πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” #Infosec2025: Over 90% of Top Email Domains Vulnerable to Spoofing Attacks πŸ“”

EasyDMARC found that just 7.7 of the worlds top 1.8 million email domains have implemented the most stringent DMARC policy.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Microsoft Defender Antivirus vs McAfee: Which Is Better for Your PC Security? 🦿

Compare Microsoft Defender Antivirus and McAfee features to find the best antivirus for you. Discover the right choice for your security needs.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Browser Exploit Technique Undermines Phishing Detection πŸ“”

Fullscreen BrowserintheMiddle attacks are making it harder for users to detect malicious websites.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ–‹οΈ New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers πŸ–‹οΈ

Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS and PE headers, according to new findings from Fortinet. The DOS Disk Operating System and PE Portable Executable headers are essential parts of a Windows PE file, providing information about the executable. While the DOS header makes the executable file backward compatible.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Breach at data analytics firm impacts 364,000 people πŸ“’

Hackers used company GitHub account to steal software bits and personal information, company admits.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ A Defense-in-Depth Approach for the Modern Era πŸ•΅οΈβ€β™‚οΈ

By integrating intelligent network policies, zerotrust principles, and AIdriven insights, enterprises can create a robust defense against the next generation of cyber threats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ConnectWise Confirms Hack, β€œVery Small Number” of Customers Affected πŸ“”

The firms remote monitoring management tool, ScreenConnect, has reportedly been patched.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools πŸ–‹οΈ

Fake installers for popular artificial intelligence AI tools like OpenAI ChatGPT and InVideo AI are being used as lures to propagate various threats, such as the CyberLock and LuckyGh0t ransomware families, and a new malware dubbed Numero. "CyberLock ransomware, developed using PowerShell, primarily focuses on encrypting specific files on the victim's system," Cisco Talos researcher Chetan.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ PumaBot Targets Linux Devices in Latest Botnet Campaign πŸ•΅οΈβ€β™‚οΈ

While the botnet may not be completely automated, it uses certain tactics when targeting devices that indicate that it may, at the very least, be semiautomated.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Victoria's Secret Goes Offline After 'Incident' Claims πŸ•΅οΈβ€β™‚οΈ

The lingerie retailer isn't revealing much about the security incident it's dealing with but has brought in thirdparty experts to address the issue.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Botnet Plants Persistent Backdoors in ASUS Routers πŸ•΅οΈβ€β™‚οΈ

Thousands of ASUS routers have been infected and are believed to be part of a wideranging ORB network affecting devices from Linksys, DLink, QNAP, and Araknis Network.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ SentinelOne Reports Services Are Back Online After Global Outage πŸ•΅οΈβ€β™‚οΈ

The outage reportedly hit 10 commercial customer consoles for SentinelOne's Singularity platform, including Singularity Endpoint, XDR, Cloud Security, Identity, Data Lake, RemoteOps, and more.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Zscaler's Buyout of Red Canary Shows Telemetry's Value πŸ•΅οΈβ€β™‚οΈ

Red Canary's MDR portfolio complements Zscaler's purchase last year of Israeli startup Avalor, which automates collection, curation, and enrichment of security data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ APT41 Uses Google Calendar Events for C2 πŸ•΅οΈβ€β™‚οΈ

APT41, a Chinese statesponsored threat actor also known as "Double Dragon," used Google Calendar as commandandcontrol infrastructure during a campaign last fall.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 North Korea’s Laptop Farm Scam: β€˜Something We’d Never Seen Before’ 🦿

Officials uncover how North Korean operatives used stolen identities and remotecontrolled tech to infiltrate American companies and steal corporate data.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ U.S. Sanctions Cloud Provider β€˜Funnull’ as Top Source of β€˜Pig Butchering’ Scams β™ŸοΈ

The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippinesbased company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams, commonly known as pig butchering." In January 2025, KrebsOnSecurity detailed how Funnull was being used as a content delivery network that catered to cybercriminals seeking to route their traffic through U.S.based cloud providers.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas πŸ–‹οΈ

Meta on Thursday revealed that it disrupted three covert influence operations originating from Iran, China, and Romania during the first quarter of 2025. "We detected and removed these campaigns before they were able to build authentic audiences on our apps," the social media giant said in its quarterly Adversarial Threat Report. This included a network of 658 accounts on Facebook, 14 Pages, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ 'Everest Group' Extorts Global Orgs via SAP's HR Tool πŸ•΅οΈβ€β™‚οΈ

In addition to CocaCola, entities in Abu Dhabi, Jordan, Namibia, South Africa, and Switzerland are experiencing extortion attacks, all involving stolen SAP SuccessFactor data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach πŸ–‹οΈ

ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nationstate threat actor. "ConnectWise recently learned of suspicious activity within our environment that we believe was tied to a sophisticated nationstate actor, which affected a very small number of ScreenConnect.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ¦… The Week in Vulnerabilities: Cyble Sensors Detects Attack Attempts on SAP, Ivanti πŸ¦…

Cyble The Week in Vulnerabilities Cyble Sensors Detects Attack Attempts on SAP, Ivanti " dataimagecaption"Cyble The Week in Vulnerabilities Cyble Sensors Detects Attack Attempts on SAP, Ivanti " datamediumfile"httpscyble.comwpcontentuploads202505CybleBlogsCybleSensors300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202505CybleBlogsCybleSensors.jpg" title"The Week in Vulnerabilities Cyble Sensors Detects Attack Attempts on SAP, Ivanti 1" Attack attempts picked up by Cyble Sensors' honeypots highlight threat actors' resourcefulness and the need for strong security defenses. Cyble's honeypot sensors have detected attack attempts on product vulnerabilities from SAP and Ivanti, among other vulnerabilities targeted this week. The sensors, part of Cyble's Threat Hunting service, c...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Urged to Enrich KEV Catalog with More Contextual Data πŸ“”

Security teams should use vulnerability context alongside KEV lists to prioritize patching, OX argued.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity