πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ RSAC Conference 2025: The front line of cyber innovation πŸ“’

Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISA Reveals 'Pattern' of Ransomware Attacks Against SimpleHelp RMM πŸ•΅οΈβ€β™‚οΈ

A new Cybersecurity and Infrastructure Security Agency CISA advisory warned ransomware actors have been actively exploiting a critical SimpleHelp flaw since January.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Top 5 Skills Entry-Level Cybersecurity Professionals Need 🦿

Cybersecurity professional organization ISC2 found hiring managers prize teamwork, problemsolving, and analytical thinking in earlycareer employees.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets πŸ–‹οΈ

A new malware campaign is exploiting a weakness in Discord's invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan. "Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers," Check Point said in a technical report. "The attackers combined the ClickFix.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2😱1
πŸ“” Threat Actors Target Victims with HijackLoader and DeerStealer πŸ“”

Cyberattacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Threat Actors Target Victims with HijackLoader and DeerStealer πŸ“”

Cyberattacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Threat Actors Target Victims with HijackLoader and DeerStealer πŸ“”

Cyberattacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Archetyp Market Shut Down in Europe-wide Law Enforcement Operation πŸ“”

Operation DEEP Sentinel has shut down Archetyp Market, the longestrunning dark web drug marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Archetyp Market Shut Down in Europe-wide Law Enforcement Operation πŸ“”

Operation DEEP Sentinel has shut down Archetyp Market, the longestrunning dark web drug marketplace.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: Key takeaways for CISOs πŸ“’

The RSAC Conference 2025 spotlighted pivotal advancements in agentic AI, identity security, and collaborative defense strategies, shaping the evolving mandate for CISOs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Threat Actors Target Victims with HijackLoader and DeerStealer πŸ“”

Cyberattacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network πŸ–‹οΈ

The U.S. Department of Justice DoJ said it has filed a civil forfeiture complaint in federal court that targets over 7.74 million in cryptocurrency, nonfungible tokens NFTs, and other digital assets allegedly linked to a global IT worker scheme orchestrated by North Korea. "For years, North Korea has exploited global remote IT contracting and cryptocurrency ecosystems to evade U.S.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: Quantum computing and security πŸ“’

Experts at RSAC 2025 emphasize the need for urgent action to secure data against future cryptographic risks posed by quantum computing.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus πŸ“”

Nessus users should update patches as soon as possible.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: Key takeaways for CISOs πŸ“’

The RSAC Conference 2025 spotlighted pivotal advancements in agentic AI, identity security, and collaborative defense strategies, shaping the evolving mandate for CISOs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Threat Actors Target Victims with HijackLoader and DeerStealer πŸ“”

Cyberattacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Scaling Beyond Borders: Establishing a Global Footprint 🦿

In 2025, amid the changing economic landscape, your business is more important than ever. You have customers to serve, revenue opportunities to capture, and an internal culture to foster. Success breeds opportunity and, while your leadership and board are all happy, they are challenging you to find new opportunities beyond US markets. A domestic footprint ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: Key takeaways for CISOs πŸ“’

The RSAC Conference 2025 spotlighted pivotal advancements in agentic AI, identity security, and collaborative defense strategies, shaping the evolving mandate for CISOs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: Quantum computing and security πŸ“’

Experts at RSAC 2025 emphasize the need for urgent action to secure data against future cryptographic risks posed by quantum computing.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: How AI is improving cybersecurity πŸ“’

AI is revolutionizing cybersecurity by enhancing threat detection, automating defenses, and letting IT professionals tackle evolving digital challenges.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ RSAC in focus: Collaboration in cybersecurity πŸ“’

Experts at RSA Conference 2025 emphasised that collaboration across sectors and shared intelligence are pivotal to addressing the evolving challenges of cybersecurity.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity