πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ LockBit data dump reveals a treasure trove of intel on the notorious hacker group πŸ“’

An analysis of May's SQL database dump shows how much LockBit was really making.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” European Journalists Targeted by Paragon Spyware, Citizen Lab Confirms πŸ“”

This is the first forensic evidence that journalists devices have been infected with Paragons Graphite spyware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ AI security blunders have cyber professionals scrambling πŸ“’

Growing AI security incidents have cyber teams fending off an array of threats.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Application security risk: How leaders can protect their businesses πŸ“’

Application security risk is higher than ever, as new services and expanding attack surfaces put pressure on cyber leaders.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why CISOs Must Align Business Objectives & Cybersecurity πŸ•΅οΈβ€β™‚οΈ

This alignment makes a successful CISO, but creating the same sentiment across business leadership creates a culture of commitment and greatly contributes to achieving goals.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cyberattacks on Humanitarian Orgs Jump Worldwide πŸ•΅οΈβ€β™‚οΈ

These groups suffered three times the cyberattacks as the year previous, with DDoS attacks dominating and vulnerability scans and SQL injection also more common.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Thursday disclosed that ransomware actors are targeting unpatched SimpleHelp Remote Monitoring and Management RMM instances to compromise customers of an unnamed utility billing software provider. "This incident reflects a broader pattern of ransomware actors targeting organizations through unpatched versions of SimpleHelp.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk πŸ–‹οΈ

Introduction Security at a Tipping Point Security Operations Centers SOCs were built for a different era, one defined by perimeterbased thinking, known threats, and manageable alert volumes. But todays threat landscape doesnt play by those rules. The sheer volume of telemetry, overlapping tools, and automated alerts has pushed traditional SOCs to the edge. Security teams are overwhelmed,.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” European Journalists Targeted by Paragon Spyware, Citizen Lab Confirms πŸ“”

This is the first forensic evidence that journalists devices have been infected with Paragons Graphite spyware.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware Gang Exploits SimpleHelp RMM to Compromise Utility Billing Firm πŸ“”

A CISA advisory urged all software vendors and downstream customers to check if they are impacted by unpatched versions of the SimpleHelp RMM tool.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Microsoft 365 Copilot: New Zero-Click AI Vulnerability Allows Corporate Data Theft πŸ“”

Researchers have found a flaw in Microsoft 365 Copilot that allows the exfiltration of sensitive corporate data with a simple email.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 12 Best MSSP Providers Businesses Trust and Grow With 🌊

Managed security services providers, or MSSP providers for short, have become essential allies to businesses in the face of soaring cyber attacks. These thirdparty experts step in to fill the critical cybersecurity gaps, delivering managed security servicesall backed by deep expertise that many inhouse teams simply cant afford. To help you find the right security The post 12 Best MSSP Providers Businesses Trust and Grow With appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
🌊 Python Developer 🌊

The post Python Developer appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Week in Vulnerabilities: Ivanti, Versa Flaws Flagged by Cyble πŸ¦…

Cyble The Week in Vulnerabilities Ivanti, Versa Flaws Flagged by Cyble " dataimagecaption"Cyble The Week in Vulnerabilities Ivanti, Versa Flaws Flagged by Cyble " datamediumfile"httpscyble.comwpcontentuploads202506CybleBlogsVulnerabilitiesIvanti300x150.png" datalargefile"httpscyble.comwpcontentuploads202506CybleBlogsVulnerabilitiesIvanti1024x512.png" title"The Week in Vulnerabilities Ivanti, Versa Flaws Flagged by Cyble 1" Cyble vulnerability intelligence researchers highlighted several highrisk IT and ICS vulnerabilities this week, including some that are actively targeted in attack attempts detected by Cyble honeypot sensors. As the week also included Patch Tuesday for many vendors, several new critical vulnerabilities emerged, including some that are already under active attack or...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month πŸ–‹οΈ

Cybersecurity researchers are calling attention to a "largescale campaign" that has been observed compromising legitimate websites with malicious JavaScript injections. According to Palo Alto Networks Unit 42, these malicious injects are obfuscated using JSFuck, which refers to an "esoteric and educational programming style" that uses only a limited set of characters to write and execute code.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 First Known β€˜Zero-Click’ AI Exploit: Microsoft 365 Copilot’s EchoLeak Flaw 🦿

Security researchers uncovered EchoLeak, a zeroclick flaw in Microsoft 365 Copilot, exposing sensitive data without user action. Microsoft has mitigated the vulnerability.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Threat Actor Abuses TeamFiltration for Entra ID Account Takeovers πŸ•΅οΈβ€β™‚οΈ

Proofpoint researchers discovered a largescale campaign using the open source penetrationtesting framework that has targeted more than 80,000 Microsoft accounts.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Former CISA and NCSC Heads Warn Against Glamorizing Threat Actor Names πŸ“”

Jen Easterly and Ciaran Martin called for a universal, vendorneutral cyber threat actor naming system.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
🦿 INTERPOL-Led Effort Dismantles Infostealer Malware Network in 26 Countries Across Asia-Pacific Region 🦿

INTERPOL partnered with GroupIB, Kaspersky, and Trend Micro to take down a cybercrime network. They alerted more than 216,000 individuals and organizations that were possible victims.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC Conference 2025: The front line of cyber innovation πŸ“’

Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISA Reveals 'Pattern' of Ransomware Attacks Against SimpleHelp RMM πŸ•΅οΈβ€β™‚οΈ

A new Cybersecurity and Infrastructure Security Agency CISA advisory warned ransomware actors have been actively exploiting a critical SimpleHelp flaw since January.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity