π M&S Grapples with Cyber Incident Affecting In-Store Services π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Marks and Spencer has confirmed that it has been managing a cyber incident for the past few days which affected its contactless payments and click and collect services.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
M&S Grapples with Cyber Incident Affecting In-Store Services
Marks and Spencer has confirmed that it has been managing a cyber incident for the past few days which affected its contactless payments and click and collect services
π Dutch Warn of βWhole of Societyβ Russian Cyber-Threat π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Dutch intelligence report warns of growing Russian aggression with hybrid warfare.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Dutch Warn of βWhole of Societyβ Russian Cyber-Threat
Dutch intelligence report warns of growing Russian aggression with hybrid warfare
π UK Romance Scams Spike 20% as Online Dating Grows π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Barclays found that romance scam victims lost 8000 on average in 2024, a significant increase from the previous year.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
UK Romance Scams Spike 20% as Online Dating Grows
Barclays found that romance scam victims lost Β£8000 on average in 2024, a significant increase from the previous year
π΅οΈββοΈ 'Industrial-Scale' Asian Scam Centers Expand Globally π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The convergence of cybercrime, financial fraud, and organized crime poses a significant threat, especially where these syndicates excel at operating under the radar.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
'Industrial-Scale' Asian Scam Centers Expand Globally
The convergence of cybercrime, financial fraud, and organized crime poses a significant threat, especially where these syndicates excel at operating under the radar.
β€2
ποΈ WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
WhatsApp has introduced an extra layer of privacy called Advanced Chat Privacy that allows users to block participants from sharing the contents of a conversation in traditional chats and groups. "This new setting available in both chats and groups helps prevent others from taking content outside of WhatsApp for when you may want extra privacy," WhatsApp said in a statement. The optional feature.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π2π€1
π’ Hackers are using Zoomβs remote control feature to infect devices with malware π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Security experts have issued an alert over a new social engineering campaign using Zooms remote control features to take over victim devices.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Hackers are using Zoomβs remote control feature to infect devices with malware
The Zoom feature could let threat actors install malware or exfiltrate data
π1
π¦Ώ Google Chrome Keeps Third-Party Cookies Settings, Lets Users βMake an Informed Choiceβ π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Privacy Sandbox, originally pitched as an alternative to crosssite ad tracking, will not show a standalone prompt. Instead, Chrome is readying a different informed choice.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Google Chrome Keeps Third-Party Cookies Settings, Lets Users βMake an Informed Choiceβ
Privacy Sandbox, originally pitched as an alternative to cross-site ad tracking, will not show a standalone prompt. Instead, Chrome is readying a different βinformed choice.β
π€1
ποΈ Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Evolving Healthcare Cybersecurity Landscape Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology OT environments increasingly targeted and the convergence of IT and medical systems creating an expanded attack surface, traditional security approaches are proving inadequate. According to recent statistics, the healthcare sector.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π2
ποΈ Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code execution on affected installations. The vulnerability, tracked as CVE202534028, carries a CVSS score of 9.0 out of a maximum of 10.0. "A critical security vulnerability has been identified in the Command Center installation, allowing remote attackers to execute arbitrary code without.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
π Verizon DBIR: Small Businesses Bearing the Brunt of Ransomware Attacks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
While the Verizon annual report showed that ransomware is rising, it also found that ransom payments are in decline.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Verizon DBIR: Small Businesses Bearing the Brunt of Ransomware Attacks
While the Verizon annual report showed that ransomware is rising, it also found that ransom payments are in decline
π1
π Ransomware Attacks Fall Sharply in March π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
NCC Group found that ransomware attacks fell by 32 in March compared to February, but described this finding as a red herring.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ransomware Attacks Fall Sharply in March
NCC Group found that ransomware attacks fell by 32% in March compared to February, but described this finding as a βred herringβ
π1
π ETSI Unveils New Baseline Requirements for Securing AI π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
ETSIs says new technical specification for securing AI models and systems sets international benchmark.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
ETSI Unveils New Baseline Requirements for Securing AI
ETSIβs says new technical specification for securing AI models and systems sets international benchmark
π1
π Ofcom Lays Down the Law with Child Safety Rules for Tech Giants π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Ofcoms Protection of Children Codes and Guidance lists 40 new child safety measures for tech firms.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Ofcom Lays Down the Law with Child Safety Rules for Tech Giants
Ofcomβs Protection of Children Codes and Guidance lists 40 new child safety measures for tech firms
π1
ποΈ Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The threat actors behind the Darcula phishingasaservice PhaaS platform have released new updates to their cybercrime suite with generative artificial intelligence GenAI capabilities. "This addition lowers the technical barrier for creating phishing pages, enabling less techsavvy criminals to deploy customized scams in minutes," Netcraft said in a new report shared with The Hacker News. ".π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π€1
ποΈ Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have demonstrated a proofofconcept PoC rootkit dubbed Curing that leverages a Linux asynchronous IO mechanism called iouring to bypass traditional system call monitoring. This causes a "major blind spot in Linux runtime security tools," ARMO said. "This mechanism allows a user application to perform various actions without using system calls," the company said in.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ 159 CVEs Exploited in Q1 2025 β 28.3% Within 24 Hours of Disclosure ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
As many as 159 CVE identifiers have been flagged as exploited in the wild in the first quarter of 2025, up from 151 in Q4 2024. "We continue to see vulnerabilities being exploited at a fast pace with 28.3 of vulnerabilities being exploited within 1day of their CVE disclosure," VulnCheck said in a report shared with The Hacker News. This translates to 45 security flaws that have been weaponized.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Highest-Risk Security Flaw Found in Commvault Backup Solutions π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A critical path traversal vulnerability in Commvaults backup and replication solutions has been reported.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Highest-Risk Security Flaw Found in Commvault Backup Solutions
A critical path traversal vulnerability in Commvaultβs backup and replication solutions has been reported
π’ Ransomware attacks are rising β but quiet payouts could mean there's more than actually reported π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Ransomware attacks continue to climb, but they may be even higher than official figures show as companies choose to quietly pay to make such incidents go away.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Ransomware attacks are rising β but quiet payouts could mean there's more than actually reported
FBI report suggests a sharp rise in ransomware attacks, but companies choosing to settle means the problem is even worse than figures suggest
ποΈ Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
At least six organizations in South Korea have been targeted by the prolific North Korealinked Lazarus Group as part of a campaign dubbed Operation SyncHole. The activity targeted South Korea's software, IT, financial, semiconductor manufacturing, and telecommunications industries, according to a report from Kaspersky published today. The earliest evidence of compromise was first detected in.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π¦Ώ Microsoft Resumes Recall Feature Rollout After Privacy Backlash, Adds Security Functions π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Microsoft is expanding the rollout of Recall after months of testing and the addition of new security features.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Microsoft Rolls Recall Feature Out to General Public After Privacy Backlash
Microsoft expanded the rollout of Recall after months of testing and the addition of new security features. Also, two other AI-powered features for Windows are publicly available.
π1
π Blue Shield of California Data Breach Affects 4.7 Million Members π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A misconfigured tracking tool has exposed protected health information of 4.7 million Blue Shield members to Google Ads.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Blue Shield of California Data Breach Affects 4.7 Million Members
A misconfigured tracking tool has exposed protected health information of 4.7 million Blue Shield members to Google Ads
π1