πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
24.8K subscribers
88.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan πŸ–‹οΈ

At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security flaw in SAP NetWeaver, indicating that multiple threat actors are taking advantage of the bug. Cybersecurity firm ReliaQuest, in a new update published today, said it uncovered evidence suggesting involvement from the BianLian data extortion crew and the RansomExx ransomware.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan πŸ–‹οΈ

At least two different cybercrime groups BianLian and RansomExx are said to have exploited a recently disclosed security flaw in SAP NetWeaver, indicating that multiple threat actors are taking advantage of the bug. Cybersecurity firm ReliaQuest, in a new update published today, said it uncovered evidence suggesting involvement from the BianLian data extortion crew and the RansomExx ransomware.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 European Vulnerability Database is Live: What This β€˜Essential Tool’ Offers Security Experts 🦿

The announcement comes after concerns that the US government would stop funding the operations of MITRE, the nonprofit behind the CVE database.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Infosec Layoffs Aren't the Bargain That Boards May Think πŸ•΅οΈβ€β™‚οΈ

Salary savings come with hidden costs, including insider threats and depleted cybersecurity defenses, conveying advantages to skilled adversaries, experts argue.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ AI Agents May Have a Memory Problem πŸ•΅οΈβ€β™‚οΈ

A new study by researchers at Princeton University and Sentient shows it's surprisingly easy to trigger malicious behavior from AI agents by implanting fake "memories" into the data they rely on for making decisions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Ivanti EPMM Zero-Day Flaws Exploited in Chained Attack πŸ•΅οΈβ€β™‚οΈ

The security software maker said the vulnerabilities in Endpoint Manager Mobile have been exploited in the wild against "a very limited number of customers" for now and stem from open source libraries.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 How Google is Enhancing Security for Android, β€˜The World’s Most Popular OS’ 🦿

The Android operating system, currently installed on billions of devices across the globe, is receiving some significant security enhancements.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1πŸ‘1
πŸ“’ Employee phishing training is working – but don’t get complacent πŸ“’

Educating staff on how to avoid phishing attacks can cut the rate by 80.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Pen Testing for Compliance Only? It's Time to Change Your Approach πŸ–‹οΈ

Imagine this Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine software update. By April, attackers had already exploited a vulnerability introduced in that February update, gaining access to customer data weeks before being finally detected. This situation isn't theoretical it.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy πŸ–‹οΈ

Google on Wednesday released updates to address four security issues in its Chrome web browser, including one for which it said there exists an exploit in the wild. The highseverity vulnerability, tracked as CVE20254664 CVSS score 4.3, has been characterized as a case of insufficient policy enforcement in a component called Loader. "Insufficient policy enforcement in Loader in Google.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 5 BCDR Essentials for Effective Ransomware Defense πŸ–‹οΈ

Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT tools to infiltrate networks and launch ransomware attacks. In a chilling example, Microsoft recently disclosed how threat actors misused its Quick Assist remote assistance tool to deploy the destructive.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers πŸ–‹οΈ

A Russialinked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via crosssite scripting XSS vulnerabilities, including a thenzeroday in MDaemon, according to new findings from ESET. The activity, which commenced in 2023, has been codenamed Operation RoundPress by the Slovak cybersecurity company. It has.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper πŸ–‹οΈ

Cybersecurity researchers have discovered a malicious package named "osinfocheckeres6" that disguises itself as an operating system information utility to stealthily drop a nextstage payload onto compromised systems. "This campaign employs clever Unicodebased steganography to hide its initial malicious code and utilizes a Google Calendar event short link as a dynamic dropper for its final.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🚨 NCSC statement: Incident impacting retailers 🚨

The latest statement from the NCSC regarding the cyber incident impacting UK retailers.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” "Endemic" Ransomware Prompts NHS to Demand Supplier Action on Cybersecurity πŸ“”

The voluntary cybersecurity charter asks NHS suppliers to commit to eight cybersecurity pledges, amid rising attacks on healthcare.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fraud Losses Hit $11m Per Company as Customer Abuse Soars πŸ“”

Most online merchants now believe customers pose as big a threat as professional fraudsters.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2025: Ransomware Enters β€˜Post-Trust Ecosystem,’ NCA Cyber Expert Says πŸ“”

The ransomware landscape is more fragmented than ever, with no market leader, says William Lyne, Head of Intelligence at the NCA.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 What Is Threat Detection and Response? 🌊

Threat detection and response TDR is a continuous, adaptive process of identifying, analyzing, and responding to cyber threats in real time. Effective threat detection starts with continuous monitoring of your digital environment to spot suspicious activitywhether its unusual user behavior, malware, or early signs of a breach. Once a threat is identified, threat response solutions The post What Is Threat Detection and Response? appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Linux Vulnerabilities Surge 967% in a Year πŸ“”

Researchers discovered over 3000 Linux vulnerabilities in 2024, the most of any category.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical Infrastructure Under Siege: OT Security Still Lags πŸ•΅οΈβ€β™‚οΈ

With critical infrastructure facing constant cyber threats from the Typhoons and other corners, federal agencies and others are warning security for the OT network, a core technology in many critical sectors, is not powered up enough.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Dior Confirms Data Breach Affecting Customer Information πŸ“”

Dior confirmed a data breach compromising customer personal information, discovered on May 7.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity