πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ SentinelOne Reports Services Are Back Online After Global Outage πŸ•΅οΈβ€β™‚οΈ

The outage reportedly hit 10 commercial customer consoles for SentinelOne's Singularity platform, including Singularity Endpoint, XDR, Cloud Security, Identity, Data Lake, RemoteOps, and more.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Zscaler's Buyout of Red Canary Shows Telemetry's Value πŸ•΅οΈβ€β™‚οΈ

Red Canary's MDR portfolio complements Zscaler's purchase last year of Israeli startup Avalor, which automates collection, curation, and enrichment of security data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ APT41 Uses Google Calendar Events for C2 πŸ•΅οΈβ€β™‚οΈ

APT41, a Chinese statesponsored threat actor also known as "Double Dragon," used Google Calendar as commandandcontrol infrastructure during a campaign last fall.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 North Korea’s Laptop Farm Scam: β€˜Something We’d Never Seen Before’ 🦿

Officials uncover how North Korean operatives used stolen identities and remotecontrolled tech to infiltrate American companies and steal corporate data.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ U.S. Sanctions Cloud Provider β€˜Funnull’ as Top Source of β€˜Pig Butchering’ Scams β™ŸοΈ

The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippinesbased company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams, commonly known as pig butchering." In January 2025, KrebsOnSecurity detailed how Funnull was being used as a content delivery network that catered to cybercriminals seeking to route their traffic through U.S.based cloud providers.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas πŸ–‹οΈ

Meta on Thursday revealed that it disrupted three covert influence operations originating from Iran, China, and Romania during the first quarter of 2025. "We detected and removed these campaigns before they were able to build authentic audiences on our apps," the social media giant said in its quarterly Adversarial Threat Report. This included a network of 658 accounts on Facebook, 14 Pages, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ 'Everest Group' Extorts Global Orgs via SAP's HR Tool πŸ•΅οΈβ€β™‚οΈ

In addition to CocaCola, entities in Abu Dhabi, Jordan, Namibia, South Africa, and Switzerland are experiencing extortion attacks, all involving stolen SAP SuccessFactor data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach πŸ–‹οΈ

ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nationstate threat actor. "ConnectWise recently learned of suspicious activity within our environment that we believe was tied to a sophisticated nationstate actor, which affected a very small number of ScreenConnect.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ¦… The Week in Vulnerabilities: Cyble Sensors Detects Attack Attempts on SAP, Ivanti πŸ¦…

Cyble The Week in Vulnerabilities Cyble Sensors Detects Attack Attempts on SAP, Ivanti " dataimagecaption"Cyble The Week in Vulnerabilities Cyble Sensors Detects Attack Attempts on SAP, Ivanti " datamediumfile"httpscyble.comwpcontentuploads202505CybleBlogsCybleSensors300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202505CybleBlogsCybleSensors.jpg" title"The Week in Vulnerabilities Cyble Sensors Detects Attack Attempts on SAP, Ivanti 1" Attack attempts picked up by Cyble Sensors' honeypots highlight threat actors' resourcefulness and the need for strong security defenses. Cyble's honeypot sensors have detected attack attempts on product vulnerabilities from SAP and Ivanti, among other vulnerabilities targeted this week. The sensors, part of Cyble's Threat Hunting service, c...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Urged to Enrich KEV Catalog with More Contextual Data πŸ“”

Security teams should use vulnerability context alongside KEV lists to prioritize patching, OX argued.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download 🦿

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Dutch Police Lead Shut Down of Counter AV Service AVCheck πŸ“”

Dutch, US and Finnish investigators have taken cybercrime service AVCheck offline.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are using fake tool installers to dupe victims – and AI tools like ChatGPT are a key target πŸ“’

Cisco Talos said it has uncovered malware disguised as a lead monetization platform and a ChatGPT installer.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats πŸ–‹οΈ

The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As attackers become more sophisticated leveraging encryption, livingofftheland techniques, and lateral movement to evade traditional defenses security teams are finding more threats wreaking havoc before they can be detected. Even after an attack has been identified, it can.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions πŸ–‹οΈ

Cybersecurity researchers have warned of a new spearphishing campaign that uses a legitimate remote access tool called Netbird to target Chief Financial Officers CFOs and financial executives at banks, energy companies, insurers, and investment firms across Europe, Africa, Canada, the Middle East, and South Asia.  "In what appears to be a multistage phishing operation, the attackers.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Dutch Police Lead Shut Down of Counter AV Service AVCheck πŸ“”

Dutch, US and Finnish investigators have taken cybercrime service AVCheck offline.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown πŸ“”

A report on the dark web marketplace Russian Market showed Acreed has emerged as the leading infostealer.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More πŸ–‹οΈ

If this had been a security drill, someone wouldve said it went too far. But it wasnt a drillit was real. The access? Everything looked normal. The tools? Easy to find. The detection? Came too late. This is how attacks happen nowquiet, convincing, and fast. Defenders arent just chasing hackers anymoretheyre struggling to trust what their systems are telling them. The problem isnt too.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2025: Ransomware Drill to Spotlight Water Utility Cyber Risks in β€˜Operation 999’ πŸ“”

Semperis will host an immersive ransomware simulation focused on water utilities during Infosecurity Europe 2025.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CISA Issues Advisories Highlighting Siemens SiPass and Other Critical Vulnerabilities targeting ICS systems πŸ¦…

Cyble CISA Issues Advisories Highlighting Siemens SiPass and Other Critical Vulnerabilities targeting ICS systems " dataimagecaption"Cyble CISA Issues Advisories Highlighting Siemens SiPass and Other Critical Vulnerabilities targeting ICS systems " datamediumfile"httpscyble.comwpcontentuploads202506CybleBlogsSiemens300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202506CybleBlogsSiemens.jpg" title"CISA Issues Advisories Highlighting Siemens SiPass and Other Critical Vulnerabilities targeting ICS systems 1" The U.S. Cybersecurity and Infrastructure Security Agency CISA released five new ICS advisories this week, drawing attention to severe vulnerabilities affecting industrial and medical systems worldwide. Among the most notable disclosures are flaws in Siemens SiPass, Consili...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cryptojacking Campaign Targets DevOps Servers Including Nomad πŸ“”

Wiz finds new threat group running cryptojacking campaign via exploited and misconfigured DevOps assets.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity