πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Verizon DBIR: Small Businesses Bearing the Brunt of Ransomware Attacks πŸ“”

While the Verizon annual report showed that ransomware is rising, it also found that ransom payments are in decline.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Ransomware Attacks Fall Sharply in March πŸ“”

NCC Group found that ransomware attacks fell by 32 in March compared to February, but described this finding as a red herring.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” ETSI Unveils New Baseline Requirements for Securing AI πŸ“”

ETSIs says new technical specification for securing AI models and systems sets international benchmark.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Ofcom Lays Down the Law with Child Safety Rules for Tech Giants πŸ“”

Ofcoms Protection of Children Codes and Guidance lists 40 new child safety measures for tech firms.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
πŸ–‹οΈ Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals πŸ–‹οΈ

The threat actors behind the Darcula phishingasaservice PhaaS platform have released new updates to their cybercrime suite with generative artificial intelligence GenAI capabilities. "This addition lowers the technical barrier for creating phishing pages, enabling less techsavvy criminals to deploy customized scams in minutes," Netcraft said in a new report shared with The Hacker News. ".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ–‹οΈ Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools πŸ–‹οΈ

Cybersecurity researchers have demonstrated a proofofconcept PoC rootkit dubbed Curing that leverages a Linux asynchronous IO mechanism called iouring to bypass traditional system call monitoring. This causes a "major blind spot in Linux runtime security tools," ARMO said. "This mechanism allows a user application to perform various actions without using system calls," the company said in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 159 CVEs Exploited in Q1 2025 β€” 28.3% Within 24 Hours of Disclosure πŸ–‹οΈ

As many as 159 CVE identifiers have been flagged as exploited in the wild in the first quarter of 2025, up from 151 in Q4 2024. "We continue to see vulnerabilities being exploited at a fast pace with 28.3 of vulnerabilities being exploited within 1day of their CVE disclosure," VulnCheck said in a report shared with The Hacker News. This translates to 45 security flaws that have been weaponized.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Highest-Risk Security Flaw Found in Commvault Backup Solutions πŸ“”

A critical path traversal vulnerability in Commvaults backup and replication solutions has been reported.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Ransomware attacks are rising β€” but quiet payouts could mean there's more than actually reported πŸ“’

Ransomware attacks continue to climb, but they may be even higher than official figures show as companies choose to quietly pay to make such incidents go away.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware πŸ–‹οΈ

At least six organizations in South Korea have been targeted by the prolific North Korealinked Lazarus Group as part of a campaign dubbed Operation SyncHole. The activity targeted South Korea's software, IT, financial, semiconductor manufacturing, and telecommunications industries, according to a report from Kaspersky published today. The earliest evidence of compromise was first detected in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Microsoft Resumes Recall Feature Rollout After Privacy Backlash, Adds Security Functions 🦿

Microsoft is expanding the rollout of Recall after months of testing and the addition of new security features.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
πŸ“” Blue Shield of California Data Breach Affects 4.7 Million Members πŸ“”

A misconfigured tracking tool has exposed protected health information of 4.7 million Blue Shield members to Google Ads.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
πŸ•΅οΈβ€β™‚οΈ Navigating Regulatory Shifts & AI Risks πŸ•΅οΈβ€β™‚οΈ

By proactively embracing emerging trends around encryption, AI security, and platform consolidation, organizations can turn compliance burdens into competitive advantage.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ•΅οΈβ€β™‚οΈ FBI: Cybercrime Losses Rocket to $16.6B in 2024 πŸ•΅οΈβ€β™‚οΈ

The losses are 33 higher than the year before, with phishing leading the way as the mostreported cybercrime last year, and ransomware was the top threat to critical infrastructure, according to the FBI Internet Crime Report.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ELENOR-corp Ransomware Targets Healthcare Sector πŸ“”

ELENORcorp ransomware, a new version of Mimic, is targeting healthcare organizations using advanced capabilities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What to look out for at RSAC Conference 2025 πŸ“’

Convincing attendees that AI can revolutionize security will be the first point of order at next weeks RSA Conference but traditional threats will be a constant undercurrent.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'SessionShark' ToolKit Evades Microsoft Office 365 MFA πŸ•΅οΈβ€β™‚οΈ

The creators of the toolkit are advertising it as an educational and ethical resource, but what it promises to provide users if purchased indicates it's anything but.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Max-Severity Commvault Bug Alarms Researchers πŸ•΅οΈβ€β™‚οΈ

Though already patched, the vulnerability is especially problematic because of the highly privileged access it offers to businesscritical systems, sensitive data, and backups for attackers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ NFC-Powered Android Malware Enables Instant Cash-Outs πŸ•΅οΈβ€β™‚οΈ

Researchers at security vendor Cleafy detailed a malware known as "SuperCard X" that uses the NFC reader on a victim's own phone to steal credit card funds instantly.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ“’ Criminals target APIs as web attacks skyrocket globally πŸ“’

More than a third of web attacks target APIs as AI expands attack surfaces and brings new security challenges.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ M&S suspends online sales as 'cyber incident' continues πŸ“’

Marks Spencer MS has informed customers that all online and app sales have been suspended as the high street retailer battles a cyber incident.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity