πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
24.8K subscribers
88.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ¦… Cyble Detects 200 Billion Files Exposed in Cloud Buckets πŸ¦…

Cyble Detects 200 Billion Files Exposed in Cloud Buckets " dataimagecaption"" datamediumfile"httpscyble.comwpcontentuploads202505CloudBuckets300x150.png" datalargefile"httpscyble.comwpcontentuploads202505CloudBuckets1024x512.png" title"Cyble Detects 200 Billion Files Exposed in Cloud Buckets  1" Cybles ODIN vulnerability search tool has detected more than 200 billion exposed files in cloud buckets across seven major cloud providers.  The 200 billion exposed files reflect the sheer scale of accidental data exposure on the internet, data thats often left publicly accessible due to misconfigurations. The files include data ranging from documents and credentials to source code and internal backups.  The ODIN platform scans cloud buckets at scale and classifies exposed content using ma...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Turkish APT Exploits Chat App Zero-Day to Spy Kurds πŸ•΅οΈβ€β™‚οΈ

Even after their zeroday vulnerability turned into an nday, attackers known as Marbled Dust or Sea Turtle continued to spy on military targets that had failed to patch Output Messenger.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How to Develop and Communicate Metrics for CSIRPs πŸ•΅οΈβ€β™‚οΈ

A welldocumented cybersecurity incident response program CSIRP provides the transparency needed for informed decisionmaking, protecting the organization in a constantly changing threat environment.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Attacker Specialization Puts Threat Modeling on Defensive πŸ•΅οΈβ€β™‚οΈ

Specialization among threat groups poses challenges for defenders, who now must distinguish between different actors responsible for different facets of an attack.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Coinbase Extorted, Offers $20M for Info on Its Hackers πŸ•΅οΈβ€β™‚οΈ

Coinbase is going Liam Neeson on its attackers, potentially setting a new precedent for incident response in the wake of crypto and blockchaintargeting cyberattacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Australian Human Rights Commission Leaks Docs in Data Breach πŸ•΅οΈβ€β™‚οΈ

An internal error led to public disclosure of reams of sensitive data that could be coopted for followon cyberattacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Dynamic DNS Emerges as Go-to Cyberattack Facilitator πŸ•΅οΈβ€β™‚οΈ

Scattered Spider and other phishers and hacking groups are using rentable subdomains from dynamic DNS providers to obfuscate their activity and impersonate wellknown brands.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 UK Supermarket Avoided Ransomware Because β€˜They Yanked Their Own Plug,’ Hackers Say 🦿

The proactive steps taken by Coops IT team are thought to be why the supermarket is recovering more quickly after being hacked than fellow UK retailer MS from its recent cyber attack.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications πŸ–‹οΈ

Modern apps move fastfaster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done. Attackers dont wait. They exploit vulnerabilities within hours. Yet most organizations take days to respond to critical cloud alerts. That delay isnt.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“’ Criminal records, financial data exposed in cyber attack on Legal Aid Agency πŸ“’

The UK's Legal Aid Agency has warned members of the public after a data breach exposed a "significant amount" of data, including criminal records, personal details, and financial information.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘Ž1
🦿 Malwarebytes vs McAfee: Which Antivirus Is Right for You? 🦿

Malwarebytes and McAfee are both firmly established in the antivirus business, but which is better? Read this guide to find out.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Why CTEM is the Winning Bet for CISOs in 2025 πŸ–‹οΈ

Continuous Threat Exposure Management CTEM has moved from concept to cornerstone, solidifying its role as a strategic enabler for CISOs. No longer a theoretical framework, CTEM now anchors todays cybersecurity programs by continuously aligning security efforts with realworld risk. At the heart of CTEM is the integration of Adversarial Exposure Validation AEV, an advanced, offensive.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards πŸ–‹οΈ

Mozilla has released security updates to address two critical security flaws in its Firefox browser that could be potentially exploited to access sensitive data or achieve code execution. The vulnerabilities, both of which were exploited as a zeroday at Pwn2Own Berlin, are listed below CVE20254918 An outofbounds access vulnerability when resolving Promise objects that could allow an.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘2
πŸ–‹οΈ ⚑ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More πŸ–‹οΈ

Cybersecurity leaders arent just dealing with attackstheyre also protecting trust, keeping systems running, and maintaining their organizations reputation. This weeks developments highlight a bigger issue as we rely more on digital tools, hidden weaknesses can quietly grow.  Just fixing problems isnt enough anymoreresilience needs to be built into everything from the ground up.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” GDPR Changes Risk Undermining its Principles, Civil Society Groups Warn πŸ“”

Civil society groups and academics are calling for the EU's GDPR to remain unchanged following the EU Commission's plans to revisit it.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” SEC SIM Swapper Gets 14 Months for X Account Hijack πŸ“”

An Alabama man has been sentenced to 14 months for hacking the SECs X account.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Legal Aid Agency Admits Major Breach of Applicant Data πŸ“”

The UK government says that hackers accessed a large amount of personal information in attack on Legal Aid Agency.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2025: How CISOs Can Stay Ahead of Evolving Cloud Threats πŸ“”

Security experts tell Infosecurity about the cloud attack trends in the past year, and how CISOs can mitigate evolving techniques.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Week in Vulnerabilities: IT, ICS Fixes Prioritized by Cyble πŸ¦…

Cyble The Week in Vulnerabilities IT, ICS Fixes Prioritized by Cyble " dataimagecaption"Cyble The Week in Vulnerabilities IT, ICS Fixes Prioritized by Cyble " datamediumfile"httpscyble.comwpcontentuploads202505CybleBlogsITICS300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202505CybleBlogsITICS.jpg" title"The Week in Vulnerabilities IT, ICS Fixes Prioritized by Cyble 1" In reports to clients last week, Cyble analyzed over 60 IT and industrial control system ICS vulnerabilities to identify highpriority fixes for security teams. The vulnerabilities included 16 critical vulnerabilities and eight that were the target of exploits circulating on underground and dark web forums. From the list, Cyble researchers identified nine IT vulnerabilities that can lead to system compromise,...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ NHS England launches cyber charter to shore up vendor security practices πŸ“’

Voluntary charter follows a series of highprofile ransomware attacks.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” RCE Vulnerability Found in RomethemeKit For Elementor Plugin πŸ“”

RomethemeKit for Elementor has released a patch addressing an RCE vulnerability exposing 30,000 sites.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity