πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
24.8K subscribers
88.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers πŸ–‹οΈ

A Russialinked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via crosssite scripting XSS vulnerabilities, including a thenzeroday in MDaemon, according to new findings from ESET. The activity, which commenced in 2023, has been codenamed Operation RoundPress by the Slovak cybersecurity company. It has.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper πŸ–‹οΈ

Cybersecurity researchers have discovered a malicious package named "osinfocheckeres6" that disguises itself as an operating system information utility to stealthily drop a nextstage payload onto compromised systems. "This campaign employs clever Unicodebased steganography to hide its initial malicious code and utilizes a Google Calendar event short link as a dynamic dropper for its final.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🚨 NCSC statement: Incident impacting retailers 🚨

The latest statement from the NCSC regarding the cyber incident impacting UK retailers.

πŸ“– Read more.

πŸ”— Via "UK NCSC"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” "Endemic" Ransomware Prompts NHS to Demand Supplier Action on Cybersecurity πŸ“”

The voluntary cybersecurity charter asks NHS suppliers to commit to eight cybersecurity pledges, amid rising attacks on healthcare.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Fraud Losses Hit $11m Per Company as Customer Abuse Soars πŸ“”

Most online merchants now believe customers pose as big a threat as professional fraudsters.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2025: Ransomware Enters β€˜Post-Trust Ecosystem,’ NCA Cyber Expert Says πŸ“”

The ransomware landscape is more fragmented than ever, with no market leader, says William Lyne, Head of Intelligence at the NCA.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 What Is Threat Detection and Response? 🌊

Threat detection and response TDR is a continuous, adaptive process of identifying, analyzing, and responding to cyber threats in real time. Effective threat detection starts with continuous monitoring of your digital environment to spot suspicious activitywhether its unusual user behavior, malware, or early signs of a breach. Once a threat is identified, threat response solutions The post What Is Threat Detection and Response? appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Linux Vulnerabilities Surge 967% in a Year πŸ“”

Researchers discovered over 3000 Linux vulnerabilities in 2024, the most of any category.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical Infrastructure Under Siege: OT Security Still Lags πŸ•΅οΈβ€β™‚οΈ

With critical infrastructure facing constant cyber threats from the Typhoons and other corners, federal agencies and others are warning security for the OT network, a core technology in many critical sectors, is not powered up enough.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Dior Confirms Data Breach Affecting Customer Information πŸ“”

Dior confirmed a data breach compromising customer personal information, discovered on May 7.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ RSAC 2025: AI Everywhere, Trust Nowhere πŸ•΅οΈβ€β™‚οΈ

We're at an inflection point. AI is changing the game, but the rules haven't caught up.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” SAP NetWeaver Flaw Exploited by Ransomware Groups and Chinese-Backed Hackers πŸ“”

The critical vulnerability is being exploited by BianLian, RansomwEXX and a Chinese nationstate actor known as Chaya004.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails πŸ–‹οΈ

Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for a small subset of its customers. "Criminals targeted our customer support agents overseas," the company said in a statement. "They used cash offers to convince a small group of insiders to copy data in our customer support tools for less than 1 of Coinbase monthly.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack πŸ“”

A stealthy fileless PowerShell attack using Remcos RAT bypassed antivirus by operating in memory.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ₯°1
🦿 Patch Tuesday: Microsoft Patches 78 Vulnerabilities, 5 Zero-Day Flaws 🦿

Microsoft patched vulnerabilities for the Common Log File System driver, Microsoft Edge, SharePoint, and more.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Coinbase Offers $20m Bounty to Take Down Cybercrime Ring Behind Hack πŸ“”

Coinbase is offering a 20m reward to help catch the threat actor behind a cyberattack that could cost it between 180400m.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical SAP NetWeaver Vuln Faces Barrage of Cyberattacks πŸ•΅οΈβ€β™‚οΈ

As threat actors continue to hop on the train of exploiting CVE202531324, researchers are recommending that SAP administrators patch as soon as possible so that they don't fall victim next.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit πŸ–‹οΈ

Austrian privacy nonprofit noyb none of your business has sent Meta's Irish headquarters a ceaseanddesist letter, threatening the company with a class action lawsuit if it proceeds with its plans to train users' data for training its artificial intelligence AI models without an explicit optin. The move comes weeks after the social media behemoth announced its plans to train its AI models.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
πŸ•΅οΈβ€β™‚οΈ Big Steelmaker Halts Operations After Cyber Incident πŸ•΅οΈβ€β™‚οΈ

Nucor made it clear its investigation is still in the early stages and didn't specify the nature or scope of the breach, nor who the threat actor might be.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ International Crime Rings Defraud US Gov't Out of Billions πŸ•΅οΈβ€β™‚οΈ

Fraudsters worldwide apply for money from the US government using stolen and forged identities, making off with hundreds of billions of dollars annually.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Attackers Target Samsung MagicINFO Server Bug, Patch Now πŸ•΅οΈβ€β™‚οΈ

CVE20254632, a patch bypass for a Samsung MagicInfo 9 Server vulnerability disclosed last year, has been exploited by threat actors in the wild.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity