Can VPNs Be Tracked by the Police? 🦿

VPNs are popular due to the fact they add security and privacy to what are otherwise fairly open WiFi and public internet channels. But can VPNs be tracked by the police?.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Cloud: CISOs Demand Simplified Security Tools Amid Growing Tech Complexity πŸ“”

Google Cloud announced a number of security products designed to reduce complexity for security leaders.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024 πŸ“”

The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight decline in incidents compared to 2024 report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Seized database helps Europol snare botnet customers in β€˜Operation Endgame’ follow-up sting πŸ“’

Europol has detained several people believed to be involved in a botnet operation as part of a followup to a major takedown last year.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Seized database helps Europol snare botnet customers in β€˜Operation Endgame’ follow-up sting πŸ“’

Europol has detained several people believed to be involved in a botnet operation as part of a followup to a major takedown last year.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SpyNote Malware Targets Android Users with Fake Google Play Pages πŸ“”

A new Android malware campaign uses fake Google Play pages to distribute the SpyNote Trojan.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Cloud: China Achieves β€œCyber Superpower” Status πŸ“”

Google Clouds Sandra Joyce said that Chinese state actors advanced techniques and ability to stay undetected pose huge challenges.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity