πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
24.8K subscribers
88.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” DPRK-Backed TA406 Targets Ukraine With Malware Campaigns πŸ“”

Cyber espionage campaign linked to North Korean actor TA406 targeted Ukrainian government entities.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide πŸ–‹οΈ

A recently disclosed critical security flaw impacting SAP NetWeaver is being exploited by multiple Chinanexus nationstate actors to target critical infrastructure networks. "Actors leveraged CVE202531324, an unauthenticated file upload vulnerability that enables remote code execution RCE," EclecticIQ researcher Arda Bykkaya said in an analysis published today. Targets of the campaign.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads πŸ–‹οΈ

Cybersecurity researchers have discovered a malicious package on the Python Package Index PyPI repository that purports to be an application related to the Solana blockchain, but contains malicious functionality to steal source code and developer secrets. The package, named solanatoken, is no longer available for download from PyPI, but not before it was downloaded 761 times. It was first.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Turkey-Aligned Hackers Targeted Iraq-Based Kurds with Zero-Day Exploit πŸ“”

Marbled Dust has been exploiting a vulnerability in user accounts associated with the Kurdish military operating in Iraq for over a year, according to Microsoft.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Noodlophile Malware Distributed Through Bogus AI Video Generators: Who Are the Targets? 🦿

By downloading what they believe is an AIgenerated video, victims have installed malware that can steal their data or offer attackers remote access to infected devices.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ•΅οΈβ€β™‚οΈ Hacktivists Make Little Impact During India-Pakistan Conflict πŸ•΅οΈβ€β™‚οΈ

While hacktivists claimed more than 100 successful attacks against Indian government, education, and military targets, the attacks were overblown in most cases and often did not even happen.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems πŸ–‹οΈ

Fortinet has patched a critical security flaw that it said has been exploited as a zeroday in attacks targeting FortiVoice enterprise phone systems. The vulnerability, tracked as CVE202532756, carries a CVSS score of 9.6 out of 10.0. "A stackbased overflow vulnerability CWE121 in FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera may allow a remote unauthenticated attacker to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks πŸ–‹οΈ

Ivanti has released security updates to address two security flaws in Endpoint Manager Mobile EPMM software that have been chained in attacks to gain remote code execution. The vulnerabilities in question are listed below CVE20254427 CVSS score 5.3 An authentication bypass in Ivanti Endpoint Manager Mobile allowing attackers to access protected resources without proper credentials.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– Five Years Later: Evolving IoT Cybersecurity Guidelines πŸͺ–

The Backgroundand NISTs Plan for Improving IoT Cybersecurity The passage of the Internet of Things IoT Cybersecurity Improvement Act in 2020 marked a pivotal step in enhancing the cybersecurity of IoT products. Recognizing the increasing internet connectivity of physical devices, this legislation tasked NIST with developing cybersecurity guidelines to manage and secure IoT effectively. As an early building block, we developed NIST IR 8259, Foundational Cybersecurity Activities for IoT Device Manufacturers, which describes recommended activities related to cybersecurity for manufacturers.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The EU just launched its own vulnerability database πŸ“’

Security practitioners have welcomed the move after the disruption caused by the MITRE incident.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ CISOs take the back seat as dev teams claim responsibility for application security πŸ“’

Development and engineering teams are steering security and budget strategies.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Orca Security Gets AI-Powered Remediation From Opus Deal πŸ•΅οΈβ€β™‚οΈ

The acquisition will enhance Orca's CNAPP offering with autonomous vulnerability remediation and prevention technologies from Opus.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Patch Tuesday, May 2025 Edition β™ŸοΈ

Microsoft on Tuesday released software updates to fix at least 70 vulnerabilities in Windows and related products, including five zeroday flaws that are already seeing active exploitation. Adding to the sense of urgency with this month's patch batch from Redmond are fixes for two other weaknesses that now have public proofofconcept exploits available.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns πŸ–‹οΈ

A cyber espionage group known as Earth Ammit has been linked to two related but distinct campaigns from 2023 to 2024 targeting various entities in Taiwan and South Korea, including military, satellite, heavy industry, media, technology, software services, and healthcare sectors. Cybersecurity firm Trend Micro said the first wave, codenamed VENOM, mainly targeted software service providers, while.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Learning How to Hack: Why Offensive Security Training Benefits Your Entire Security Team πŸ–‹οΈ

Organizations across industries are experiencing significant escalations in cyberattacks, particularly targeting critical infrastructure providers and cloudbased enterprises. Verizons recently released 2025 Data Breach Investigations Report found an 18 YoY increase in confirmed breaches, with the exploitation of vulnerabilities as an initial access step growing by 34.  As attacks rise.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails πŸ–‹οΈ

Cybersecurity researchers have discovered a new phishing campaign that's being used to distribute malware called Horabot targeting Windows users in Latin American countries like Mexico, Guatemala, Colombia, Peru, Chile, and Argentina. The campaign is "using crafted emails that impersonate invoices or financial documents to trick victims into opening malicious attachments and can steal email.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server πŸ–‹οΈ

Microsoft on Tuesday shipped fixes to address a total of 78 security flaws across its software lineup, including a set of five zerodays that have come under active exploitation in the wild. Of the 78 flaws resolved by the tech giant, 11 are rated Critical, 66 are rated Important, and one is rated Low in severity. Twentyeight of these vulnerabilities lead to remote code execution, 21 of them.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Fortinet and Ivanti Zero Days Exploited in the Wild πŸ“”

Fortinet and Ivanti published advisories on the same day revealing that attackers are exploiting new zero days, one of which is rated critical.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” New 'Chihuahua’ Infostealer Targets Browser Data and Crypto Wallet Extensions πŸ“”

While appearing unsophisticated on the surface, Chihuahua Stealer uses advanced methods.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” European Police Bust €3m Investment Fraud Ring πŸ“”

Law enforcers from multiple countries team up to dismantle a multimillioneuro fraud gang.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” Microsoft Fixes Seven Zero-Days in May Patch Tuesday πŸ“”

Microsoft has patched seven zeroday bugs, five of which were exploited in the wild.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity