πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ–‹οΈ Why DNS Security Is Your First Defense Against Cyber Attacks? πŸ–‹οΈ

In todays cybersecurity landscape, much of the focus is placed on firewalls, antivirus software, and endpoint detection. While these tools are essential, one critical layer often goes overlooked the Domain Name System DNS. As the starting point of nearly every online interaction, DNS is not only foundational its increasingly a target. When left unsecured, it becomes a single point of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords πŸ–‹οΈ

Two security vulnerabilities have been disclosed in SinoTrack GPS devices that could be exploited to control certain remote functions on connected vehicles and even track their locations. "Successful exploitation of these vulnerabilities could allow an attacker to access device profiles without authorization through the common web management interface," the U.S. Cybersecurity and Infrastructure.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ How to Build a Lean Security Model: 5 Lessons from River Island πŸ–‹οΈ

In todays security landscape, budgets are tight, attack surfaces are sprawling, and new threats emerge daily. Maintaining a strong security posture under these circumstances without a large team or budget can be a real challenge. Yet lean security models are not only possible they can be highly effective. River Island, one of the UKs leading fashion retailers, offers a powerful.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild πŸ–‹οΈ

Microsoft has released patches to fix 67 security flaws, including one zeroday bug in Web Distributed Authoring and Versioning WebDAV that it said has come under active exploitation in the wild. Of the 67 vulnerabilities, 11 are rated Critical and 56 are rated Important in severity. This includes 26 remote code execution flaws, 17 information disclosure flaws, and 14 privilege escalation.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Palo Alto Networks Patches Series of Vulnerabilities πŸ“”

The cybersecurity provider also implemented recent fixes in Chromium that affected its Prisma Access Browser.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🀯2
πŸ“” NIST Publishes New Zero Trust Implementation Guidance πŸ“”

The new NIST guidance sets out 19 example implementations of zero trust using commercial, offtheshelf technologies.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Europol Says Criminal Demand for Data is β€œSkyrocketing” πŸ“”

Europol warns of vicious circle of data breaches and cybercrime.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Phishing Alert as Erie Insurance Reveals Cyber β€œEvent” πŸ“”

Erie Insurance reveals suspected network breach and ongoing outage.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Congress Introduces Bill to Strengthen Healthcare Cybersecurity πŸ“”

The legislation aims to expand the federal governments role in helping healthcare providers protect and respond to cyberattacks.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” 20,000 Asian IPs and Domains Dismantled in Infostealer Crackdown πŸ“”

Interpolcoordinated Operation Secure led to 32 arrests, including the suspected ringleader of a cybercriminal organization.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Hands-On Skills Now Key to Landing Your First Cyber Role πŸ“”

An ISC2 study found that 90 of security hiring managers would consider entrylevel candidates with only previous IT work experience.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Researcher Finds Five Zero-Days and 20+ Misconfigurations in Salesforce Cloud πŸ“”

The products affected by the issues are part of the Salesforce OmniStudio suite, including FlexCards and Data Mappers.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Half of Mobile Users Now Face Daily Scams πŸ“”

Malwarebytes claims 44 of mobile users are exposed to scams every day.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Two Microsoft Zero-Days for Admins to Fix in June Patch Tuesday πŸ“”

Microsoft has patched two zero days this month, one of which is being exploited in the wild.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 Partnership with Cryptos Systems: Strengthening Cybersecurity Across LATAM 🌊

Were excited to share the news our strategic partnership with Cryptos Systems, a respected cybersecurity consulting firm with a strong presence across Latin America. This collaboration marks a major leap towards bringing firstrate security services closer to regional businesses to help them stay compliant and prepared for modern cyber threat challenges. An Alliance for The post Partnership with Cryptos Systems Strengthening Cybersecurity Across LATAM appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸͺ– The Impact of Artificial Intelligence on the Cybersecurity Workforce πŸͺ–

The NICE Workforce Framework for Cybersecurity NICE Framework was revised in November 2020 as NIST Special Publication 800181 rev.1 to enable more effective and rapid updates to the NICE Framework Components, including how the advent of emerging technologies would impact cybersecurity work. NICE has been actively engaging in conversations with federal departments and agencies industry education, training, and certification providers and international representatives to understand how Artificial Intelligence AI might affect the nature of our Nations digital work. NICE has also led.

πŸ“– Read more.

πŸ”— Via "NIST"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware πŸ–‹οΈ

Apple has disclosed that a nowpatched security flaw present in its Messages app was actively exploited in the wild to target civil society members in sophisticated cyber attacks. The vulnerability, tracked as CVE202543200, was addressed on February 10, 2025, as part of iOS 18.3.1, iPadOS 18.3.1, iPadOS 17.7.5, macOS Sequoia 15.3.1, macOS Sonoma 14.7.4, macOS Ventura 13.7.4, watchOS 11.3.1,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ LockBit data dump reveals a treasure trove of intel on the notorious hacker group πŸ“’

An analysis of May's SQL database dump shows how much LockBit was really making.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” European Journalists Targeted by Paragon Spyware, Citizen Lab Confirms πŸ“”

This is the first forensic evidence that journalists devices have been infected with Paragons Graphite spyware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ AI security blunders have cyber professionals scrambling πŸ“’

Growing AI security incidents have cyber teams fending off an array of threats.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Application security risk: How leaders can protect their businesses πŸ“’

Application security risk is higher than ever, as new services and expanding attack surfaces put pressure on cyber leaders.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity