πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΅οΈβ€β™‚οΈ Infostealer Ring Bust-up Takes Down 20,000 Malicious IPs πŸ•΅οΈβ€β™‚οΈ

Interpol's Operation Secure arrested more than 30 suspects across Vietnam, Sri Lanka, and Nauru, and seized 117 commandandcontrol servers allegedly used to run widespread phishing, business email compromise, and other cyber scams.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ ConnectWise to Rotate Code-Signing Certificates πŸ•΅οΈβ€β™‚οΈ

The move is unrelated to a recent nationstate attack the vendor endured but stems from a report by a thirdparty researcher.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Agentic AI Takes Over Gartner's SRM Summit πŸ•΅οΈβ€β™‚οΈ

Agentic AI was everywhere at Gartner's Security Risk Management Summit in Washington, DC, this year, as the AI security product engine chugs ahead at full speed.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Google Bug Allowed Brute-Forcing of Any User Phone Number πŸ•΅οΈβ€β™‚οΈ

The weakness in Google's passwordrecovery page, discovered by a researcher called Brutecat, exposed private user contact information to attackers, opening the door to phishing, SIMswapping, and other attacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Securonix Acquires Threat Intelligence Firm ThreatQuotient πŸ•΅οΈβ€β™‚οΈ

The deal will combine Securonix's security information and event management SIEM platform with ThreatQuotient's threat detection and incident response TDIR offering to build an allinone security operations stack.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Security Pitfalls & Solutions of Multiregion Cloud Architectures πŸ•΅οΈβ€β™‚οΈ

Cloud resilience is no longer just about surviving service interruptions it's about operating securely under any circumstances, across any geographic area.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Mirai Botnets Exploit Flaw in Wazuh Security Platform πŸ•΅οΈβ€β™‚οΈ

The two campaigns are good examples of the evershrinking timetoexploit timelines that botnet operators have adopted for newly published CVEs.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ India's Security Leaders Struggle to Keep Up With Threats πŸ•΅οΈβ€β™‚οΈ

Business and security executives in the South Asian nation worry over AI, cybersecurity, new digital privacy regulations, and a talent gap that hobbles innovation.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Patch Tuesday: Microsoft Patches 68 Security Flaws, Including One for Targeted Espionage 🦿

Security experts offer their takes on some of the flaws, including a set of vulnerabilities that could enable remote code execution in Microsoft Office.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
🦿 Will New AI Browser Dia Redefine How We Use the Web? 🦿

Dia, a new AI browser from the makers of Arc, is available in beta on macOS, and only to existing Arc members or individuals theyve invited.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
🦿 Is Google Password Manager Safe to Use in 2025? 🦿

Google Password Manager is a free password management service built into Chrome and Google apps. Learn how it works and how secure it is in this detailed review.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
🦿 Google Releases Android 16: What’s New and What’s Missing 🦿

Android 16 debuts with smarter notifications, improved hearing aid support, and advanced security tools for highrisk users. Its rolling out now to Pixel devices.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
β™ŸοΈ Inside a Dark Adtech Empire Fed by Fake CAPTCHAs β™ŸοΈ

Late last year, security researchers made a startling discovery Kremlinbacked disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious advertising technology that powers a sprawling ecosystem of online hucksters and website hackers. A new report on the fallout from that investigation finds this dark ad tech industry is far more resilient and incestuous than previously known.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network πŸ–‹οΈ

The threat actors behind the VexTrio Viper Traffic Distribution Service TDS have been linked to other TDS services like Help TDS and Disposable TDS, indicating that the sophisticated cybercriminal operation is a sprawling enterprise of its own that's designed to distribute malicious content. "VexTrio is a group of malicious adtech companies that distribute scams and harmful software via.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes πŸ–‹οΈ

Cybersecurity researchers have discovered a novel attack technique called TokenBreak that can be used to bypass a large language model's LLM safety and content moderation guardrails with just a single character change. "The TokenBreak attack targets a text classification model's tokenization strategy to induce false negatives, leaving end targets vulnerable to attacks that the implemented.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ AI Agents Run on Secret Accounts β€” Learn How to Secure Them in This Webinar πŸ–‹οΈ

AI is changing everything from how we code, to how we sell, to how we secure. But while most conversations focus on what AI can do, this one focuses on what AI can break if youre not paying attention. Behind every AI agent, chatbot, or automation script lies a growing number of nonhuman identities API keys, service accounts, OAuth tokens silently operating in the background. And heres.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction πŸ–‹οΈ

A novel attack technique named EchoLeak has been characterized as a "zeroclick" artificial intelligence AI vulnerability that allows bad actors to exfiltrate sensitive data from Microsoft 365 Copilot's context sans any user interaction. The criticalrated vulnerability has been assigned the CVE identifier CVE202532711 CVSS score 9.3. It requires no customer action and has been already.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Non-Human Identities: How to Address the Expanding Security Risk πŸ–‹οΈ

Human identities management and control is pretty well done with its set of dedicated tools, frameworks, and best practices. This is a very different world when it comes to Nonhuman identities also referred to as machine identities. GitGuardians endtoend NHI security platform is here to close the gap. Enterprises are Losing Track of Their Machine Identities Machine identitiesservice.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks πŸ–‹οΈ

ConnectWise has disclosed that it's planning to rotate the digital code signing certificates used to sign ScreenConnect, ConnectWise Automate, and ConnectWise remote monitoring and management RMM executables due to security concerns. The company said it's doing so "due to concerns raised by a thirdparty researcher about how ScreenConnect handled certain configuration data in earlier versions.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool πŸ–‹οΈ

Cybersecurity researchers have uncovered a new account takeover ATO campaign that leverages an opensource penetration testing framework called TeamFiltration to breach Microsoft Entra ID formerly Azure Active Directory user accounts. The activity, codenamed UNKSneakyStrike by Proofpoint, has targeted over 80,000 user accounts across hundreds of organizations' cloud tenants since a surge in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks πŸ–‹οΈ

Former members tied to the Black Basta ransomware operation have been observed sticking to their triedandtested approach of email bombing and Microsoft Teams phishing to establish persistent access to target networks. "Recently, attackers have introduced Python script execution alongside these techniques, using cURL requests to fetch and deploy malicious payloads," ReliaQuest said in a report.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity