πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack πŸ–‹οΈ

The Czech Republic on Wednesday formally accused a threat actor associated with the People's Republic of China PRC of targeting its Ministry of Foreign Affairs. In a public statement, the government said it identified China as the culprit behind a malicious campaign targeting one of the unclassified networks of the Czech Ministry of Foreign Affairs. The extent of the breach is presently not.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin πŸ–‹οΈ

Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that could be exploited by unauthenticated attackers to upload arbitrary files. TI WooCommerce Wishlist, which has over 100,000 active installations, is a tool to allow ecommerce site customers to save their favorite products for later and share the lists on social.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Do you really need to fix that critical flaw? πŸ“’

Many CVEs represent no risk in a cloud container environment, researchers claim.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Two more NHS Trusts have been hit with cyber attacks – here’s what we know so far πŸ“’

A flaw in a thirdparty device management tool appears to be the source of the incident.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ GoTo and Acronis partnership looks to bolster endpoint management for MSPs πŸ“’

The new strategic partnership includes the launch of the LogMeIn Data Protection Suite powered by Acronis.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ 'Haozi' Gang Sells Turnkey Phishing Tools to Amateurs πŸ•΅οΈβ€β™‚οΈ

The phishing operation is using Telegram groups to sell a phishingasaservice kit with customer service, a mascot, and infrastructure that requires little technical knowledge to install.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Certified Randomness Uses Quantum Cryptography to Make Stronger Keys πŸ•΅οΈβ€β™‚οΈ

Researchers are using quantum computers to generate keys that are truly random to strengthen data encryption.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints πŸ–‹οΈ

The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider's MSP SimpleHelp remote monitoring and management RMM tool, and then leveraged it to exfiltrate data and drop the locker on multiple endpoints. It's believed that the attackers exploited a trio of security flaws in SimpleHelp CVE202457727, CVE202457728, and CVE202457726 that were.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations πŸ–‹οΈ

Google on Wednesday disclosed that the Chinese statesponsored threat actor known as APT41 leveraged a malware called TOUGHPROGRESS that uses Google Calendar for commandandcontrol C2. The tech giant, which discovered the activity in late October 2024, said the malware was hosted on a compromised government website and was used to target multiple other government entities. "Misuse of cloud.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Malware Analysis Reveals Sophisticated RAT With Corrupted Headers πŸ“”

Fortinet has identified a new Windows RAT operating stealthily on compromised systems with advanced evasion techniques.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Thousands of ASUS Routers Hijacked in Stealthy Backdoor Campaign πŸ“”

A threat actor has used ASUS routers legitimate features to create persistent backdoors that survive firmware updates and reboots.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cybersecurity Teams Generate Average of $36M in Business Growth πŸ“”

A new EY report found that cybersecurity teams are a major vehicle for business growth, and CISOs should push for a seat at the top table.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2025: Over 90% of Top Email Domains Vulnerable to Spoofing Attacks πŸ“”

EasyDMARC found that just 7.7 of the worlds top 1.8 million email domains have implemented the most stringent DMARC policy.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Microsoft Defender Antivirus vs McAfee: Which Is Better for Your PC Security? 🦿

Compare Microsoft Defender Antivirus and McAfee features to find the best antivirus for you. Discover the right choice for your security needs.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Browser Exploit Technique Undermines Phishing Detection πŸ“”

Fullscreen BrowserintheMiddle attacks are making it harder for users to detect malicious websites.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ–‹οΈ New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers πŸ–‹οΈ

Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS and PE headers, according to new findings from Fortinet. The DOS Disk Operating System and PE Portable Executable headers are essential parts of a Windows PE file, providing information about the executable. While the DOS header makes the executable file backward compatible.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Breach at data analytics firm impacts 364,000 people πŸ“’

Hackers used company GitHub account to steal software bits and personal information, company admits.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ A Defense-in-Depth Approach for the Modern Era πŸ•΅οΈβ€β™‚οΈ

By integrating intelligent network policies, zerotrust principles, and AIdriven insights, enterprises can create a robust defense against the next generation of cyber threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ConnectWise Confirms Hack, β€œVery Small Number” of Customers Affected πŸ“”

The firms remote monitoring management tool, ScreenConnect, has reportedly been patched.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools πŸ–‹οΈ

Fake installers for popular artificial intelligence AI tools like OpenAI ChatGPT and InVideo AI are being used as lures to propagate various threats, such as the CyberLock and LuckyGh0t ransomware families, and a new malware dubbed Numero. "CyberLock ransomware, developed using PowerShell, primarily focuses on encrypting specific files on the victim's system," Cisco Talos researcher Chetan.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ PumaBot Targets Linux Devices in Latest Botnet Campaign πŸ•΅οΈβ€β™‚οΈ

While the botnet may not be completely automated, it uses certain tactics when targeting devices that indicate that it may, at the very least, be semiautomated.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity