π German Police Shutter βeXchβ Money Laundering Service π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Germanys BKA has seized the infrastructure behind the crypto swapping service eXch.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
German Police Shutter βeXchβ Money Laundering Service
Germanyβs BKA has seized the infrastructure behind the crypto swapping service eXch
π1
π¦
Weekly Vulnerability Report: IT, ICS Alerts Issued by Cyble π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble Weekly Vulnerability Report IT, ICS Alerts Issued by Cyble " dataimagecaption"Cyble Weekly Vulnerability Report IT, ICS Alerts Issued by Cyble " datamediumfile"httpscyble.comwpcontentuploads202505CybleBlogsWeeklyVulnerabilityICS300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202505CybleBlogsWeeklyVulnerabilityICS.jpg" title"Weekly Vulnerability Report IT, ICS Alerts Issued by Cyble 1" In the weekly vulnerability report, Cyble identified several IT and industrial control system ICS vulnerabilities that pose significant risk and should be prioritized by security teams for patching or mitigation. The reports examined nearly 60 vulnerabilities in all, and also looked at vulnerabilities discussed by threat actors on the dark web and attack attempts detected by Cyble honeypo...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ Vulnerability Detection Tops Agentic AI at RSAC's Startup Competition π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Agenticnative startups threaten to reduce the zeroday problem to just a zerohour issue. Of course, AI agents will accelerate offensive attacks as well.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Vulnerability Detection Tops Agentic AI at RSAC Competition
Agentic-native startups threaten to reduce the zero-day problem to just a zero-hour issue. Of course, AI agents will accelerate offensive attacks as well.
π #Infosec2025: Experts to Shine Light on Vendor Supply Chain Resilience Against Third-Party Risks π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
During Infosecurity Europe 2025 experts will explore how to strengthen organizational resilience against persistent thirdparty risks.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
#Infosec2025: Experts to Shine Light on Vendor Supply Chain Resilience Against Third-Party Risks
During Infosecurity Europe 2025 experts will explore how to strengthen organizational resilience against persistent third-party risks
π΅οΈββοΈ Can Cybersecurity Keep Up In the AI Arms Race? π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
New research shows China is quickly catching up with the US in AI innovation. Experts weigh in on what it means for cyber defenders.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Can Cybersecurity Keep Up With the AI Arms Race?
New research shows China is quickly catching up with the US in AI innovation. Experts weigh in on what it means for cyber defenders.
π Criminal Proxy Network Infects Thousands of IoT Devices π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The criminal proxy network infected thousands of IoT and endoflife devices, creating dangerous botnet.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Criminal Proxy Network Infects Thousands of IoT Devices
The criminal proxy network infected thousands of IoT and end-of-life devices, creating dangerous botnet
ποΈ ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully exploited, could enable an attacker to leverage the software in order to achieve remote code execution. DriverHub is a tool that's designed to automatically detect the motherboard model of a computer and display necessary driver updates for subsequent installation by communicating with a.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Hacktivist Attacks on India Overstated Amid APT36 Espionage Threat π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Hacktivist claims on Indian infrastructure raised alarms, but investigations showed minimal damage.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π₯1
π΅οΈββοΈ 4 Hackers Arrested After Millions Made in Global Botnet Business π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The cybercriminals infected older wireless Internet routers with Anyproxy and 5socks malware in order to reconfigure them all without the users' knowledge.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
4 Hackers Arrested After Millions Made in Botnet Business
The cybercriminals infected older wireless Internet routers with Anyproxy and 5socks malware in order to reconfigure them β all without the users' knowledge.
π¦Ώ Forresterβs Top 10 Emerging Tech for 2025: Which 3 are Standouts? π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
A Forrester VP explains to TechRepublic readers why three of these 10 emerging technologies for the year should be on managers' radar now.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Forresterβs Top 10 Emerging Tech for 2025: Which 3 are Standouts?
A Forrester VP explains to TechRepublic readers why three of the top 10 emerging technologies for the year should be on managers' radar now.
π΅οΈββοΈ NSO Group's Legal Loss May Do Little to Curtail Spyware π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The 168 million judgment against NSO Group underscores how citizens put little store in the spyware industry's justifications for circumventing security but will it matter?.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
NSO Group's Loss May Do Little to Curtail Spyware
The $168 million judgment against NSO Group underscores how citizens put little store in the spyware industry's justifications for circumventing security β but will it matter?
π€1
π΅οΈββοΈ Attackers Lace Fake Generative AI Tools With 'Noodlophile' Malware π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Threat actors are scamming users by advertising legitimatelooking generative AI websites that, when visited, install credentialstealing malware onto the victim's computer.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Attackers Lace Fake Generative AI Tools With Malware
Threat actors are scamming users by advertising legitimate-looking generative AI websites that, when visited, install credential-stealing malware onto the victim's computer.
π1
π’ Microsoft u-turn gives apps security updates on Windows 10 until 2028 π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Microsoft says the move is designed to help maintain security while people upgrade to Windows 11.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Microsoft u-turn gives apps security updates on Windows 10 until 2028
Microsoft says the move is designed to help maintain security while people upgrade to Windows 11
π’ M&S confirms customer personal data was stolen in recent attack π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
The retailer confirmed hackers accessed customer data but not payment information or passwords.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
M&S confirms customer personal data was stolen in recent attack
The retailer confirmed hackers accessed customer data β but not payment information or passwords
π’ Spain reconsiders possibility of hackers causing blackouts π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Spain sends questions to smaller power providers as investigation into outage continues.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
Spain reconsiders possibility of hackers causing blackouts
Spain sends questions to smaller power providers as investigation into outage continues
π΅οΈββοΈ Building Effective Security Programs Requires Strategy, Patience, and Clear Vision π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Capital One executives share insights on how organizations should design their security program, implement passwordless technologies, and reduce their attack surface.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Building Effective Security Programs Requires Strategy, Patience, and Clear Vision
Capital One executives share insights on how organizations should design their security programs, implement passwordless technologies, and reduce their attack surface.
π΅οΈββοΈ North Korea's TA406 Targets Ukraine for Intel π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The threat group's goal is to help Pyongyang assess risk to its troops deployed in Ukraine and to figure out if Moscow might want more.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
North Korea's TA406 Targets Ukraine for Intel
The threat group's goal is to help Pyongyang assess risk to its troops deployed in Ukraine and to figure out if Moscow might want more.
π΅οΈββοΈ Fortra Expands SSE Capabilities With Lookout's Cloud Security Business π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Fortra strengthens its endpointtocloud security platform with the acquisition of Lookout's cloud application security broker, zerotrust network access, and secure Web gateway technologies.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Fortra Expands SSE Capabilities With Lookout's Cloud Security Business
Fortra strengthens its endpoint-to-cloud security platform with the acquisition of Lookout's cloud application security broker, zero-trust network access, and secure Web gateway technologies.
ποΈ Deepfake Defense in the Age of AI ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The cybersecurity landscape has been dramatically reshaped by the advent of generative AI. Attackers now leverage large language models LLMs to impersonate trusted individuals and automate these social engineering tactics at scale. Lets review the status of these rising attacks, whats fueling them, and how to actually prevent, not detect, them. The Most Powerful Person on the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The North Korealinked threat actor known as Konni APT has been attributed to a phishing campaign targeting government entities in Ukraine, indicating the threat actor's targeting beyond Russia. Enterprise security firm Proofpoint said the end goal of the campaign is to collect intelligence on the "trajectory of the Russian invasion." "The group's interest in Ukraine follows historical targeting.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Moldovan Police Arrest Suspect in β¬4.5M Ransomware Attack on Dutch Research Agency ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Moldovan law enforcement authorities have arrested a 45yearold foreign man suspected of involvement in a series of ransomware attacks targeting Dutch companies in 2021. "He is wanted internationally for committing several cybercrimes ransomware attacks, blackmail, and money laundering against companies based in the Netherlands," officials said in a statement Monday. In conjunction with the.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity