πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas πŸ–‹οΈ

Meta on Thursday revealed that it disrupted three covert influence operations originating from Iran, China, and Romania during the first quarter of 2025. "We detected and removed these campaigns before they were able to build authentic audiences on our apps," the social media giant said in its quarterly Adversarial Threat Report. This included a network of 658 accounts on Facebook, 14 Pages, and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ 'Everest Group' Extorts Global Orgs via SAP's HR Tool πŸ•΅οΈβ€β™‚οΈ

In addition to CocaCola, entities in Abu Dhabi, Jordan, Namibia, South Africa, and Switzerland are experiencing extortion attacks, all involving stolen SAP SuccessFactor data.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach πŸ–‹οΈ

ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nationstate threat actor. "ConnectWise recently learned of suspicious activity within our environment that we believe was tied to a sophisticated nationstate actor, which affected a very small number of ScreenConnect.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ¦… The Week in Vulnerabilities: Cyble Sensors Detects Attack Attempts on SAP, Ivanti πŸ¦…

Cyble The Week in Vulnerabilities Cyble Sensors Detects Attack Attempts on SAP, Ivanti " dataimagecaption"Cyble The Week in Vulnerabilities Cyble Sensors Detects Attack Attempts on SAP, Ivanti " datamediumfile"httpscyble.comwpcontentuploads202505CybleBlogsCybleSensors300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202505CybleBlogsCybleSensors.jpg" title"The Week in Vulnerabilities Cyble Sensors Detects Attack Attempts on SAP, Ivanti 1" Attack attempts picked up by Cyble Sensors' honeypots highlight threat actors' resourcefulness and the need for strong security defenses. Cyble's honeypot sensors have detected attack attempts on product vulnerabilities from SAP and Ivanti, among other vulnerabilities targeted this week. The sensors, part of Cyble's Threat Hunting service, c...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” CISA Urged to Enrich KEV Catalog with More Contextual Data πŸ“”

Security teams should use vulnerability context alongside KEV lists to prioritize patching, OX argued.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download 🦿

TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Dutch Police Lead Shut Down of Counter AV Service AVCheck πŸ“”

Dutch, US and Finnish investigators have taken cybercrime service AVCheck offline.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Hackers are using fake tool installers to dupe victims – and AI tools like ChatGPT are a key target πŸ“’

Cisco Talos said it has uncovered malware disguised as a lead monetization platform and a ChatGPT installer.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats πŸ–‹οΈ

The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As attackers become more sophisticated leveraging encryption, livingofftheland techniques, and lateral movement to evade traditional defenses security teams are finding more threats wreaking havoc before they can be detected. Even after an attack has been identified, it can.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions πŸ–‹οΈ

Cybersecurity researchers have warned of a new spearphishing campaign that uses a legitimate remote access tool called Netbird to target Chief Financial Officers CFOs and financial executives at banks, energy companies, insurers, and investment firms across Europe, Africa, Canada, the Middle East, and South Asia.  "In what appears to be a multistage phishing operation, the attackers.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Dutch Police Lead Shut Down of Counter AV Service AVCheck πŸ“”

Dutch, US and Finnish investigators have taken cybercrime service AVCheck offline.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown πŸ“”

A report on the dark web marketplace Russian Market showed Acreed has emerged as the leading infostealer.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ⚑ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More πŸ–‹οΈ

If this had been a security drill, someone wouldve said it went too far. But it wasnt a drillit was real. The access? Everything looked normal. The tools? Easy to find. The detection? Came too late. This is how attacks happen nowquiet, convincing, and fast. Defenders arent just chasing hackers anymoretheyre struggling to trust what their systems are telling them. The problem isnt too.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2025: Ransomware Drill to Spotlight Water Utility Cyber Risks in β€˜Operation 999’ πŸ“”

Semperis will host an immersive ransomware simulation focused on water utilities during Infosecurity Europe 2025.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CISA Issues Advisories Highlighting Siemens SiPass and Other Critical Vulnerabilities targeting ICS systems πŸ¦…

Cyble CISA Issues Advisories Highlighting Siemens SiPass and Other Critical Vulnerabilities targeting ICS systems " dataimagecaption"Cyble CISA Issues Advisories Highlighting Siemens SiPass and Other Critical Vulnerabilities targeting ICS systems " datamediumfile"httpscyble.comwpcontentuploads202506CybleBlogsSiemens300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202506CybleBlogsSiemens.jpg" title"CISA Issues Advisories Highlighting Siemens SiPass and Other Critical Vulnerabilities targeting ICS systems 1" The U.S. Cybersecurity and Infrastructure Security Agency CISA released five new ICS advisories this week, drawing attention to severe vulnerabilities affecting industrial and medical systems worldwide. Among the most notable disclosures are flaws in Siemens SiPass, Consili...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Cryptojacking Campaign Targets DevOps Servers Including Nomad πŸ“”

Wiz finds new threat group running cryptojacking campaign via exploited and misconfigured DevOps assets.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ In the AI Race With China, Don't Forget About Security πŸ•΅οΈβ€β™‚οΈ

The US needs to establish a clear framework to provide reasonable guardrails to protect its interests the quicker, the better.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ“” Sophisticated Malware Campaign Targets Windows and Linux Systems πŸ“”

A new malware campaign targeting Windows and Linux systems has been identified, deploying tools for evasion and credential theft.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ AVCheck cyber crime service snared in police takedown πŸ“’

Authorities have seized the domains of AVCheck, one of the largest counter antivirus services used by cybercriminals around the world.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New Linux Vulnerabilities Expose Password Hashes via Core Dumps πŸ“”

Two local information disclosure flaws in Linux crashreporting tools have been identified exposing system data to attackers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU πŸ–‹οΈ

Qualcomm has shipped security updates to address three zeroday vulnerabilities that it said have been exploited in limited, targeted attacks in the wild. The flaws in question, which were responsibly disclosed to the company by the Google Android Security team, are listed below CVE202521479 and CVE202521480 CVSS score 8.6 Two incorrect authorization vulnerabilities in the Graphics.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity