πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” US Blocks Foreign Governments from Acquiring Citizen Data πŸ“”

The US government has implemented a program that applies export controls on data transactions to certain countries of concern, including China and Russia.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Digital Certificate Lifespans to Fall to 47 Days by 2029 πŸ“”

CABrowser Forum members have voted in favor of shortening TLSSSL certificate lifespans to 47 days.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI Hallucinations Create β€œSlopsquatting” Supply Chain Threat πŸ“”

Experts have warned that threat actors could hijack AI hallucinations in slopsquatting attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… DOGE β€œBig Balls” Ransomware and the False Connection to Edward Coristine πŸ¦…

Cyble DOGE BIG BALLS Ransomware and the False Connection to Edward Coristine " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202504NewCybleBlogs300x150.png" datalargefile"httpscyble.comwpcontentuploads202504NewCybleBlogs1024x512.png" title"DOGE "Big Balls" Ransomware and the False Connection to Edward Coristine 1" Key Takeaways This attack leverages a ZIP file with a deceptive LNK shortcut to silently execute a multistage PowerShellbased infection chain, ensuring stealthy deployment. A vulnerable driver CVE20152291 is exploited through a Bring Your Own Vulnerable Driver BYOVD technique to gain kernellevel readwrite access for privilege escalation. The payload is a customized version of Fog ransomware, branded as "DOGE BIG BALLS Ransomware," reflecting an attemp...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading πŸ–‹οΈ

Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks targeting healthcare and pharmaceutical sectors. "The threat actor leverages fearbased lures delivered via phishing emails, designed to pressure recipients into clicking a malicious link," Morphisec Labs researcher Nadav Lorber said in a report shared with The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese APTs Exploit EDR 'Visibility Gap' for Cyber Espionage πŸ•΅οΈβ€β™‚οΈ

Blind spots in network visibility, including in firewalls, IoT devices, and the cloud, are being exploited by Chinese statebacked threat actors with increasing success, according to new threat intelligence. Here's how experts say you can get eyes on it all.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Fortinet Zero-Day Bug May Lead to Arbitrary Code Execution πŸ•΅οΈβ€β™‚οΈ

A threat actor posted about the zeroday exploit on the same day that Fortinet published a warning about known vulnerabilities under active exploitation.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ AI Code Tools Widely Hallucinate Packages πŸ•΅οΈβ€β™‚οΈ

The hallucination problem is not just pervasive, it is persistent as well, according to new research.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Threat Intel Firm Offers Crypto in Exchange for Dark Web Accounts πŸ•΅οΈβ€β™‚οΈ

Prodaft is currently buying accounts from five Dark Web forums and offers to pay extra for administrator or moderator accounts. The idea is to infiltrate forums to boost its threat intelligence.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Trump Revenge Tour Targets Cyber Leaders, Elections β™ŸοΈ

President Trump last week revoked security clearances for Chris Krebs, the former director of the Cybersecurity and Infrastructure Security Agency CISA who was fired by Trump after declaring the 2020 election the most secure in U.S. history. The White House memo, which also suspended clearances for other security professionals at Krebs's employer SentinelOne, comes as CISA is facing huge funding and staffing cuts.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1🀬1
πŸ–‹οΈ Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability πŸ–‹οΈ

A recently disclosed security flaw in Gladinet CentreStack also impacts its Triofox remote access and collaboration solution, according to Huntress, with seven different organizations compromised to date. Tracked as CVE202530406 CVSS score 9.0, the vulnerability refers to the use of a hardcoded cryptographic key that could expose internetaccessible servers to remote code execution attacks.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Meta Resumes E.U. AI Training Using Public User Data After Regulator Approval πŸ–‹οΈ

Meta has announced that it will begin to train its artificial intelligence AI models using public data shared by adults across its platforms in the European Union, nearly a year after it paused its efforts due to data protection concerns from Irish regulators. "This training will better support millions of people and businesses in Europe, by teaching our generative AI models to better.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISA issues warning in wake of Oracle cloud credentials leak πŸ“’

The security agency has published guidance for enterprises at risk.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NTLM Hash Exploit Targets Poland and Romania Days After Patch πŸ“”

An NTLM hash disclosure spoofing vulnerability that leaks hashes with minimal user interaction has been observed being exploited in the wild.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CVE-2025-24054 Under Active Attackβ€”Steals NTLM Credentials on File Download πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday added a mediumseverity security flaw impacting Microsoft Windows to its Known Exploited Vulnerabilities KEV catalog, following reports of active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE202524054 CVSS score 6.5, is a Windows New Technology LAN Manager NTLM hash disclosure.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NTLM Hash Exploit Targets Poland and Romania Days After Patch πŸ“”

An NTLM hash disclosure spoofing vulnerability that leaks hashes with minimal user interaction has been observed being exploited in the wild.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Android Phones Pre-Downloaded With Malware Target User Crypto Wallets πŸ•΅οΈβ€β™‚οΈ

The threat actors lace predownloaded applications with malware to steal cryptocurrency by covertly swapping users' wallet addresses with their own.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Android Phones Pre-Downloaded With Malware Target User Crypto Wallets πŸ•΅οΈβ€β™‚οΈ

The threat actors lace predownloaded applications with malware to steal cryptocurrency by covertly swapping users' wallet addresses with their own.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISA issues warning in wake of Oracle cloud credentials leak πŸ“’

The security agency has published guidance for enterprises at risk.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Darktrace unveils tailored AI models with a twist for its cybersecurity agent πŸ“’

Darktrace has announced new AI models for its agentic AI security tool, but it's taken a novel approach to tackle hallucinations.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” NTLM Hash Exploit Targets Poland and Romania Days After Patch πŸ“”

An NTLM hash disclosure spoofing vulnerability that leaks hashes with minimal user interaction has been observed being exploited in the wild.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity