πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
24.8K subscribers
88.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Commvault: Vulnerability Patch Works as Intended πŸ•΅οΈβ€β™‚οΈ

The security researcher who questioned the effectiveness of a patch for recently disclosed bug in Commvault Command Center did not test patched version, the company says.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. - Dutch Operation πŸ–‹οΈ

A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network that's powered by thousands of infected Internet of Things IoT and endoflife EoL devices, enlisting them into a botnet for providing anonymity to malicious actors. In conjunction with the domain seizure, Russian nationals, Alexey Viktorovich Chertkov, 37, Kirill Vladimirovich.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities πŸ–‹οΈ

The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a crossplatform malware called OtterCookie with capabilities to steal credentials from web browsers and other files. NTT Security Holdings, which detailed the new findings, said the attackers have "actively and continuously" updated the malware, introducing versions v3 and v4 in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cyber Then & Now: Inside a 2-Decade Industry Evolution πŸ•΅οΈβ€β™‚οΈ

On Dark Reading's 19year anniversary, EditorinChief Kelly Jackson Higgins stops by Informa TechTarget's RSAC 2025 Broadcast Alley studio to discuss how things have changed since the early days of breaking Windows and browsers, lingering challenges, and what's next beyond AI.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ LockBit Ransomware Gang Hacked, Operations Data Leaked πŸ•΅οΈβ€β™‚οΈ

Exposed data from LockBit's affiliate panel includes Bitcoin addresses, private chats with victim organizations, and user information such as credentials.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection πŸ–‹οΈ

Google has agreed to pay the U.S. state of Texas nearly 1.4 billion to settle two lawsuits that accused the company of tracking users' personal location and maintaining their facial recognition data without consent. The 1.375 billion payment dwarfs the fines the tech giant has paid to settle similar lawsuits brought by other U.S. states. In November 2022, it paid 391 million to a group of 40.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ–‹οΈ Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data πŸ–‹οΈ

Germany's Federal Criminal Police Office aka Bundeskriminalamt or BKA has seized the online infrastructure and shutdown linked to the eXch cryptocurrency exchange over allegations of money laundering and operating a criminal trading platform. The operation was carried out on April 30, 2025, authorities said, adding they also confiscated 8 terabytes worth of data and cryptocurrency assets.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸš€ Catching a phish with many faces πŸš€

Heres a brief dive into the murky waters of shapeshifting attacks that leverage dedicated phishing kits to autogenerate customized login pages on the fly.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ FBI takes down botnet exploiting aging routers πŸ“’

Organizations warned they should replace potentially affected devices.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ FBI takes down botnet exploiting aging routers πŸ“’

Organizations warned they should replace potentially affected devices.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ MITRE’s near miss: Lessons learned for security and vulnerability management πŸ“’

Cybersecurity leaders can use recent CVE database worries as inspiration to better protect themselves.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams πŸ–‹οΈ

What do a source code editor, a smart billboard, and a web server have in common? Theyve all become launchpads for attacksbecause cybercriminals are rethinking what counts as infrastructure. Instead of chasing highvalue targets directly, threat actors are now quietly taking over the overlooked outdated software, unpatched IoT devices, and opensource packages. It's not just cleverits.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Persistence Problem: Why Exposed Credentials Remain Unfixedβ€”and How to Change That πŸ–‹οΈ

Detecting leaked credentials is only half the battle. The real challengeand often the neglected half of the equationis what happens after detection. New research from GitGuardian's State of Secrets Sprawl 2025 report reveals a disturbing trend the vast majority of exposed company secrets discovered in public repositories remain valid for years after detection, creating an expanding attack.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures πŸ–‹οΈ

Threat actors have been observed leveraging fake artificial intelligence AIpowered tools as a lure to entice users into downloading an information stealer malware dubbed Noodlophile. "Instead of relying on traditional phishing or cracked software sites, they build convincing AIthemed platforms often advertised via legitimatelooking Facebook groups and viral social media campaigns,".

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” EU Launches Free Entry-Level Cyber Training Program πŸ“”

SheCyber training program is focused on improving the representation of women and other underrepresented groups in the cybersecurity industry.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” FreeDrain Phishing Scam Drains Crypto Hobbyists' Wallets πŸ“”

A global cryptocurrency phishing operation likely based in India or Sri Lanka has been stealing digital assets since at least 2022.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Japanese Account Hijackers Make $2bn+ of Illegal Trades πŸ“”

Hackers have compromised Japanese trading accounts in an apparent attempt to manipulate the stock market.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” German Police Shutter β€œeXch” Money Laundering Service πŸ“”

Germanys BKA has seized the infrastructure behind the crypto swapping service eXch.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ¦… Weekly Vulnerability Report: IT, ICS Alerts Issued by Cyble πŸ¦…

Cyble Weekly Vulnerability Report IT, ICS Alerts Issued by Cyble " dataimagecaption"Cyble Weekly Vulnerability Report IT, ICS Alerts Issued by Cyble " datamediumfile"httpscyble.comwpcontentuploads202505CybleBlogsWeeklyVulnerabilityICS300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202505CybleBlogsWeeklyVulnerabilityICS.jpg" title"Weekly Vulnerability Report IT, ICS Alerts Issued by Cyble 1" In the weekly vulnerability report, Cyble identified several IT and industrial control system ICS vulnerabilities that pose significant risk and should be prioritized by security teams for patching or mitigation. The reports examined nearly 60 vulnerabilities in all, and also looked at vulnerabilities discussed by threat actors on the dark web and attack attempts detected by Cyble honeypo...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Vulnerability Detection Tops Agentic AI at RSAC's Startup Competition πŸ•΅οΈβ€β™‚οΈ

Agenticnative startups threaten to reduce the zeroday problem to just a zerohour issue. Of course, AI agents will accelerate offensive attacks as well.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2025: Experts to Shine Light on Vendor Supply Chain Resilience Against Third-Party Risks πŸ“”

During Infosecurity Europe 2025 experts will explore how to strengthen organizational resilience against persistent thirdparty risks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity