πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Cybersecurity by Design: When Humans Meet Technology πŸ•΅οΈβ€β™‚οΈ

If security tools are challenging to use, people will look for workarounds to get around the restrictions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Thwarts $4bn in Fraud Attempts πŸ“”

Microsoft has blocked fraud worth 4bn as threat actors ramp up AI use.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Android Phones Pre-Downloaded With Malware Target User Crypto Wallets πŸ•΅οΈβ€β™‚οΈ

The threat actors lace predownloaded applications with malware to steal cryptocurrency by covertly swapping users' wallet addresses with their own.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dogged by Trump, Chris Krebs Resigns From SentinelOne πŸ•΅οΈβ€β™‚οΈ

The president revoked the former CISA director's security clearance, half a decade after Krebs challenged rightwing election disinformation, prompting his eventual resignation.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Android Phones Pre-Downloaded With Malware Target User Crypto Wallets πŸ•΅οΈβ€β™‚οΈ

The threat actors lace predownloaded applications with malware to steal cryptocurrency by covertly swapping users' wallet addresses with their own.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Network Edge Devices the Biggest Entry Point for Attacks on SMBs πŸ“”

Sophos found that compromise of network edge devices, such as VPN appliances, accounted for 30 of incidents impacted SMBs in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Thwarts $4bn in Fraud Attempts πŸ“”

Microsoft has blocked fraud worth 4bn as threat actors ramp up AI use.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Middle East, North Africa Security Spending to Top $3B πŸ•΅οΈβ€β™‚οΈ

Gartner projects IT security spending in the MENA region will continue to increase in 2025, with security services accounting for the most growth.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity by Design: When Humans Meet Technology πŸ•΅οΈβ€β™‚οΈ

If security tools are challenging to use, people will look for workarounds to get around the restrictions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Middle East, North Africa Security Spending to Top $3B πŸ•΅οΈβ€β™‚οΈ

Gartner projects IT security spending in the MENA region will continue to increase in 2025, with security services accounting for the most growth.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Blockchain Offers Security Benefits – But Don't Neglect Your Passwords πŸ–‹οΈ

Blockchain is best known for its use in cryptocurrencies like Bitcoin, but it also holds significant applications for online authentication. As businesses in varying sectors increasingly embrace blockchainbased security tools, could the technology one day replace passwords? How blockchain works  Blockchain is a secure way to maintain, encrypt, and exchange digital records of transactions.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ GPS Spoofing Attacks Spike in Middle East, Southeast Asia πŸ•΅οΈβ€β™‚οΈ

An Indian disasterrelief flight delivering aid is the latest airtraffic incident, as attacks increase in the Middle East and Myanmar and along the IndiaPakistan border.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ GPS Spoofing Attacks Spike in Middle East, Southeast Asia πŸ•΅οΈβ€β™‚οΈ

An Indian disasterrelief flight delivering aid is the latest airtraffic incident, as attacks increase in the Middle East and Myanmar and along the IndiaPakistan border.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Network Edge Devices the Biggest Entry Point for Attacks on SMBs πŸ“”

Sophos found that compromise of network edge devices, such as VPN appliances, accounted for 30 of incidents impacted SMBs in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Network Edge Devices the Biggest Entry Point for Attacks on SMBs πŸ“”

Sophos found that compromise of network edge devices, such as VPN appliances, accounted for 30 of incidents impacted SMBs in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 β€˜No AI Agents are Allowed.’ EU Bans Use of AI Assistants in Virtual Meetings 🦿

In a presentation delivered this month by the European Commission, a meeting etiquette slide stated No AI Agents are allowed.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Apple Patches Two Zero-Days Used in β€˜Extremely Sophisticated’ Attacks 🦿

Find out the specifics of these iOS and macOS vulnerabilities, as well as which Apple devices were impacted.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Network Security at the Edge for AI-ready Enterprise 🦿

The widespread use of AI, particularly generative AI, in modern businesses creates new network security risks for complex enterprise workloads across various locations.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] AI Is Already Inside Your SaaS Stack β€” Learn How to Prevent the Next Silent Breach πŸ–‹οΈ

Your employees didnt mean to expose sensitive data. They just wanted to move faster. So they used ChatGPT to summarize a deal. Uploaded a spreadsheet to an AIenhanced tool. Integrated a chatbot into Salesforce. No big dealuntil it is. If this sounds familiar, you're not alone. Most security teams are already behind in detecting how AI tools are quietly reshaping their SaaS environments. And.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT πŸ–‹οΈ

Cybersecurity researchers are warning of continued risks posed by a distributed denialofservice DDoS malware known as XorDDoS, with 71.3 percent of the attacks between November 2023 and February 2025 targeting the United States. "From 2020 to 2023, the XorDDoS trojan has increased significantly in prevalence," Cisco Talos researcher Joey Chen said in a Thursday analysis. .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CVE-2025-24054 Under Active Attackβ€”Steals NTLM Credentials on File Download πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday added a mediumseverity security flaw impacting Microsoft Windows to its Known Exploited Vulnerabilities KEV catalog, following reports of active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE202524054 CVSS score 6.5, is a Windows New Technology LAN Manager NTLM hash disclosure.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity