πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Government cybersecurity action plan includes Β£16 million in funding πŸ“’

Cash will go to help startups, scaleups, and university spinouts, while a new advisory group will aim to improve public sector cybersecurity.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How CISOs Can Govern AI & Meet Evolving Regulations πŸ•΅οΈβ€β™‚οΈ

Security teams are no longer just the last line of defense they are the foundation for responsible AI adoption.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1
πŸ•΅οΈβ€β™‚οΈ Serpentine#Cloud Uses Cloudflare Tunnels in Sneak Attacks πŸ•΅οΈβ€β™‚οΈ

An unidentified threat actor is using .lnk Windows shortcut files in a series of sophisticated attacks utilizing inmemory code execution and livingofftheland cyberattack strategies.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ FedRAMP at Startup Speed: Lessons Learned πŸ–‹οΈ

For organizations eyeing the federal market, FedRAMP can feel like a gated fortress. With strict compliance requirements and a notoriously long runway, many companies assume the path to authorization is reserved for the wellresourced enterprise. But thats changing. In this post, we break down how fastmoving startups can realistically achieve FedRAMP Moderate authorization without derailing.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign πŸ–‹οΈ

Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub repositories to deliver multistage malware. "The malware enables data exfiltration including credentials, browser data, and session tokens, remote access, and longterm persistence on infected systems," Trend Micro researchers Jovit Samaniego, Aira Marcelo, Mohamed.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” AI Now Generates Majority of Spam and Malicious Emails πŸ“”

Barracuda observed a big spike in spam emails generated using AI tools, making up the majority detected in April 2025.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” GodFather Malware Upgraded to Hijack Legitimate Mobile Apps πŸ“”

Upgraded GodFather banking malware now uses ondevice virtualization to hijack apps, enabling realtime fraud.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” ClickFix Helps Infostealers Use MHSTA for Defense Evasion πŸ“”

ClickFix techniques are enabling threat actors to bypass defenses using tools like MSHTA, says ReliaQuest.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” UK Government Publishes Plan to Boost Cyber Sector Growth πŸ“”

The new Cyber Growth Action Plan aims to support the UKs cyber industry, including the development of innovative new technologies and startups.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Ransomware Group Qilin Offers Legal Counsel to Affiliates πŸ“”

The group positions itself not just as a ransomware group, but as a fullservice cybercrime platform, according to Cybereason.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Paddle Pays $5m to Settle Tech Support Scam Allegations πŸ“”

Payment processor Paddle has agreed to settle with the FTC over allegations related to tech support scams.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… CERT-In Vulnerability Note Highlights Critical Security Risks in Ivanti, Trend Micro, Apache Kafka, and SAP Products πŸ¦…

Cyble CERTIn Vulnerability Note Highlights Critical Security Risks in Ivanti, Trend Micro, Apache Kafka, and SAP Products " dataimagecaption"Cyble CERTIn Vulnerability Note Highlights Critical Security Risks in Ivanti, Trend Micro, Apache Kafka, and SAP Products " datamediumfile"httpscyble.comwpcontentuploads202506CybleBlogsCERTINVulnerability300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202506CybleBlogsCERTINVulnerability1024x512.jpg" title"CERTIn Vulnerability Note Highlights Critical Security Risks in Ivanti, Trend Micro, Apache Kafka, and SAP Products 1" The Indian Computer Emergency Response Team CERTIn has issued a series of highand criticalseverity alerts through its CERTIn Vulnerability Note platform, warning enterprises and individuals about newly discovered securit...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ 1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub πŸ–‹οΈ

A new multistage malware campaign is targeting Minecraft users with a Javabased malware that employs a distributionasservice DaaS offering called Stargazers Ghost Network. "The campaigns resulted in a multistage attack chain targeting Minecraft users specifically," Check Point researchers Jaromr Hoej and Antonis Terefos said in a report shared with The Hacker News. "The malware was.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
❀2
πŸ“” Critical Linux Flaws Discovered Allowing Root Access Exploits πŸ“”

Two critical Linux flaws allow unprivileged users to gain root access, affecting major distributions.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🌊 B2B Growth Marketing Manager 🌊

The post B2B Growth Marketing Manager appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Two WormGPT Clones That Use Grok and Mixtral Found in Underground Forum 🦿

WormGPT was created by Last, a Portuguese hacker, using GPTJ to bypass AI safety filters before being shut down in 2023 after public exposure.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains πŸ–‹οΈ

A new campaign is making use of Cloudflare Tunnel subdomains to host malicious payloads and deliver them via malicious attachments embedded in phishing emails. The ongoing campaign has been codenamed SERPENTINECLOUD by Securonix. It leverages "the Cloudflare Tunnel infrastructure and Pythonbased loaders to deliver memoryinjected payloads through a chain of shortcut files and obfuscated.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ GodFather Banking Trojan Debuts Virtualization Tactic πŸ•΅οΈβ€β™‚οΈ

The Android malware is targeting Turkish financial institutions, completely taking over legitimate banking and crypto apps by creating an isolated virtualized environment on a device.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OpenAI Awarded $200M Contract to Work With DoD πŸ•΅οΈβ€β™‚οΈ

OpenAI intends to help streamline the Defense Department's administrative processes using artificial intelligence.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ OpenAI Awarded $200M Contract to Work With DoD πŸ•΅οΈβ€β™‚οΈ

OpenAI intends to help streamline the Defense Department's administrative processes using artificial intelligence.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ The Triple Threat of Burnout: Overworked, Unsatisfied, Trapped πŸ•΅οΈβ€β™‚οΈ

Many cybersecurity professionals still don't feel comfortable admitting when they need a break. And the impact goes beyond being overworked.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity