πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
24.8K subscribers
88.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases πŸ–‹οΈ

Cybersecurity researchers have exposed what they say is an "industrialscale, global cryptocurrency phishing operation" engineered to steal digital assets from cryptocurrency wallets for several years. The campaign has been codenamed FreeDrain by threat intelligence firms SentinelOne and Validin. "FreeDrain uses SEO manipulation, freetier web services like gitbook.io, webflow.io, and github.io.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Security Tools Alone Don't Protect You β€” Control Effectiveness Does πŸ–‹οΈ

61 of security leaders reported suffering a breach due to failed or misconfigured controls over the past 12 months. This is despite having an average of 43 cybersecurity tools in place. This massive rate of security failure is clearly not a security investment problem. It is a configuration problem. Organizations are beginning to understand that a security control installed or deployed is not.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root πŸ–‹οΈ

SonicWall has released patches to address three security flaws affecting SMA 100 Secure Mobile Access SMA appliances that could be fashioned to result in remote code execution. The vulnerabilities are listed below CVE202532819 CVSS score 8.8 A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures πŸ–‹οΈ

Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign observed in November 2024. "NETXLOADER is a new .NETbased loader that plays a critical role in cyber attacks," Trend Micro researchers Jacob Santos, Raymart Yambot, John Rainier Navato, Sarah Pearl.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware πŸ–‹οΈ

The nationstate threat actor known as MirrorFace has been observed deploying malware dubbed ROAMINGMOUSE as part of a cyber espionage campaign directed against government agencies and public institutions in Japan and Taiwan. The activity, detected by Trend Micro in March 2025, involved the use of spearphishing lures to deliver an updated version of a backdoor called ANEL. "The ANEL file from.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware πŸ–‹οΈ

The Russialinked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as part of an espionagefocused campaign using ClickFixlike social engineering lures. "LOSTKEYS is capable of stealing files from a hardcoded list of extensions and directories, along with sending system information and running processes to the attacker," the Google Threat.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT πŸ–‹οΈ

Cisco has released software fixes to address a maximumseverity security flaw in its IOS XE Wireless Controller that could enable an unauthenticated, remote attacker to upload arbitrary files to a susceptible system. The vulnerability, tracked as CVE202520188, has been rated 10.0 on the CVSS scoring system. "This vulnerability is due to the presence of a hardcoded JSON Web Token JWT on an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Russian Group Launches LOSTKEYS Malware in Attacks πŸ“”

New LOSTKEYS malware has been identified and linked to COLDRIVER by GTIG, stealing files and system data in targeted attacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” LockBit Ransomware Hacked, Insider Secrets Exposed πŸ“”

The data dump will likely shed light on LockBits recent activity and help law enforcement trace cryptocurrency transactions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Just 5% of Enterprises Have Deployed Quantum-Safe Encryption πŸ“”

DigiCert survey finds only 5 of global businesses are using postquantum cryptography.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Cyber Essentials Certification Numbers Falling Short πŸ“”

The UK government is set to prioritize increasing the number of UK organizations who are Cyber Essentials certified over the coming year.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Launches New Cybersecurity Assessment Initiatives to Drive Secure by Design πŸ“”

The UK government unveiled two new assessment schemes to boost confidence in the security of products and services during CYBERUK.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Confusion Reigns as Threat Actors Exploit Samsung MagicInfo Flaw πŸ“”

Researchers spot inthewild exploits of Samsung MagicInfo despite recent patch.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2025: Combating Deepfake Threats at the Age of AI Agents πŸ“”

Organizations can start defending against deepfakes now, before efficient detectors are available.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Hacker Finds New Technique to Bypass SentinelOne EDR Solution πŸ“”

Security researchers at Aon have discovered a threat actor who bypassed SentinelOne EDR protection to deploy Babuk ransomware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell πŸ–‹οΈ

A Chinalinked unnamed threat actor dubbed Chaya004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver. Forescout Vedere Labs, in a report published today, said it uncovered a malicious infrastructure likely associated with the hacking group weaponizing CVE202531324 CVSS score 10.0 since April 29, 2025. CVE202531324 refers to a critical SAP NetWeaver flaw.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ LockBit ransomware group falls victim to hackers itself πŸ“’

A data leak has revealed negotiations with victims, along with Bitcoin wallet addresses, affiliate accounts and details of attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ AI-powered banking fraud on the rise – but financial institutions are fighting back πŸ“’

Banks are increasingly using AI to combat scams, but say that the need for good data management can make progress slow.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The NCSC wants developers to get serious on software security πŸ“’

The NCSC's new Software Security Code of Practice has been welcomed by cyber professionals as a positive step toward bolstering software supply chain security.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How Security Has Changed the Hacker Marketplace πŸ•΅οΈβ€β™‚οΈ

Your ultimate goal shouldn't be security perfection it should be making exploitation of your organization unprofitable.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials πŸ–‹οΈ

Cybersecurity researchers are warning of a new campaign that's targeting Portuguesespeaking users in Brazil with trial versions of commercial remote monitoring and management RMM software since January 2025. "The spam message uses the Brazilian electronic invoice system, NFe, as a lure to entice users into clicking hyperlinks and accessing malicious content hosted in Dropbox," Cisco Talos.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1