πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” NTLM Hash Exploit Targets Poland and Romania Days After Patch πŸ“”

An NTLM hash disclosure spoofing vulnerability that leaks hashes with minimal user interaction has been observed being exploited in the wild.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Senators Urge Cyber-Threat Sharing Law Extension Before Deadline πŸ“”

Bipartisan support grows in Congress to extend Cybersecurity Information Sharing Act for 10 years.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Veracode Pricing 2025: Ultimate Guide for Security Products 🌊

Veracode offers a full suite of application security tools to help businesses protect their software from cyber threats. In 2025, Veracodes pricing starts around 15,000 per year for basic packages and can exceed 100,000 annually for full enterprise solutions. With flexible plans for small businesses and large enterprises alike, Veracode makes it easier to secure The post Veracode Pricing 2025 Ultimate Guide for Security Products appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Rapid7 Pricing 2025: Ultimate Guide for Security Products 🌊

Rapid7 delivers a full suite of security solutions to help organizations detect, manage, and respond to cyber threats. As of 2025, Rapid7s productssuch as InsightVM, InsightIDR, and Managed Threat Completestart at around 2,000 to 5,000 per year for smaller environments, while enterprise deployments can range from 30,000 to over 150,000 annually, depending on the size, The post Rapid7 Pricing 2025 Ultimate Guide for Security Products appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Social Engineering Exposes Flaws in Ransomware Response Plan β€” Time for an Update 🌊

Lets be frankno one wakes up thinking, Todays the day I get phished. But thats exactly what keeps happeningand groups like BlackBasta ransomware group operating as ransomwareasaservice RaaS know how to pull it off. Slow, sneaky, and painfully effective if your ransomware response plan isnt ready. At UnderDefense, we see this play out far too The post Social Engineering Exposes Flaws in Ransomware Response Plan Time for an Update appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 How Full-Spectrum Security with SIEM and SOC Helped Avoid a Potential $650K Loss 🌊

Our clients company issues business licenses and hosts events. Before reaching out to us, they... The post How FullSpectrum Security with SIEM and SOC Helped Avoid a Potential 650K Loss appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader πŸ–‹οΈ

A new multistage attack has been observed delivering malware families like Agent Tesla variants, Remcos RAT, and XLoader. "Attackers increasingly rely on such complex delivery mechanisms to evade detection, bypass traditional sandboxes, and ensure successful payload delivery and execution," Palo Alto Networks Unit 42 researcher Saqib Khanzada said in a technical writeup of the campaign. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ If Boards Don't Fix OT Security, Regulators Will πŸ•΅οΈβ€β™‚οΈ

Around the world, governments are setting higherbar regulations with clear corporate accountability for breaches on the belief organizations won't drive up security maturity for operational technology unless they're made to.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures πŸ–‹οΈ

The Russian statesponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER. "While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed initialstage tool.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems πŸ–‹οΈ

Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as a popular Telegram bot library but harbor SSH backdoors and data exfiltration capabilities. The packages in question are listed below nodetelegramutils 132 downloads nodetelegrambotsapi 82 downloads nodetelegramutil 73 downloads According to supply chain.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures πŸ–‹οΈ

The Russian statesponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER. "While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed initialstage tool.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Verizon's DBIR Reveals 34% Jump in Vulnerability Exploitation πŸ“”

After a 180 rise in last years report, the exploitation of vulnerabilities continues to grow, now accounting for 20 of all breaches.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Claims Steady Progress Revamping Security Culture πŸ•΅οΈβ€β™‚οΈ

In the latest Secure Future Initiative Progress Report, Microsoft described efforts to rebuild its security culture, including making security a core priority for employees during performance reviews and launching a new "Secure by Design UX Toolkit.".

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FBI Reveals β€œStaggering” $16.6bn Lost to Cybercrime in 2024 πŸ“”

The FBI found that cybercrime losses climbed by 33 compared to 2023, driven by tactics like investment fraud and BEC.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Malware-free attacks: The threat to businesses πŸ“’

Malwarefree attacks are a growing risk what can businesses do to mitigate them?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ State-sponsored cyber groups are flocking to the 'ClickFix' social engineering technique πŸ“’

Statesponsored hackers from North Korea, Iran, and Russia are exploiting the ClickFix social engineering technique for the first time and to great success.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Claims Steady Progress Revamping Security Culture πŸ•΅οΈβ€β™‚οΈ

In the latest Secure Future Initiative Progress Report, Microsoft described efforts to rebuild its security culture, including making security a core priority for employees during performance reviews and launching a new "Secure by Design UX Toolkit.".

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ransomware Gangs Innovate With New Affiliate Models πŸ•΅οΈβ€β™‚οΈ

Secureworks research shows two ransomware operators offering multiple business models with ransomwareasaservice, mimicking the structures and processes of legitimate businesses.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Popular British Retailer Marks & Spencer Addresses 'Cyber Incident' πŸ•΅οΈβ€β™‚οΈ

MS has launched an investigation and said some customer operations are impacted.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ North Korean Operatives Use Deepfakes in IT Job Interviews πŸ•΅οΈβ€β™‚οΈ

Use of synthetic identities by malicious employment candidates is yet another way statesponsored actors are trying to game the hiring process and infiltrate Western organizations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Japan Warns on Unauthorized Stock Trading via Stolen Credentials πŸ•΅οΈβ€β™‚οΈ

Attackers are using credentials stolen via phishing websites that purport to be legitimate securities company homepages, duping victims and selling their stocks before they realize they've been hacked.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity