πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages πŸ–‹οΈ

Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russiaaffiliated threat actor dubbed Void Blizzard aka Laundry Bear that it said is attributed to "worldwide cloud abuse." Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian government objectives,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale πŸ–‹οΈ

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilots code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of nonhuman identities NHIs across corporate clouds. That population is already overwhelming the enterprise many companies.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale πŸ–‹οΈ

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilots code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of nonhuman identities NHIs across corporate clouds. That population is already overwhelming the enterprise many companies.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Hundreds of Web Apps Have Full Access to Microsoft OneDrive Files πŸ•΅οΈβ€β™‚οΈ

Researchers at Oasis Security say the problem has to do with OneDrive File Picker having overly broad permissions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Implementing Secure by Design Principles for AI πŸ•΅οΈβ€β™‚οΈ

Harnessing AI's full transformative potential safely and securely requires more than an incremental enhancement of existing cybersecurity practices. A Secure by Design approach represents the best path forward.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ•΅οΈβ€β™‚οΈ Cellcom Restores Regional Mobile Services After Cyberattack πŸ•΅οΈβ€β™‚οΈ

Customers in parts of Wisconsin and Michigan could not make calls or send text messages for nearly a week after an incident on May 14, and service is still intermittent in some areas.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Pakistan Arrests 21 in β€˜Heartsender’ Malware Service β™ŸοΈ

Authorities in Pakistan have arrested 21 individuals accused of operating "Heartsender," a once popular spam and malware dissemination service that operated for more than a decade. The main clientele for HeartSender were organized crime groups that tried to trick victim companies into making payments to a third party, and its alleged proprietors were publicly identified by KrebsOnSecurity in 2021 after they inadvertently infected their computers with malware.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore πŸ–‹οΈ

An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and extortion scheme involving the Robbinhood ransomware. Sina Gholinejad aka Sina Ghaaf, 37, and his coconspirators are said to have breached the computer networks of various organizations in the United States and encrypted files with Robbinhood ransomware to demand Bitcoin ransom payments.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack πŸ–‹οΈ

The Czech Republic on Wednesday formally accused a threat actor associated with the People's Republic of China PRC of targeting its Ministry of Foreign Affairs. In a public statement, the government said it identified China as the culprit behind a malicious campaign targeting one of the unclassified networks of the Czech Ministry of Foreign Affairs. The extent of the breach is presently not.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin πŸ–‹οΈ

Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that could be exploited by unauthenticated attackers to upload arbitrary files. TI WooCommerce Wishlist, which has over 100,000 active installations, is a tool to allow ecommerce site customers to save their favorite products for later and share the lists on social.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Do you really need to fix that critical flaw? πŸ“’

Many CVEs represent no risk in a cloud container environment, researchers claim.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Two more NHS Trusts have been hit with cyber attacks – here’s what we know so far πŸ“’

A flaw in a thirdparty device management tool appears to be the source of the incident.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ GoTo and Acronis partnership looks to bolster endpoint management for MSPs πŸ“’

The new strategic partnership includes the launch of the LogMeIn Data Protection Suite powered by Acronis.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'Haozi' Gang Sells Turnkey Phishing Tools to Amateurs πŸ•΅οΈβ€β™‚οΈ

The phishing operation is using Telegram groups to sell a phishingasaservice kit with customer service, a mascot, and infrastructure that requires little technical knowledge to install.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Certified Randomness Uses Quantum Cryptography to Make Stronger Keys πŸ•΅οΈβ€β™‚οΈ

Researchers are using quantum computers to generate keys that are truly random to strengthen data encryption.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints πŸ–‹οΈ

The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider's MSP SimpleHelp remote monitoring and management RMM tool, and then leveraged it to exfiltrate data and drop the locker on multiple endpoints. It's believed that the attackers exploited a trio of security flaws in SimpleHelp CVE202457727, CVE202457728, and CVE202457726 that were.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations πŸ–‹οΈ

Google on Wednesday disclosed that the Chinese statesponsored threat actor known as APT41 leveraged a malware called TOUGHPROGRESS that uses Google Calendar for commandandcontrol C2. The tech giant, which discovered the activity in late October 2024, said the malware was hosted on a compromised government website and was used to target multiple other government entities. "Misuse of cloud.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malware Analysis Reveals Sophisticated RAT With Corrupted Headers πŸ“”

Fortinet has identified a new Windows RAT operating stealthily on compromised systems with advanced evasion techniques.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Thousands of ASUS Routers Hijacked in Stealthy Backdoor Campaign πŸ“”

A threat actor has used ASUS routers legitimate features to create persistent backdoors that survive firmware updates and reboots.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybersecurity Teams Generate Average of $36M in Business Growth πŸ“”

A new EY report found that cybersecurity teams are a major vehicle for business growth, and CISOs should push for a seat at the top table.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2025: Over 90% of Top Email Domains Vulnerable to Spoofing Attacks πŸ“”

EasyDMARC found that just 7.7 of the worlds top 1.8 million email domains have implemented the most stringent DMARC policy.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity