πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures πŸ–‹οΈ

The Russian statesponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER. "While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed initialstage tool.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems πŸ–‹οΈ

Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as a popular Telegram bot library but harbor SSH backdoors and data exfiltration capabilities. The packages in question are listed below nodetelegramutils 132 downloads nodetelegrambotsapi 82 downloads nodetelegramutil 73 downloads According to supply chain.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures πŸ–‹οΈ

The Russian statesponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER. "While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed initialstage tool.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Verizon's DBIR Reveals 34% Jump in Vulnerability Exploitation πŸ“”

After a 180 rise in last years report, the exploitation of vulnerabilities continues to grow, now accounting for 20 of all breaches.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Claims Steady Progress Revamping Security Culture πŸ•΅οΈβ€β™‚οΈ

In the latest Secure Future Initiative Progress Report, Microsoft described efforts to rebuild its security culture, including making security a core priority for employees during performance reviews and launching a new "Secure by Design UX Toolkit.".

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FBI Reveals β€œStaggering” $16.6bn Lost to Cybercrime in 2024 πŸ“”

The FBI found that cybercrime losses climbed by 33 compared to 2023, driven by tactics like investment fraud and BEC.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Malware-free attacks: The threat to businesses πŸ“’

Malwarefree attacks are a growing risk what can businesses do to mitigate them?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ State-sponsored cyber groups are flocking to the 'ClickFix' social engineering technique πŸ“’

Statesponsored hackers from North Korea, Iran, and Russia are exploiting the ClickFix social engineering technique for the first time and to great success.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Microsoft Claims Steady Progress Revamping Security Culture πŸ•΅οΈβ€β™‚οΈ

In the latest Secure Future Initiative Progress Report, Microsoft described efforts to rebuild its security culture, including making security a core priority for employees during performance reviews and launching a new "Secure by Design UX Toolkit.".

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ransomware Gangs Innovate With New Affiliate Models πŸ•΅οΈβ€β™‚οΈ

Secureworks research shows two ransomware operators offering multiple business models with ransomwareasaservice, mimicking the structures and processes of legitimate businesses.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Popular British Retailer Marks & Spencer Addresses 'Cyber Incident' πŸ•΅οΈβ€β™‚οΈ

MS has launched an investigation and said some customer operations are impacted.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ North Korean Operatives Use Deepfakes in IT Job Interviews πŸ•΅οΈβ€β™‚οΈ

Use of synthetic identities by malicious employment candidates is yet another way statesponsored actors are trying to game the hiring process and infiltrate Western organizations.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Japan Warns on Unauthorized Stock Trading via Stolen Credentials πŸ•΅οΈβ€β™‚οΈ

Attackers are using credentials stolen via phishing websites that purport to be legitimate securities company homepages, duping victims and selling their stocks before they realize they've been hacked.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Kubernetes Pods Are Inheriting Too Many Permissions πŸ•΅οΈβ€β™‚οΈ

Scalable, effective and best of all, free securing Kubernetes workload identity cuts cyberrisk without adding infrastructure, according to new research from SANS.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Foundations of a Resilient Cyber Workforce πŸ•΅οΈβ€β™‚οΈ

In a world where insider threats, nationstate adversaries, and technological evolution create new challenges, companies must prioritize transparency, ethical leadership, and a culture rooted in trust.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Zambia's Updated Cyber Laws Prompt Surveillance Warnings πŸ•΅οΈβ€β™‚οΈ

Critics which include the US embassy in Zambia contend the justsigned Cyber Security Act and the Cyber Crime Act allow suppression of dissent and too much concentration of power.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Verizon: Edge Bugs Soar, Ransoms Lag, SMBs Bedeviled πŸ•΅οΈβ€β™‚οΈ

The cybersecurity landscape confounded expectations in 2024, as anticipated threats and risk didn't materialize and less widely touted attack scenarios shot up.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ DOGE Worker’s Code Supports NLRB Whistleblower β™ŸοΈ

A whistleblower at the National Labor Relations Board NLRB alleged last week that denizens of Elon Musk's Department of Government Efficiency DOGE siphoned gigabytes of data from the agency's sensitive case files in early March. The whistleblower said accounts created for DOGE at the NLRB downloaded three code repositories from GitHub. Further investigation into one of those code bundles shows it is remarkably similar to a program published in January 2025 by Marko Elez, a 25yearold DOGE employee who has worked at a number of Musk's companies.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack πŸ–‹οΈ

Multiple threat activity clusters with ties to North Korea aka Democratic People's Republic of Korea or DPRK have been linked to attacks targeting organizations and individuals in the Web3 and cryptocurrency space. "The focus on Web3 and cryptocurrency appears to be primarily financially motivated due to the heavy sanctions that have been placed on North Korea," Googleowned Mandiant said in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign πŸ–‹οΈ

The Irannexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part of a jobthemed social engineering campaign aimed at Israel in October 2024. Googleowned Mandiant described UNC2428 as a threat actor aligned with Iran that engages in cyber espionagerelated operations. The intrusion set is said to have distributed the malware through a "complex.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices πŸ–‹οΈ

Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distributes Android spyware under the guise of the Alpine Quest mapping software. "The attackers hide this trojan inside modified Alpine Quest mapping software and distribute it in various ways, including through one of the Russian Android app catalogs," Doctor Web said in an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity