π¦Ώ Noodlophile Malware Distributed Through Bogus AI Video Generators: Who Are the Targets? π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
By downloading what they believe is an AIgenerated video, victims have installed malware that can steal their data or offer attackers remote access to infected devices.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Noodlophile Malware Distributed Through Bogus AI Video Generators: Who Are the Targets?
By downloading what they believe is an AI-generated video, victims have installed malware that can steal their data or offer attackers remote access to infected devices.
π€1
π΅οΈββοΈ Hacktivists Make Little Impact During India-Pakistan Conflict π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
While hacktivists claimed more than 100 successful attacks against Indian government, education, and military targets, the attacks were overblown in most cases and often did not even happen.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Hacktivists Make Little Impact During India-Pakistan Conflict
While hacktivists claimed more than 100 successful attacks against Indian government, education, and military targets, the attacks were overblown in most cases and often did not even happen.
ποΈ Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Fortinet has patched a critical security flaw that it said has been exploited as a zeroday in attacks targeting FortiVoice enterprise phone systems. The vulnerability, tracked as CVE202532756, carries a CVSS score of 9.6 out of 10.0. "A stackbased overflow vulnerability CWE121 in FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera may allow a remote unauthenticated attacker to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Ivanti has released security updates to address two security flaws in Endpoint Manager Mobile EPMM software that have been chained in attacks to gain remote code execution. The vulnerabilities in question are listed below CVE20254427 CVSS score 5.3 An authentication bypass in Ivanti Endpoint Manager Mobile allowing attackers to access protected resources without proper credentials.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
πͺ Five Years Later: Evolving IoT Cybersecurity Guidelines πͺ
π Read more.
π Via "NIST"
----------
ποΈ Seen on @cibsecurity
The Backgroundand NISTs Plan for Improving IoT Cybersecurity The passage of the Internet of Things IoT Cybersecurity Improvement Act in 2020 marked a pivotal step in enhancing the cybersecurity of IoT products. Recognizing the increasing internet connectivity of physical devices, this legislation tasked NIST with developing cybersecurity guidelines to manage and secure IoT effectively. As an early building block, we developed NIST IR 8259, Foundational Cybersecurity Activities for IoT Device Manufacturers, which describes recommended activities related to cybersecurity for manufacturers.π Read more.
π Via "NIST"
----------
ποΈ Seen on @cibsecurity
NIST
Five Years Later: Evolving IoT Cybersecurity Guidelines
The Backgroundβ¦and NISTβs Plan for Improving IoT Cybersecurity
π’ The EU just launched its own vulnerability database π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Security practitioners have welcomed the move after the disruption caused by the MITRE incident.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
The EU just launched its own vulnerability database
Security practitioners have welcomed the move after the disruption caused by the MITRE incident
π’ CISOs take the back seat as dev teams claim responsibility for application security π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Development and engineering teams are steering security and budget strategies.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
CISOs take the back seat as dev teams claim responsibility for application security
Development and engineering teams are steering security and budget strategies
π΅οΈββοΈ Orca Security Gets AI-Powered Remediation From Opus Deal π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The acquisition will enhance Orca's CNAPP offering with autonomous vulnerability remediation and prevention technologies from Opus.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Orca Security Gets AI-Powered Remediation From Opus Deal
The acquisition will enhance Orca's CNAPP offering with autonomous vulnerability remediation and prevention technologies from Opus.
βοΈ Patch Tuesday, May 2025 Edition βοΈ
π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Microsoft on Tuesday released software updates to fix at least 70 vulnerabilities in Windows and related products, including five zeroday flaws that are already seeing active exploitation. Adding to the sense of urgency with this month's patch batch from Redmond are fixes for two other weaknesses that now have public proofofconcept exploits available.π Read more.
π Via "Krebs on Security"
----------
ποΈ Seen on @cibsecurity
Krebs on Security
Patch Tuesday, May 2025 Edition
Microsoft on Tuesday released software updates to fix at least 70 vulnerabilities in Windows and related products, including five zero-day flaws that are already seeing active exploitation. Adding to the sense of urgency with this month's patch batch fromβ¦
ποΈ Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A cyber espionage group known as Earth Ammit has been linked to two related but distinct campaigns from 2023 to 2024 targeting various entities in Taiwan and South Korea, including military, satellite, heavy industry, media, technology, software services, and healthcare sectors. Cybersecurity firm Trend Micro said the first wave, codenamed VENOM, mainly targeted software service providers, while.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Learning How to Hack: Why Offensive Security Training Benefits Your Entire Security Team ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Organizations across industries are experiencing significant escalations in cyberattacks, particularly targeting critical infrastructure providers and cloudbased enterprises. Verizons recently released 2025 Data Breach Investigations Report found an 18 YoY increase in confirmed breaches, with the exploitation of vulnerabilities as an initial access step growing by 34. As attacks rise.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered a new phishing campaign that's being used to distribute malware called Horabot targeting Windows users in Latin American countries like Mexico, Guatemala, Colombia, Peru, Chile, and Argentina. The campaign is "using crafted emails that impersonate invoices or financial documents to trick victims into opening malicious attachments and can steal email.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Microsoft on Tuesday shipped fixes to address a total of 78 security flaws across its software lineup, including a set of five zerodays that have come under active exploitation in the wild. Of the 78 flaws resolved by the tech giant, 11 are rated Critical, 66 are rated Important, and one is rated Low in severity. Twentyeight of these vulnerabilities lead to remote code execution, 21 of them.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π New Fortinet and Ivanti Zero Days Exploited in the Wild π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Fortinet and Ivanti published advisories on the same day revealing that attackers are exploiting new zero days, one of which is rated critical.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New Fortinet and Ivanti Zero Days Exploited in the Wild
Fortinet and Ivanti published advisories on the same day revealing that attackers are exploiting new zero days, one of which is rated critical
π1
π New 'Chihuahuaβ Infostealer Targets Browser Data and Crypto Wallet Extensions π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
While appearing unsophisticated on the surface, Chihuahua Stealer uses advanced methods.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
New 'Chihuahuaβ Infostealer Targets Browser Data and Crypto Wallet Extensions
While appearing unsophisticated on the surface, Chihuahua Stealer uses advanced methods
π European Police Bust β¬3m Investment Fraud Ring π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Law enforcers from multiple countries team up to dismantle a multimillioneuro fraud gang.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
European Police Bust β¬3m Investment Fraud Ring
Law enforcers from multiple countries team up to dismantle a multimillion-euro fraud gang
π1
π Microsoft Fixes Seven Zero-Days in May Patch Tuesday π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Microsoft has patched seven zeroday bugs, five of which were exploited in the wild.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Microsoft Fixes Seven Zero-Days in May Patch Tuesday
Microsoft has patched seven zero-day bugs, five of which were exploited in the wild
π¦Ώ Block Webcam Spying Fast and Forever for $10 π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Ashampoo WebCam Guard gives you oneclick privacy on three devices, so no one secretly listens to or watches you.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Block Webcam Spying Fast and Forever for $10
Ashampoo WebCam Guard gives you one-click privacy on three devices, so no one secretly listens to or watches you.
π1
π CISA Reverses Decision on Cybersecurity Advisory Changes π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
CISA paused plans to overhaul its advisory system after backlash from the infosec community.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
CISA Reverses Decision on Cybersecurity Advisory Changes
CISA paused plans to overhaul its advisory system after backlash from the infosec community
π1
π΅οΈββοΈ Congress Should Tackle Cyber Threats, Not Competition π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Some members of Congress seem more intent on grabbing headlines than actually working to make America more cyber secure.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Congress Should Tackle Cyber Threats, Not Competition
Some members of Congress seem more intent on grabbing headlines than actually working to make America more cyber secure.
π1
ποΈ CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A new global phishing threat called "Meta Mirage" has been uncovered, targeting businesses using Meta's Business Suite. This campaign specifically aims at hijacking highvalue accounts, including those managing advertising and official brand pages. Cybersecurity researchers at CTM360 revealed that attackers behind Meta Mirage impersonate official Meta communications, tricking users into handing.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity