πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” Microsoft 365 Copilot: New Zero-Click AI Vulnerability Allows Corporate Data Theft πŸ“”

Researchers have found a flaw in Microsoft 365 Copilot that allows the exfiltration of sensitive corporate data with a simple email.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 12 Best MSSP Providers Businesses Trust and Grow With 🌊

Managed security services providers, or MSSP providers for short, have become essential allies to businesses in the face of soaring cyber attacks. These thirdparty experts step in to fill the critical cybersecurity gaps, delivering managed security servicesall backed by deep expertise that many inhouse teams simply cant afford. To help you find the right security The post 12 Best MSSP Providers Businesses Trust and Grow With appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
🌊 Python Developer 🌊

The post Python Developer appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Week in Vulnerabilities: Ivanti, Versa Flaws Flagged by Cyble πŸ¦…

Cyble The Week in Vulnerabilities Ivanti, Versa Flaws Flagged by Cyble " dataimagecaption"Cyble The Week in Vulnerabilities Ivanti, Versa Flaws Flagged by Cyble " datamediumfile"httpscyble.comwpcontentuploads202506CybleBlogsVulnerabilitiesIvanti300x150.png" datalargefile"httpscyble.comwpcontentuploads202506CybleBlogsVulnerabilitiesIvanti1024x512.png" title"The Week in Vulnerabilities Ivanti, Versa Flaws Flagged by Cyble 1" Cyble vulnerability intelligence researchers highlighted several highrisk IT and ICS vulnerabilities this week, including some that are actively targeted in attack attempts detected by Cyble honeypot sensors. As the week also included Patch Tuesday for many vendors, several new critical vulnerabilities emerged, including some that are already under active attack or...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month πŸ–‹οΈ

Cybersecurity researchers are calling attention to a "largescale campaign" that has been observed compromising legitimate websites with malicious JavaScript injections. According to Palo Alto Networks Unit 42, these malicious injects are obfuscated using JSFuck, which refers to an "esoteric and educational programming style" that uses only a limited set of characters to write and execute code.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 First Known β€˜Zero-Click’ AI Exploit: Microsoft 365 Copilot’s EchoLeak Flaw 🦿

Security researchers uncovered EchoLeak, a zeroclick flaw in Microsoft 365 Copilot, exposing sensitive data without user action. Microsoft has mitigated the vulnerability.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Threat Actor Abuses TeamFiltration for Entra ID Account Takeovers πŸ•΅οΈβ€β™‚οΈ

Proofpoint researchers discovered a largescale campaign using the open source penetrationtesting framework that has targeted more than 80,000 Microsoft accounts.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Former CISA and NCSC Heads Warn Against Glamorizing Threat Actor Names πŸ“”

Jen Easterly and Ciaran Martin called for a universal, vendorneutral cyber threat actor naming system.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ”₯1
🦿 INTERPOL-Led Effort Dismantles Infostealer Malware Network in 26 Countries Across Asia-Pacific Region 🦿

INTERPOL partnered with GroupIB, Kaspersky, and Trend Micro to take down a cybercrime network. They alerted more than 216,000 individuals and organizations that were possible victims.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC Conference 2025: The front line of cyber innovation πŸ“’

Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISA Reveals 'Pattern' of Ransomware Attacks Against SimpleHelp RMM πŸ•΅οΈβ€β™‚οΈ

A new Cybersecurity and Infrastructure Security Agency CISA advisory warned ransomware actors have been actively exploiting a critical SimpleHelp flaw since January.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top 5 Skills Entry-Level Cybersecurity Professionals Need 🦿

Cybersecurity professional organization ISC2 found hiring managers prize teamwork, problemsolving, and analytical thinking in earlycareer employees.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets πŸ–‹οΈ

A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan. "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2😱1
πŸ“” Threat Actors Target Victims with HijackLoader and DeerStealer πŸ“”

Cyberattacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Threat Actors Target Victims with HijackLoader and DeerStealer πŸ“”

Cyberattacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Threat Actors Target Victims with HijackLoader and DeerStealer πŸ“”

Cyberattacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Archetyp Market Shut Down in Europe-wide Law Enforcement Operation πŸ“”

Operation DEEP Sentinel has shut down Archetyp Market, the longestrunning dark web drug marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Archetyp Market Shut Down in Europe-wide Law Enforcement Operation πŸ“”

Operation DEEP Sentinel has shut down Archetyp Market, the longestrunning dark web drug marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: Key takeaways for CISOs πŸ“’

The RSAC Conference 2025 spotlighted pivotal advancements in agentic AI, identity security, and collaborative defense strategies, shaping the evolving mandate for CISOs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Threat Actors Target Victims with HijackLoader and DeerStealer πŸ“”

Cyberattacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network πŸ–‹οΈ

The U.S. Department of Justice DoJ said it has filed a civil forfeiture complaint in federal court that targets over 7.74 million in cryptocurrency, nonfungible tokens NFTs, and other digital assets allegedly linked to a global IT worker scheme orchestrated by North Korea. "For years, North Korea has exploited global remote IT contracting and cryptocurrency ecosystems to evade U.S.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity