πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🌊 How Full-Spectrum Security with SIEM and SOC Helped Avoid a Potential $650K Loss 🌊

Our clients company issues business licenses and hosts events. Before reaching out to us, they... The post How FullSpectrum Security with SIEM and SOC Helped Avoid a Potential 650K Loss appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader πŸ–‹οΈ

A new multistage attack has been observed delivering malware families like Agent Tesla variants, Remcos RAT, and XLoader. "Attackers increasingly rely on such complex delivery mechanisms to evade detection, bypass traditional sandboxes, and ensure successful payload delivery and execution," Palo Alto Networks Unit 42 researcher Saqib Khanzada said in a technical writeup of the campaign. The.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ If Boards Don't Fix OT Security, Regulators Will πŸ•΅οΈβ€β™‚οΈ

Around the world, governments are setting higherbar regulations with clear corporate accountability for breaches on the belief organizations won't drive up security maturity for operational technology unless they're made to.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures πŸ–‹οΈ

The Russian statesponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER. "While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed initialstage tool.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems πŸ–‹οΈ

Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as a popular Telegram bot library but harbor SSH backdoors and data exfiltration capabilities. The packages in question are listed below nodetelegramutils 132 downloads nodetelegrambotsapi 82 downloads nodetelegramutil 73 downloads According to supply chain.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures πŸ–‹οΈ

The Russian statesponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER. "While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed initialstage tool.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Verizon's DBIR Reveals 34% Jump in Vulnerability Exploitation πŸ“”

After a 180 rise in last years report, the exploitation of vulnerabilities continues to grow, now accounting for 20 of all breaches.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Claims Steady Progress Revamping Security Culture πŸ•΅οΈβ€β™‚οΈ

In the latest Secure Future Initiative Progress Report, Microsoft described efforts to rebuild its security culture, including making security a core priority for employees during performance reviews and launching a new "Secure by Design UX Toolkit.".

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FBI Reveals β€œStaggering” $16.6bn Lost to Cybercrime in 2024 πŸ“”

The FBI found that cybercrime losses climbed by 33 compared to 2023, driven by tactics like investment fraud and BEC.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Malware-free attacks: The threat to businesses πŸ“’

Malwarefree attacks are a growing risk what can businesses do to mitigate them?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ State-sponsored cyber groups are flocking to the 'ClickFix' social engineering technique πŸ“’

Statesponsored hackers from North Korea, Iran, and Russia are exploiting the ClickFix social engineering technique for the first time and to great success.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Claims Steady Progress Revamping Security Culture πŸ•΅οΈβ€β™‚οΈ

In the latest Secure Future Initiative Progress Report, Microsoft described efforts to rebuild its security culture, including making security a core priority for employees during performance reviews and launching a new "Secure by Design UX Toolkit.".

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ransomware Gangs Innovate With New Affiliate Models πŸ•΅οΈβ€β™‚οΈ

Secureworks research shows two ransomware operators offering multiple business models with ransomwareasaservice, mimicking the structures and processes of legitimate businesses.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Popular British Retailer Marks & Spencer Addresses 'Cyber Incident' πŸ•΅οΈβ€β™‚οΈ

MS has launched an investigation and said some customer operations are impacted.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ North Korean Operatives Use Deepfakes in IT Job Interviews πŸ•΅οΈβ€β™‚οΈ

Use of synthetic identities by malicious employment candidates is yet another way statesponsored actors are trying to game the hiring process and infiltrate Western organizations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Japan Warns on Unauthorized Stock Trading via Stolen Credentials πŸ•΅οΈβ€β™‚οΈ

Attackers are using credentials stolen via phishing websites that purport to be legitimate securities company homepages, duping victims and selling their stocks before they realize they've been hacked.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Kubernetes Pods Are Inheriting Too Many Permissions πŸ•΅οΈβ€β™‚οΈ

Scalable, effective and best of all, free securing Kubernetes workload identity cuts cyberrisk without adding infrastructure, according to new research from SANS.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Foundations of a Resilient Cyber Workforce πŸ•΅οΈβ€β™‚οΈ

In a world where insider threats, nationstate adversaries, and technological evolution create new challenges, companies must prioritize transparency, ethical leadership, and a culture rooted in trust.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Zambia's Updated Cyber Laws Prompt Surveillance Warnings πŸ•΅οΈβ€β™‚οΈ

Critics which include the US embassy in Zambia contend the justsigned Cyber Security Act and the Cyber Crime Act allow suppression of dissent and too much concentration of power.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Verizon: Edge Bugs Soar, Ransoms Lag, SMBs Bedeviled πŸ•΅οΈβ€β™‚οΈ

The cybersecurity landscape confounded expectations in 2024, as anticipated threats and risk didn't materialize and less widely touted attack scenarios shot up.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ DOGE Worker’s Code Supports NLRB Whistleblower β™ŸοΈ

A whistleblower at the National Labor Relations Board NLRB alleged last week that denizens of Elon Musk's Department of Government Efficiency DOGE siphoned gigabytes of data from the agency's sensitive case files in early March. The whistleblower said accounts created for DOGE at the NLRB downloaded three code repositories from GitHub. Further investigation into one of those code bundles shows it is remarkably similar to a program published in January 2025 by Marko Elez, a 25yearold DOGE employee who has worked at a number of Musk's companies.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity