πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.2K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🌊 Zscaler Pricing 2025: Ultimate Guide for Security Products 🌊

Zscalers cloudnative security serviceslike ZIA Internet Access and ZPA Private Accessare priced on a peruser, peryear basis, with costs typically ranging from 72 to 375 per user annually, depending on the edition and feature set. For midsized to large organizations, total annual spend generally falls between 28,000 and 286,000, depending on user volume, security complexity, The post Zscaler Pricing 2025 Ultimate Guide for Security Products appeared first on UnderDefense.

πŸ“– Read more.

πŸ”— Via "UnderDefense"

----------
πŸ‘οΈ Seen on @cibsecurity
❀1
πŸ“’ The NCSC wants you to start using password managers and passkeys – here’s how to choose the best options πŸ“’

New guidance from the NCSC recommends using passkeys and password managers but how can you choose the best option? ITPro has you covered.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ North Korean IT workers: The growing threat πŸ“’

As fake IT worker schemes plague firms in the US and Europe, what can leaders do to protect their organizations?.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ How Geopolitical Tensions Are Shaping Cyber Warfare πŸ•΅οΈβ€β™‚οΈ

In today's cyber battlefield, resilience starts with readiness, and the cost of falling short increases by the day.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Charming Kitten APT Tries Spying on Israeli Cybersecurity Experts πŸ•΅οΈβ€β™‚οΈ

Israel's cyber pros are having to put theory into practice, as a notorious nationstate APT sponsored by Iran targets them with spearphishing attacks.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Cloud Repatriation Driven by AI, Cost, and Security πŸ•΅οΈβ€β™‚οΈ

Organizations are moving away from the public cloud and embracing a more hybrid approach due to big changes over the past five years.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ And Now Malware That Tells AI to Ignore It? πŸ•΅οΈβ€β™‚οΈ

Though rudimentary and largely nonfunctional, the wryly named "Skynet" binary could be a harbinger of things to come on the malware front.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Taming Agentic AI Risks Requires Securing Non-Human Identities πŸ•΅οΈβ€β™‚οΈ

As the definition of machine identities broadens, AI agents working on behalf of users and gaining access to various services blurs the lines of nonhuman identities even more.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Millions of Brother Printers Hit by Critical, Unpatchable Bug πŸ•΅οΈβ€β™‚οΈ

A slew of vulnerabilities, including a critical CVSS 9.8 that enables an attacker to generate the default admin password, affect hundreds of printer, scanner, and labelmaker models made by manufacturer Brother.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ CISA Is Shrinking: What Does It Mean for Cyber? πŸ•΅οΈβ€β™‚οΈ

Dark Reading Confidential Episode 7 Cyber experts Tom Parker and Jake Williams offer their views on the practical impact of cuts to the US Cybersecurity and Infrastructure Security Agency.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Windows 10 Support Ends Soon, Though Extended Security Updates Offers Are Available 🦿

Microsofts Extended Security Updates program will deliver paid patches for Windows 10 after Oct. 14, 2025, but only for version 22H2 devices.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Scale AI Leaks Meta, Google, xAI Confidential Files Through β€˜Incredibly Janky’ Document Practices 🦿

Leaked project files from Meta, Google, and xAI expose major security lapses at Scale AI just weeks after Metas 14B investment.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks πŸ–‹οΈ

Cybersecurity researchers have disclosed a critical vulnerability in the Open VSX Registry "openvsx.org" that, if successfully exploited, could have enabled attackers to take control of the entire Visual Studio Code extensions marketplace, posing a severe supply chain risk. "This vulnerability provides attackers full control over the entire extensions marketplace, and in turn, full control.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access πŸ–‹οΈ

Cisco has released updates to address two maximumseverity security flaws in Identity Services Engine ISE and ISE Passive Identity Connector ISEPIC that could permit an unauthenticated attacker to execute arbitrary commands as the root user. The vulnerabilities, assigned the CVE identifiers CVE202520281 and CVE202520282, carry a CVSS score of 10.0 each. A description of the defects is.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks πŸ–‹οΈ

The ClickFix social engineering tactic as an initial access vector using fake CAPTCHA verifications increased by 517 between the second half of 2024 and the first half of this year, according to data from ESET. "The list of threats that ClickFix attacks lead to is growing by the day, including infostealers, ransomware, remote access trojans, cryptominers, postexploitation tools, and even.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience πŸ–‹οΈ

SaaS Adoption is Skyrocketing, Resilience Hasnt Kept Pace SaaS platforms have revolutionized how businesses operate. They simplify collaboration, accelerate deployment, and reduce the overhead of managing infrastructure. But with their rise comes a subtle, dangerous assumption that the convenience of SaaS extends to resilience. It doesnt. These platforms werent built with fullscale data.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks πŸ–‹οΈ

An Iranian statesponsored hacking group associated with the Islamic Revolutionary Guard Corps IRGC has been linked to a spearphishing campaign targeting journalists, highprofile cyber security experts, and computer science professors in Israel. "In some of those campaigns, Israeli technology and cyber security professionals were approached by attackers who posed as fictitious assistants to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa πŸ–‹οΈ

Cybersecurity researchers are calling attention to a series of cyber attacks targeting financial organizations across Africa since at least July 2023 using a mix of opensource and publicly available tools to maintain access. Palo Alto Networks Unit 42 is tracking the activity under the moniker CLCRI1014, where "CL" refers to "cluster" and "CRI" stands for "criminal motivation." It's suspected.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet πŸ–‹οΈ

The U.S. Cybersecurity and Infrastructure Security Agency CISA on Wednesday added three security flaws, each impacting AMI MegaRAC, DLink DIR859 router, and Fortinet FortiOS, to its Known Exploited Vulnerabilities KEV catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows CVE202454085 CVSS score 10.0 An authentication bypass by spoofing.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks πŸ–‹οΈ

Cybersecurity researchers have disclosed a critical vulnerability in the Open VSX Registry "openvsx.org" that, if successfully exploited, could have enabled attackers to take control of the entire Visual Studio Code extensions marketplace, posing a severe supply chain risk. "This vulnerability provides attackers full control over the entire extensions marketplace, and in turn, full control.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews πŸ–‹οΈ

Popular messaging platform WhatsApp has added a new artificial intelligence AIpowered feature that leverages its inhouse solution Meta AI to summarize unread messages in chats. The feature, called Message Summaries, is currently rolling out in the English language to users in the United States, with plans to bring it to other regions and languages later this year. It "uses Meta AI to.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ€”1