πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β™ŸοΈ Inside a Dark Adtech Empire Fed by Fake CAPTCHAs β™ŸοΈ

Late last year, security researchers made a startling discovery Kremlinbacked disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious advertising technology that powers a sprawling ecosystem of online hucksters and website hackers. A new report on the fallout from that investigation finds this dark ad tech industry is far more resilient and incestuous than previously known.

πŸ“– Read more.

πŸ”— Via "Krebs on Security"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network πŸ–‹οΈ

The threat actors behind the VexTrio Viper Traffic Distribution Service TDS have been linked to other TDS services like Help TDS and Disposable TDS, indicating that the sophisticated cybercriminal operation is a sprawling enterprise of its own that's designed to distribute malicious content. "VexTrio is a group of malicious adtech companies that distribute scams and harmful software via.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes πŸ–‹οΈ

Cybersecurity researchers have discovered a novel attack technique called TokenBreak that can be used to bypass a large language model's LLM safety and content moderation guardrails with just a single character change. "The TokenBreak attack targets a text classification model's tokenization strategy to induce false negatives, leaving end targets vulnerable to attacks that the implemented.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ–‹οΈ AI Agents Run on Secret Accounts β€” Learn How to Secure Them in This Webinar πŸ–‹οΈ

AI is changing everything from how we code, to how we sell, to how we secure. But while most conversations focus on what AI can do, this one focuses on what AI can break if youre not paying attention. Behind every AI agent, chatbot, or automation script lies a growing number of nonhuman identities API keys, service accounts, OAuth tokens silently operating in the background. And heres.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction πŸ–‹οΈ

A novel attack technique named EchoLeak has been characterized as a "zeroclick" artificial intelligence AI vulnerability that allows bad actors to exfiltrate sensitive data from Microsoft 365 Copilot's context sans any user interaction. The criticalrated vulnerability has been assigned the CVE identifier CVE202532711 CVSS score 9.3. It requires no customer action and has been already.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Non-Human Identities: How to Address the Expanding Security Risk πŸ–‹οΈ

Human identities management and control is pretty well done with its set of dedicated tools, frameworks, and best practices. This is a very different world when it comes to Nonhuman identities also referred to as machine identities. GitGuardians endtoend NHI security platform is here to close the gap. Enterprises are Losing Track of Their Machine Identities Machine identitiesservice.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks πŸ–‹οΈ

ConnectWise has disclosed that it's planning to rotate the digital code signing certificates used to sign ScreenConnect, ConnectWise Automate, and ConnectWise remote monitoring and management RMM executables due to security concerns. The company said it's doing so "due to concerns raised by a thirdparty researcher about how ScreenConnect handled certain configuration data in earlier versions.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool πŸ–‹οΈ

Cybersecurity researchers have uncovered a new account takeover ATO campaign that leverages an opensource penetration testing framework called TeamFiltration to breach Microsoft Entra ID formerly Azure Active Directory user accounts. The activity, codenamed UNKSneakyStrike by Proofpoint, has targeted over 80,000 user accounts across hundreds of organizations' cloud tenants since a surge in.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks πŸ–‹οΈ

Former members tied to the Black Basta ransomware operation have been observed sticking to their triedandtested approach of email bombing and Microsoft Teams phishing to establish persistent access to target networks. "Recently, attackers have introduced Python script execution alongside these techniques, using cURL requests to fetch and deploy malicious payloads," ReliaQuest said in a report.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager πŸ–‹οΈ

Threat intelligence firm GreyNoise has warned of a "coordinated bruteforce activity" targeting Apache Tomcat Manager interfaces. The company said it observed a surge in bruteforce and login attempts on June 5, 2025, an indication that they could be deliberate efforts to "identify and access exposed Tomcat services at scale." To that end, 295 unique IP addresses have been found to be engaged.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure πŸ–‹οΈ

INTERPOL on Wednesday announced the dismantling of more than 20,000 malicious IP addresses or domains that have been linked to 69 informationstealing malware variants. The joint action, codenamed Operation Secure, took place between January and April 2025, and involved law enforcement agencies from 26 countries to identify servers, map physical networks, and execute targeted takedowns. "These.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Why DNS Security Is Your First Defense Against Cyber Attacks? πŸ–‹οΈ

In todays cybersecurity landscape, much of the focus is placed on firewalls, antivirus software, and endpoint detection. While these tools are essential, one critical layer often goes overlooked the Domain Name System DNS. As the starting point of nearly every online interaction, DNS is not only foundational its increasingly a target. When left unsecured, it becomes a single point of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords πŸ–‹οΈ

Two security vulnerabilities have been disclosed in SinoTrack GPS devices that could be exploited to control certain remote functions on connected vehicles and even track their locations. "Successful exploitation of these vulnerabilities could allow an attacker to access device profiles without authorization through the common web management interface," the U.S. Cybersecurity and Infrastructure.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Build a Lean Security Model: 5 Lessons from River Island πŸ–‹οΈ

In todays security landscape, budgets are tight, attack surfaces are sprawling, and new threats emerge daily. Maintaining a strong security posture under these circumstances without a large team or budget can be a real challenge. Yet lean security models are not only possible they can be highly effective. River Island, one of the UKs leading fashion retailers, offers a powerful.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild πŸ–‹οΈ

Microsoft has released patches to fix 67 security flaws, including one zeroday bug in Web Distributed Authoring and Versioning WebDAV that it said has come under active exploitation in the wild. Of the 67 vulnerabilities, 11 are rated Critical and 56 are rated Important in severity. This includes 26 remote code execution flaws, 17 information disclosure flaws, and 14 privilege escalation.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Palo Alto Networks Patches Series of Vulnerabilities πŸ“”

The cybersecurity provider also implemented recent fixes in Chromium that affected its Prisma Access Browser.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🀯2
πŸ“” NIST Publishes New Zero Trust Implementation Guidance πŸ“”

The new NIST guidance sets out 19 example implementations of zero trust using commercial, offtheshelf technologies.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Europol Says Criminal Demand for Data is β€œSkyrocketing” πŸ“”

Europol warns of vicious circle of data breaches and cybercrime.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Phishing Alert as Erie Insurance Reveals Cyber β€œEvent” πŸ“”

Erie Insurance reveals suspected network breach and ongoing outage.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Congress Introduces Bill to Strengthen Healthcare Cybersecurity πŸ“”

The legislation aims to expand the federal governments role in helping healthcare providers protect and respond to cyberattacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 20,000 Asian IPs and Domains Dismantled in Infostealer Crackdown πŸ“”

Interpolcoordinated Operation Secure led to 32 arrests, including the suspected ringleader of a cybercriminal organization.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity