πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
24.8K subscribers
88.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ The NCSC wants developers to get serious on software security πŸ“’

The NCSC's new Software Security Code of Practice has been welcomed by cyber professionals as a positive step toward bolstering software supply chain security.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How Security Has Changed the Hacker Marketplace πŸ•΅οΈβ€β™‚οΈ

Your ultimate goal shouldn't be security perfection it should be making exploitation of your organization unprofitable.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials πŸ–‹οΈ

Cybersecurity researchers are warning of a new campaign that's targeting Portuguesespeaking users in Brazil with trial versions of commercial remote monitoring and management RMM software since January 2025. "The spam message uses the Brazilian electronic invoice system, NFe, as a lure to entice users into clicking hyperlinks and accessing malicious content hosted in Dropbox," Cisco Talos.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business πŸ–‹οΈ

AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences. But with this power comes new risks like data leaks, identity theft, and malicious misuse. If your company is exploring or already using AI agents, you need to ask Are they secure? AI agents work with sensitive data and make realtime decisions. If theyre not.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Beyond Vulnerability Management – Can You CVE What I CVE? πŸ–‹οΈ

The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity is limited and patching everything immediately is a struggle. Our Vulnerability Operation Center VOC dataset analysis identified 1,337,797 unique findings security issues across 68,500 unique customer assets. 32,585 of them were distinct.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials πŸ–‹οΈ

Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version of Cursor, a popular artificial intelligence AIpowered source code editor. "Disguised as developer tools offering 'the cheapest Cursor API,' these packages steal user credentials, fetch an encrypted payload from threat actorcontrolled infrastructure, overwrite Cursor's.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android πŸ–‹οΈ

Google on Thursday announced it's rolling out new artificial intelligence AIpowered countermeasures to combat scams across Chrome, Search, and Android. The tech giant said it will begin using Gemini Nano, its ondevice large language model LLM, to improve Safe Browsing in Chrome 137 on desktops. "The ondevice approach provides instant insight on risky websites and allows us to offer.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ“” Google Deploys On-Device AI to Thwart Scams on Chrome and Android πŸ“”

The tech giant plans to leverage its Gemini Nano LLM ondevice to enhance scam detection on Chrome.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ“” UN Launches New Cyber-Attack Assessment Framework πŸ“”

The UNIDR Intrusion Path is designed to provide a simplified view of cyberthreats and security across the network perimeter.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FBI Sounds Alarm on Rogue Cybercrime Services Targeting Obsolete Routers πŸ“”

The FBI has detected indicators of malware targeting endoflife routers associated with Anyproxy and 5Socks proxy services.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” PowerSchool Admits Ransom Payment Amid Fresh Extortion Demands πŸ“”

PowerSchool said its customers had been hit by new extortion demands using data stolen in a previous attack, despite attacker claims the data had been deleted.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” US Federal Agencies Alert on β€œUnsophisticated” OT Cyber-Threats πŸ“”

Cyber incidents targeting OT in US critical infrastructure have prompted renewed federal action.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Finance Manager 🌊

The post Finance Manager appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… India Experiences Surge in Hacktivist Group Activity Amid Military Tensions πŸ¦…

Cyble India Experiences Surge in Hacktivist Group Activity Amid Military Tensions " dataimagecaption"Cyble India Experiences Surge in Hacktivist Group Activity Amid Military Tensions " datamediumfile"httpscyble.comwpcontentuploads202505CybleBlogsHactivistsGroup300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202505CybleBlogsHactivistsGroup1024x512.jpg" title"India Experiences Surge in Hacktivist Group Activity Amid Military Tensions 1" More than 40 hacktivist groups conducted coordinated cyberattacks against India following the April 22 terror attack in Pahalgam in the Indian state of Jammu and Kashmir, which in turn prompted India to respond with targeted strikes aimed at alleged terrorist infrastructure across the border and the PakistanOccupied Kashmir region PoK. Cyble Re...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Insight Partners Data Breach: Bigger Impact Than Anticipated πŸ•΅οΈβ€β™‚οΈ

The investigation is ongoing, but the VC giant intends to inform affected customers on a rolling basis as more of the breach details come to light.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Commvault: Vulnerability Patch Works as Intended πŸ•΅οΈβ€β™‚οΈ

The security researcher who questioned the effectiveness of a patch for recently disclosed bug in Commvault Command Center did not test patched version, the company says.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. - Dutch Operation πŸ–‹οΈ

A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network that's powered by thousands of infected Internet of Things IoT and endoflife EoL devices, enlisting them into a botnet for providing anonymity to malicious actors. In conjunction with the domain seizure, Russian nationals, Alexey Viktorovich Chertkov, 37, Kirill Vladimirovich.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities πŸ–‹οΈ

The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a crossplatform malware called OtterCookie with capabilities to steal credentials from web browsers and other files. NTT Security Holdings, which detailed the new findings, said the attackers have "actively and continuously" updated the malware, introducing versions v3 and v4 in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cyber Then & Now: Inside a 2-Decade Industry Evolution πŸ•΅οΈβ€β™‚οΈ

On Dark Reading's 19year anniversary, EditorinChief Kelly Jackson Higgins stops by Informa TechTarget's RSAC 2025 Broadcast Alley studio to discuss how things have changed since the early days of breaking Windows and browsers, lingering challenges, and what's next beyond AI.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ LockBit Ransomware Gang Hacked, Operations Data Leaked πŸ•΅οΈβ€β™‚οΈ

Exposed data from LockBit's affiliate panel includes Bitcoin addresses, private chats with victim organizations, and user information such as credentials.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection πŸ–‹οΈ

Google has agreed to pay the U.S. state of Texas nearly 1.4 billion to settle two lawsuits that accused the company of tracking users' personal location and maintaining their facial recognition data without consent. The 1.375 billion payment dwarfs the fines the tech giant has paid to settle similar lawsuits brought by other U.S. states. In November 2022, it paid 391 million to a group of 40.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2