πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale πŸ–‹οΈ

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilots code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of nonhuman identities NHIs across corporate clouds. That population is already overwhelming the enterprise many companies.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets πŸ–‹οΈ

Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising antivirus software from Bitdefender to dupe victims into downloading a remote access trojan called Venom RAT. The campaign indicates a "clear intent to target individuals for financial gain by compromising their credentials, crypto wallets, and potentially selling access to their systems," the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages πŸ–‹οΈ

Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russiaaffiliated threat actor dubbed Void Blizzard aka Laundry Bear that it said is attributed to "worldwide cloud abuse." Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian government objectives,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware πŸ–‹οΈ

A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting the Craft Content Management System CMS to deploy multiple payloads, including a cryptocurrency miner, a loader dubbed Mimo Loader, and residential proxyware. The vulnerability in question is CVE202532432, a maximum severity flaw in Craft CMS that was patched in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware πŸ–‹οΈ

A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting the Craft Content Management System CMS to deploy multiple payloads, including a cryptocurrency miner, a loader dubbed Mimo Loader, and residential proxyware. The vulnerability in question is CVE202532432, a maximum severity flaw in Craft CMS that was patched in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How 'Browser-in-the-Middle' Attacks Steal Sessions in Seconds πŸ–‹οΈ

Would you expect an end user to log on to a cybercriminals computer, open their browser, and type in their usernames and passwords? Hopefully not! But thats essentially what happens if they fall victim to a BrowserintheMiddle BitM attack. Like ManintheMiddle MitM attacks, BiTM sees criminals look to control the data flow between the victims computer and the target service, as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How 'Browser-in-the-Middle' Attacks Steal Sessions in Seconds πŸ–‹οΈ

Would you expect an end user to log on to a cybercriminals computer, open their browser, and type in their usernames and passwords? Hopefully not! But thats essentially what happens if they fall victim to a BrowserintheMiddle BitM attack. Like ManintheMiddle MitM attacks, BiTM sees criminals look to control the data flow between the victims computer and the target service, as.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale πŸ–‹οΈ

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilots code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of nonhuman identities NHIs across corporate clouds. That population is already overwhelming the enterprise many companies.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ–‹οΈ 251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a coordinated cloudbased scanning activity that targeted 75 distinct "exposure points" earlier this month. The activity, observed by GreyNoise on May 8, 2025, involved as many as 251 malicious IP addresses that are all geolocated to Japan and hosted by Amazon. "These IPs triggered 75 distinct behaviors, including CVE exploits,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch πŸ–‹οΈ

Cybersecurity researchers have disclosed details of a coordinated cloudbased scanning activity that targeted 75 distinct "exposure points" earlier this month. The activity, observed by GreyNoise on May 8, 2025, involved as many as 251 malicious IP addresses that are all geolocated to Japan and hosted by Amazon. "These IPs triggered 75 distinct behaviors, including CVE exploits,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats πŸ–‹οΈ

Apple on Tuesday revealed that it prevented over 9 billion in fraudulent transactions in the last five years, including more than 2 billion in 2024 alone. The company said the App Store is confronted by a wide range of threats that seek to defraud users in various ways, ranging from "deceptive apps designed to steal personal information to fraudulent payment schemes that attempt to exploit.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats πŸ–‹οΈ

Apple on Tuesday revealed that it prevented over 9 billion in fraudulent transactions in the last five years, including more than 2 billion in 2024 alone. The company said the App Store is confronted by a wide range of threats that seek to defraud users in various ways, ranging from "deceptive apps designed to steal personal information to fraudulent payment schemes that attempt to exploit.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency πŸ–‹οΈ

Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a cryptocurrency mining botnet. The attacks, designed to mine for Dero currency, is notable for its wormlike capabilities to propagate the malware to other exposed Docker instances and rope them into an evergrowing horde of mining bots. Kaspersky said it observed an unidentified threat.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency πŸ–‹οΈ

Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a cryptocurrency mining botnet. The attacks, designed to mine for Dero currency, is notable for its wormlike capabilities to propagate the malware to other exposed Docker instances and rope them into an evergrowing horde of mining bots. Kaspersky said it observed an unidentified threat.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets πŸ–‹οΈ

Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising antivirus software from Bitdefender to dupe victims into downloading a remote access trojan called Venom RAT. The campaign indicates a "clear intent to target individuals for financial gain by compromising their credentials, crypto wallets, and potentially selling access to their systems," the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets πŸ–‹οΈ

Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising antivirus software from Bitdefender to dupe victims into downloading a remote access trojan called Venom RAT. The campaign indicates a "clear intent to target individuals for financial gain by compromising their credentials, crypto wallets, and potentially selling access to their systems," the.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages πŸ–‹οΈ

Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russiaaffiliated threat actor dubbed Void Blizzard aka Laundry Bear that it said is attributed to "worldwide cloud abuse." Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian government objectives,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages πŸ–‹οΈ

Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russiaaffiliated threat actor dubbed Void Blizzard aka Laundry Bear that it said is attributed to "worldwide cloud abuse." Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian government objectives,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale πŸ–‹οΈ

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilots code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of nonhuman identities NHIs across corporate clouds. That population is already overwhelming the enterprise many companies.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale πŸ–‹οΈ

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilots code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of nonhuman identities NHIs across corporate clouds. That population is already overwhelming the enterprise many companies.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hundreds of Web Apps Have Full Access to Microsoft OneDrive Files πŸ•΅οΈβ€β™‚οΈ

Researchers at Oasis Security say the problem has to do with OneDrive File Picker having overly broad permissions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity