πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Google Cloud: China Achieves β€œCyber Superpower” Status πŸ“”

Google Clouds Sandra Joyce said that Chinese state actors advanced techniques and ability to stay undetected pose huge challenges.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ PlayPraetor Reloaded: CTM360 Uncovers a Play Masquerading Party πŸ–‹οΈ

Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a much larger extent of the ongoing Play Praetor campaign. What started with 6000 URLs of a very specific banking attack has now grown to 16,000 with multiple variants. This research is ongoing, and much more is expected to be discovered in the coming days.  As before, all the newly discovered play.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes πŸ–‹οΈ

Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE20240132 CVSS score 9.0 is a TimeofCheck TimeofUse TOCTOU vulnerability that could lead to a container escape attack and allow for.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Cloud: China Achieves β€œCyber Superpower” Status πŸ“”

Google Clouds Sandra Joyce said that Chinese state actors advanced techniques and ability to stay undetected pose huge challenges.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🀬1
πŸ“” Google Cloud: China Achieves β€œCyber Superpower” Status πŸ“”

Google Clouds Sandra Joyce said that Chinese state actors advanced techniques and ability to stay undetected pose huge challenges.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Cloud: China Achieves β€œCyber Superpower” Status πŸ“”

Google Clouds Sandra Joyce said that Chinese state actors advanced techniques and ability to stay undetected pose huge challenges.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes πŸ–‹οΈ

Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE20240132 CVSS score 9.0 is a TimeofCheck TimeofUse TOCTOU vulnerability that could lead to a container escape attack and allow for.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Cloud: China Achieves β€œCyber Superpower” Status πŸ“”

Google Clouds Sandra Joyce said that Chinese state actors advanced techniques and ability to stay undetected pose huge challenges.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Cloud: CISOs Demand Simplified Security Tools Amid Growing Tech Complexity πŸ“”

Google Cloud announced a number of security products designed to reduce complexity for security leaders.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Cloud: CISOs Demand Simplified Security Tools Amid Growing Tech Complexity πŸ“”

Google Cloud announced a number of security products designed to reduce complexity for security leaders.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Google Cloud: CISOs Demand Simplified Security Tools Amid Growing Tech Complexity πŸ“”

Google Cloud announced a number of security products designed to reduce complexity for security leaders.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto Addresses πŸ–‹οΈ

Threat actors are continuing to upload malicious packages to the npm registry so as to tamper with alreadyinstalled local versions of legitimate libraries and execute malicious code in what's seen as a sneakier attempt to stage a software supply chain attack. The newly discovered package, named pdftooffice, masquerades as a utility for converting PDF files to Microsoft Word documents. But, in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024 πŸ“”

The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight decline in incidents compared to 2024 report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024 πŸ“”

The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight decline in incidents compared to 2024 report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SpyNote Malware Targets Android Users with Fake Google Play Pages πŸ“”

A new Android malware campaign uses fake Google Play pages to distribute the SpyNote Trojan.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ PlayPraetor Reloaded: CTM360 Uncovers a Play Masquerading Party πŸ–‹οΈ

Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a much larger extent of the ongoing Play Praetor campaign. What started with 6000 URLs of a very specific banking attack has now grown to 16,000 with multiple variants. This research is ongoing, and much more is expected to be discovered in the coming days.  As before, all the newly discovered play.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SpyNote Malware Targets Android Users with Fake Google Play Pages πŸ“”

A new Android malware campaign uses fake Google Play pages to distribute the SpyNote Trojan.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024 πŸ“”

The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight decline in incidents compared to 2024 report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Bigger salaries, more burnout: Is the CISO role in crisis? πŸ“’

CISOs are more stressed than ever before but why is this and what can be done?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ β€˜Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers πŸ“’

Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than 25.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber attacks against UK firms dropped by 10% last year, but experts say don't get complacent πŸ“’

More than fourinten UK businesses were hit by a cyber attack last year, marking a decrease on the year prior but security experts have warned enterprises to still remain vigilant.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity