πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Dogged by Trump, Chris Krebs Resigns From SentinelOne πŸ•΅οΈβ€β™‚οΈ

The president revoked the former CISA director's security clearance, half a decade after Krebs challenged rightwing election disinformation, prompting his eventual resignation.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Android Phones Pre-Downloaded With Malware Target User Crypto Wallets πŸ•΅οΈβ€β™‚οΈ

The threat actors lace predownloaded applications with malware to steal cryptocurrency by covertly swapping users' wallet addresses with their own.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Network Edge Devices the Biggest Entry Point for Attacks on SMBs πŸ“”

Sophos found that compromise of network edge devices, such as VPN appliances, accounted for 30 of incidents impacted SMBs in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft Thwarts $4bn in Fraud Attempts πŸ“”

Microsoft has blocked fraud worth 4bn as threat actors ramp up AI use.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Middle East, North Africa Security Spending to Top $3B πŸ•΅οΈβ€β™‚οΈ

Gartner projects IT security spending in the MENA region will continue to increase in 2025, with security services accounting for the most growth.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cybersecurity by Design: When Humans Meet Technology πŸ•΅οΈβ€β™‚οΈ

If security tools are challenging to use, people will look for workarounds to get around the restrictions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Middle East, North Africa Security Spending to Top $3B πŸ•΅οΈβ€β™‚οΈ

Gartner projects IT security spending in the MENA region will continue to increase in 2025, with security services accounting for the most growth.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Blockchain Offers Security Benefits – But Don't Neglect Your Passwords πŸ–‹οΈ

Blockchain is best known for its use in cryptocurrencies like Bitcoin, but it also holds significant applications for online authentication. As businesses in varying sectors increasingly embrace blockchainbased security tools, could the technology one day replace passwords? How blockchain works  Blockchain is a secure way to maintain, encrypt, and exchange digital records of transactions.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ GPS Spoofing Attacks Spike in Middle East, Southeast Asia πŸ•΅οΈβ€β™‚οΈ

An Indian disasterrelief flight delivering aid is the latest airtraffic incident, as attacks increase in the Middle East and Myanmar and along the IndiaPakistan border.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ GPS Spoofing Attacks Spike in Middle East, Southeast Asia πŸ•΅οΈβ€β™‚οΈ

An Indian disasterrelief flight delivering aid is the latest airtraffic incident, as attacks increase in the Middle East and Myanmar and along the IndiaPakistan border.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Network Edge Devices the Biggest Entry Point for Attacks on SMBs πŸ“”

Sophos found that compromise of network edge devices, such as VPN appliances, accounted for 30 of incidents impacted SMBs in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Network Edge Devices the Biggest Entry Point for Attacks on SMBs πŸ“”

Sophos found that compromise of network edge devices, such as VPN appliances, accounted for 30 of incidents impacted SMBs in 2024.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 β€˜No AI Agents are Allowed.’ EU Bans Use of AI Assistants in Virtual Meetings 🦿

In a presentation delivered this month by the European Commission, a meeting etiquette slide stated No AI Agents are allowed.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Apple Patches Two Zero-Days Used in β€˜Extremely Sophisticated’ Attacks 🦿

Find out the specifics of these iOS and macOS vulnerabilities, as well as which Apple devices were impacted.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Network Security at the Edge for AI-ready Enterprise 🦿

The widespread use of AI, particularly generative AI, in modern businesses creates new network security risks for complex enterprise workloads across various locations.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] AI Is Already Inside Your SaaS Stack β€” Learn How to Prevent the Next Silent Breach πŸ–‹οΈ

Your employees didnt mean to expose sensitive data. They just wanted to move faster. So they used ChatGPT to summarize a deal. Uploaded a spreadsheet to an AIenhanced tool. Integrated a chatbot into Salesforce. No big dealuntil it is. If this sounds familiar, you're not alone. Most security teams are already behind in detecting how AI tools are quietly reshaping their SaaS environments. And.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT πŸ–‹οΈ

Cybersecurity researchers are warning of continued risks posed by a distributed denialofservice DDoS malware known as XorDDoS, with 71.3 percent of the attacks between November 2023 and February 2025 targeting the United States. "From 2020 to 2023, the XorDDoS trojan has increased significantly in prevalence," Cisco Talos researcher Joey Chen said in a Thursday analysis. .

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CVE-2025-24054 Under Active Attackβ€”Steals NTLM Credentials on File Download πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday added a mediumseverity security flaw impacting Microsoft Windows to its Known Exploited Vulnerabilities KEV catalog, following reports of active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE202524054 CVSS score 6.5, is a Windows New Technology LAN Manager NTLM hash disclosure.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates πŸ–‹οΈ

The Chinalinked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in Myanmar with previously unreported tooling, highlighting continued effort by the threat actors to increase the sophistication and effectiveness of their malware. This includes updated versions of a known backdoor called TONESHELL, as well as a new lateral movement.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns πŸ–‹οΈ

Multiple statesponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering tactic to deploy malware over a threemonth period from late 2024 through the beginning of 2025. The phishing campaigns adopting the strategy have been attributed to clusters tracked as TA427 aka Kimsuky, TA450 aka MuddyWater,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Artificial Intelligence – What's all the fuss? πŸ–‹οΈ

Talking about AI Definitions Artificial Intelligence AI AI refers to the simulation of human intelligence in machines, enabling them to perform tasks that typically require human intelligence, such as decisionmaking and problemsolving. AI is the broadest concept in this field, encompassing various technologies and methodologies, including Machine Learning ML and Deep Learning. Machine.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity