πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024 πŸ“”

The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight decline in incidents compared to 2024 report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024 πŸ“”

The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight decline in incidents compared to 2024 report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SpyNote Malware Targets Android Users with Fake Google Play Pages πŸ“”

A new Android malware campaign uses fake Google Play pages to distribute the SpyNote Trojan.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ PlayPraetor Reloaded: CTM360 Uncovers a Play Masquerading Party πŸ–‹οΈ

Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a much larger extent of the ongoing Play Praetor campaign. What started with 6000 URLs of a very specific banking attack has now grown to 16,000 with multiple variants. This research is ongoing, and much more is expected to be discovered in the coming days.  As before, all the newly discovered play.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SpyNote Malware Targets Android Users with Fake Google Play Pages πŸ“”

A new Android malware campaign uses fake Google Play pages to distribute the SpyNote Trojan.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Over 40% of UK Businesses Faced Cybersecurity Breaches in 2024 πŸ“”

The Cyber Security Breaches Survey 2025 has been released by the UK Home Office and DSIT today, reporting a slight decline in incidents compared to 2024 report.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Bigger salaries, more burnout: Is the CISO role in crisis? πŸ“’

CISOs are more stressed than ever before but why is this and what can be done?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ β€˜Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers πŸ“’

Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than 25.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Cyber attacks against UK firms dropped by 10% last year, but experts say don't get complacent πŸ“’

More than fourinten UK businesses were hit by a cyber attack last year, marking a decrease on the year prior but security experts have warned enterprises to still remain vigilant.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Financial Fraud, With a Third-Party Twist, Dominates Cyber Claims πŸ•΅οΈβ€β™‚οΈ

The most damaging attacks continue to be ransomware, but financial fraud claims are more numerous and both are driven by increasing thirdparty breaches.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Using Third-Party ID Providers Without Losing Zero Trust πŸ•΅οΈβ€β™‚οΈ

With 4.4 billion in worldwide data breach fines in 2024, the cost of not knowing who's walking into your systems is devastating.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Organizations Lack Incident Response Plans, But Answers Are on the Way πŸ•΅οΈβ€β™‚οΈ

Developing strong incident response plans remains an area that requires significant improvement. Here are some shortcomings and how to address them.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 10 Bugs Found in Perplexity AI's Chatbot Android App πŸ•΅οΈβ€β™‚οΈ

Researchers characterize the company's artificial intelligence chatbot as less secure than ChatGPT and even DeepSeek.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Zero-Day in CentreStack File-Sharing Platform Under Attack πŸ•΅οΈβ€β™‚οΈ

Gladinet's platform is widely used among managed service providers, and a critical deserialization flaw could put MSP customers in jeopardy.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ AuthZEN Aims to Harmonize Fractured Authorization Controls πŸ•΅οΈβ€β™‚οΈ

Managing permissions and authorizations across dozens or hundreds of cloud services and platforms poses significant headaches for companies. An open specification aims to change that.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Trump's DoJ Targets Krebs, Revokes SentinelOne Security Clearance πŸ•΅οΈβ€β™‚οΈ

An executive order is targeting former Trump appointees, including former CISA director Chris Krebs and his current coworkers, in the latest in a series of directives against those who dissented against the president and his associates.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ What Should the US Do About Salt Typhoon? πŸ•΅οΈβ€β™‚οΈ

Security experts weigh in on the problem Salt Typhoon and its hacking of telecoms poses against the United States, including what the US should do and how defenders can protect themselves.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Open Source Poisoned Patches Infect Local Software πŸ•΅οΈβ€β™‚οΈ

Malicious packages lurking on open source repositories like npm have become less effective, so cyberattackers are using a new strategy offering "patches" for locally installed programs.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why Data Privacy Isn't the Same as Data Security πŸ•΅οΈβ€β™‚οΈ

Failing to distinguish between data privacy and data security leaves businesses vulnerable to regulatory scrutiny and the kinds of breaches that erode consumer trust overnight.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ•΅οΈβ€β™‚οΈ Threat Actors Use 'Spam Bombing' Technique to Hide Malicious Motives πŸ•΅οΈβ€β™‚οΈ

Darktrace researchers detailed "spam bombing," a technique in which threat actors bombard targets with spam emails as a pretense for activity like social engineering campaigns.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit πŸ–‹οΈ

Fortinet has revealed that threat actors have found a way to maintain readonly access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. The attackers are believed to have leveraged known and nowpatched security flaws, including, but not limited to, CVE202242475, CVE202327997, and CVE202421762. "A threat actor used a known.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity