πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
24.8K subscribers
88.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails πŸ–‹οΈ

Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for a small subset of its customers. "Criminals targeted our customer support agents overseas," the company said in a statement. "They used cash offers to convince a small group of insiders to copy data in our customer support tools for less than 1 of Coinbase monthly.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack πŸ“”

A stealthy fileless PowerShell attack using Remcos RAT bypassed antivirus by operating in memory.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ₯°1
🦿 Patch Tuesday: Microsoft Patches 78 Vulnerabilities, 5 Zero-Day Flaws 🦿

Microsoft patched vulnerabilities for the Common Log File System driver, Microsoft Edge, SharePoint, and more.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Coinbase Offers $20m Bounty to Take Down Cybercrime Ring Behind Hack πŸ“”

Coinbase is offering a 20m reward to help catch the threat actor behind a cyberattack that could cost it between 180400m.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Critical SAP NetWeaver Vuln Faces Barrage of Cyberattacks πŸ•΅οΈβ€β™‚οΈ

As threat actors continue to hop on the train of exploiting CVE202531324, researchers are recommending that SAP administrators patch as soon as possible so that they don't fall victim next.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit πŸ–‹οΈ

Austrian privacy nonprofit noyb none of your business has sent Meta's Irish headquarters a ceaseanddesist letter, threatening the company with a class action lawsuit if it proceeds with its plans to train users' data for training its artificial intelligence AI models without an explicit optin. The move comes weeks after the social media behemoth announced its plans to train its AI models.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
πŸ•΅οΈβ€β™‚οΈ Big Steelmaker Halts Operations After Cyber Incident πŸ•΅οΈβ€β™‚οΈ

Nucor made it clear its investigation is still in the early stages and didn't specify the nature or scope of the breach, nor who the threat actor might be.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ International Crime Rings Defraud US Gov't Out of Billions πŸ•΅οΈβ€β™‚οΈ

Fraudsters worldwide apply for money from the US government using stolen and forged identities, making off with hundreds of billions of dollars annually.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Attackers Target Samsung MagicINFO Server Bug, Patch Now πŸ•΅οΈβ€β™‚οΈ

CVE20254632, a patch bypass for a Samsung MagicInfo 9 Server vulnerability disclosed last year, has been exploited by threat actors in the wild.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Windows 10 Users Get 3 More Years of Microsoft 365 Security Updates 🦿

In a surprise reversal, Microsoft has adjusted Microsoft 365 Apps support for Windows 10, granting security updates through 2028 as many users are delaying Windows 11 upgrades.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 β€˜Expect Imposters’ Coinbase Tells Customers Whose Information Was Exposed in Data Breach 🦿

Instead of paying the 20 million ransom, Coinbase offered the same amount of money for information leading to the attackers.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Breachforums Boss to Pay $700k in Healthcare Breach β™ŸοΈ

In what experts are calling a novel legal outcome, the 22yearold former administrator of the cybercrime community Breachforums will forfeit nearly 700,000 to settle a civil lawsuit from a health insurance company whose customer data was posted for sale on the forum in 2023. Conor Brian Fitzpatrick, a.k.a. "Pompompurin," is slated for resentencing next month after pleading guilty to access device fraud and possession of child sexual abuse material CSAM.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ US healthcare data breaches are out of control – over 400 million patient records have been exposed in the last two years πŸ“’

There's been a huge surge in the number of healthcare data breaches in recent years.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Everything we know about the Dior cyber attack so far πŸ“’

The luxury fashion brand told ITPro that no sensitive financial information has been compromised in the attack.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ The FBI says hackers are using AI voice clones to impersonate US government officials πŸ“’

The campaign uses AI voice generation to send messages pretending to be from highranking figures.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Proofpoint bolsters Microsoft 365 protection with Hornetsecurity acquisition πŸ“’

Proofpoint said the acquisition will significantly enhance its humancentric security capabilities.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors πŸ–‹οΈ

Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology companies and educational institutions in China. "Over the past few months, it has expanded aggressively, continuously leveraging infected devices to launch external attacks," NSFOCUS said in a report published this week. "By.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Top 10 Best Practices for Effective Data Protection πŸ–‹οΈ

Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly and data privacy regulations tightening, organizations must stay vigilant and proactive to safeguard their most valuable assets. But how do you build an effective data protection framework? In this article, we'll explore data protection best practices from meeting.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks πŸ–‹οΈ

Researchers at ETH Zrich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that the vulnerability known as Spectre continues to haunt computer systems after more than seven years. The vulnerability, referred to as Branch Privilege Injection BPI, "can be exploited to misuse the prediction.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks πŸ–‹οΈ

Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShellbased shellcode loader to deploy a remote access trojan called Remcos RAT. "Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents," Qualys security researcher Akshay Thorve said in a technical report. "The attack chain leverages mshta.exe for.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications πŸ–‹οΈ

Modern apps move fastfaster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done. Attackers dont wait. They exploit vulnerabilities within hours. Yet most organizations take days to respond to critical cloud alerts. That delay isnt.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity