πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
24.8K subscribers
88.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress πŸ–‹οΈ

The North Korealinked threat actor known as Konni APT has been attributed to a phishing campaign targeting government entities in Ukraine, indicating the threat actor's targeting beyond Russia. Enterprise security firm Proofpoint said the end goal of the campaign is to collect intelligence on the "trajectory of the Russian invasion." "The group's interest in Ukraine follows historical targeting.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency πŸ–‹οΈ

Moldovan law enforcement authorities have arrested a 45yearold foreign man suspected of involvement in a series of ransomware attacks targeting Dutch companies in 2021. "He is wanted internationally for committing several cybercrimes ransomware attacks, blackmail, and money laundering against companies based in the Netherlands," officials said in a statement Monday. In conjunction with the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ TΓΌrkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers πŸ–‹οΈ

A Trkiyeaffiliated threat actor exploited a zeroday security flaw in an Indian enterprise communication platform called Output Messenger as part of a cyber espionage attack campaign since April 2024. "These exploits have resulted in a collection of related user data from targets in Iraq," the Microsoft Threat Intelligence team said. "The targets of the attack are associated with the Kurdish.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” European Vulnerability Database Launches Amid US CVE Chaos πŸ“”

ENISA has officially launched the European Vulnerability Database as required by the NIS2 directive.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” M&S Confirms Customer Data Stolen in Cyber-Attack πŸ“”

MS Chief Executive, Stuart Machin, said that the firm has written to customers to inform them that some personal information was accessed by threat actors.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Considers New Enterprise IoT Security Law πŸ“”

The UK government wants to hear feedback on a possible new standard or legislation to improve enterprise IoT security.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 10 Best Managed Cybersecurity Services: Expert Picks and Why They’re Worth It 🌊

With severe cyberattacks, tightening regulations, and growing infrastructure complexity, managed cybersecurity services have become the top strategic necessity for business resilience.  When keeping up with cybersecurity gets toughbecause youre short on time, talent, and budgetmanaged security gives you access to the latest cyber technology and expert support from a trusted cybersecurity service provider. By handing The post 10 Best Managed Cybersecurity Services Expert Picks and Why Theyre Worth It appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Shifts Alert Distribution Strategy to Email, Social Media πŸ“”

CISA won't post standard cybersecurity updates on its website, shifting to email and social media.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… Australia Records Highest-Ever Data Breaches in 2024, Says OAIC’s Report πŸ¦…

OAIC Reports " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202505OAICReports300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202505OAICReports1024x512.jpg" title"Australia Records HighestEver Data Breaches in 2024, Says OAICs Report  1" Australia witnessed a hoard of data breach in 2024, with over 1,100 incidents reported to the Office of the Australian Information Commissioner OAIC. The figures, released in the OAIC Reportsspecifically the Notifiable Data Breaches Report July to December 2024highlight a 25 increase in data breach notifications compared to 2023. According to the OAIC, a total of 1,113 data breaches were reported in 2024 the highest since the Notifiable Data Breaches NDB scheme came into effect in 2018. Of these, 595 breaches occurred in t...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” DPRK-Backed TA406 Targets Ukraine With Malware Campaigns πŸ“”

Cyber espionage campaign linked to North Korean actor TA406 targeted Ukrainian government entities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide πŸ–‹οΈ

A recently disclosed critical security flaw impacting SAP NetWeaver is being exploited by multiple Chinanexus nationstate actors to target critical infrastructure networks. "Actors leveraged CVE202531324, an unauthenticated file upload vulnerability that enables remote code execution RCE," EclecticIQ researcher Arda Bykkaya said in an analysis published today. Targets of the campaign.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads πŸ–‹οΈ

Cybersecurity researchers have discovered a malicious package on the Python Package Index PyPI repository that purports to be an application related to the Solana blockchain, but contains malicious functionality to steal source code and developer secrets. The package, named solanatoken, is no longer available for download from PyPI, but not before it was downloaded 761 times. It was first.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Turkey-Aligned Hackers Targeted Iraq-Based Kurds with Zero-Day Exploit πŸ“”

Marbled Dust has been exploiting a vulnerability in user accounts associated with the Kurdish military operating in Iraq for over a year, according to Microsoft.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Noodlophile Malware Distributed Through Bogus AI Video Generators: Who Are the Targets? 🦿

By downloading what they believe is an AIgenerated video, victims have installed malware that can steal their data or offer attackers remote access to infected devices.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ•΅οΈβ€β™‚οΈ Hacktivists Make Little Impact During India-Pakistan Conflict πŸ•΅οΈβ€β™‚οΈ

While hacktivists claimed more than 100 successful attacks against Indian government, education, and military targets, the attacks were overblown in most cases and often did not even happen.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems πŸ–‹οΈ

Fortinet has patched a critical security flaw that it said has been exploited as a zeroday in attacks targeting FortiVoice enterprise phone systems. The vulnerability, tracked as CVE202532756, carries a CVSS score of 9.6 out of 10.0. "A stackbased overflow vulnerability CWE121 in FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera may allow a remote unauthenticated attacker to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks πŸ–‹οΈ

Ivanti has released security updates to address two security flaws in Endpoint Manager Mobile EPMM software that have been chained in attacks to gain remote code execution. The vulnerabilities in question are listed below CVE20254427 CVSS score 5.3 An authentication bypass in Ivanti Endpoint Manager Mobile allowing attackers to access protected resources without proper credentials.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Five Years Later: Evolving IoT Cybersecurity Guidelines πŸͺ–

The Backgroundand NISTs Plan for Improving IoT Cybersecurity The passage of the Internet of Things IoT Cybersecurity Improvement Act in 2020 marked a pivotal step in enhancing the cybersecurity of IoT products. Recognizing the increasing internet connectivity of physical devices, this legislation tasked NIST with developing cybersecurity guidelines to manage and secure IoT effectively. As an early building block, we developed NIST IR 8259, Foundational Cybersecurity Activities for IoT Device Manufacturers, which describes recommended activities related to cybersecurity for manufacturers.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The EU just launched its own vulnerability database πŸ“’

Security practitioners have welcomed the move after the disruption caused by the MITRE incident.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISOs take the back seat as dev teams claim responsibility for application security πŸ“’

Development and engineering teams are steering security and budget strategies.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Orca Security Gets AI-Powered Remediation From Opus Deal πŸ•΅οΈβ€β™‚οΈ

The acquisition will enhance Orca's CNAPP offering with autonomous vulnerability remediation and prevention technologies from Opus.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity