πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Navigating Regulatory Shifts & AI Risks πŸ•΅οΈβ€β™‚οΈ

By proactively embracing emerging trends around encryption, AI security, and platform consolidation, organizations can turn compliance burdens into competitive advantage.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ•΅οΈβ€β™‚οΈ FBI: Cybercrime Losses Rocket to $16.6B in 2024 πŸ•΅οΈβ€β™‚οΈ

The losses are 33 higher than the year before, with phishing leading the way as the mostreported cybercrime last year, and ransomware was the top threat to critical infrastructure, according to the FBI Internet Crime Report.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ELENOR-corp Ransomware Targets Healthcare Sector πŸ“”

ELENORcorp ransomware, a new version of Mimic, is targeting healthcare organizations using advanced capabilities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ What to look out for at RSAC Conference 2025 πŸ“’

Convincing attendees that AI can revolutionize security will be the first point of order at next weeks RSA Conference but traditional threats will be a constant undercurrent.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'SessionShark' ToolKit Evades Microsoft Office 365 MFA πŸ•΅οΈβ€β™‚οΈ

The creators of the toolkit are advertising it as an educational and ethical resource, but what it promises to provide users if purchased indicates it's anything but.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Max-Severity Commvault Bug Alarms Researchers πŸ•΅οΈβ€β™‚οΈ

Though already patched, the vulnerability is especially problematic because of the highly privileged access it offers to businesscritical systems, sensitive data, and backups for attackers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ NFC-Powered Android Malware Enables Instant Cash-Outs πŸ•΅οΈβ€β™‚οΈ

Researchers at security vendor Cleafy detailed a malware known as "SuperCard X" that uses the NFC reader on a victim's own phone to steal credit card funds instantly.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ“’ Criminals target APIs as web attacks skyrocket globally πŸ“’

More than a third of web attacks target APIs as AI expands attack surfaces and brings new security challenges.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ M&S suspends online sales as 'cyber incident' continues πŸ“’

Marks Spencer MS has informed customers that all online and app sales have been suspended as the high street retailer battles a cyber incident.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Westcon-Comstor unveils new managed SOC solution for Cisco partners πŸ“’

Powered by Cisco XDR, the new offering will enable partners to tap into new revenue streams, the company said.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ April rundown: MITRE frights and Microsoft launches Recall (again) πŸ“’

As CISA delivered an eleventhhour reprieve for the CVE database, AWS reportedly began to pause some data center leases.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ More than 5 million Americans just had their personal information exposed in the Yale New Haven Health data breach – and lawsuits are already rolling in πŸ“’

A data breach at Yale New Haven Health has exposed data belonging to millions of people and lawsuits have already been filed.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Healthcare organizations are turning a blind eye to phishing attacks πŸ“’

A survey reveals that most attacks go unreported, putting patient data at risk.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How Organizations Can Leverage Cyber Insurance Effectively πŸ•΅οΈβ€β™‚οΈ

By focusing on prevention, education, and risk transfer through insurance, organizations especially SMEs can protect themselves from the rapidly escalating threats of cyberattacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Vehicles Face 45% More Attacks, 4 Times More Hackers πŸ•΅οΈβ€β™‚οΈ

Two kinds of attacks are in high gear ransomware attacks against OEMs and compromised electric vehicle chargers, according to data from Q1 2025.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Phishing Kit Darcula Gets Lethal AI Upgrade πŸ•΅οΈβ€β™‚οΈ

Recently added artificial intelligence capabilities on the Chineselanguage Darcula phishingasaservice platform make phishing attacks easy for even the least technical hackers.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 5 Most Common Security Attack Methods in 2024: Mandiant’s M-Trends Report 🦿

Mandiant, which was acquired by Google Cloud in 2022, paints a picture of global cyber threats from last year in order to help readers be better prepared this year.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 AI Experts Warn Against OpenAI’s For-Profit Pivot: β€˜Safeguards Could Vanish Overnight’ 🦿

OpenAIs possible restructuring to a forprofit model is receiving pushback from former staff, Nobel Laureates, and AI pioneers.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ–‹οΈ North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures πŸ–‹οΈ

North Korealinked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. "In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industryBlockNovas LLC blocknovas. com, Angeloper Agency angeloper.com, and SoftGlide LLC softglide.coto spread.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel Framework πŸ–‹οΈ

Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution.  "The exploitation is likely tied to either a previously disclosed vulnerability like CVE20179844 or an unreported remote file inclusion RFI issue," ReliaQuest said in a report published this week. The cybersecurity.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Why NHIs Are Security's Most Dangerous Blind Spot πŸ–‹οΈ

When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface is a growing threat that does not involve human credentials at all, as we witness the exponential growth of NonHuman Identities NHIs.  At the top of mind when NHIs are mentioned, most security teams immediately think of Service Accounts.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity