πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.5K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“” IT Worker Jailed After Revenge Attack on Employer πŸ“”

An IT worker has been jailed for launching a cyberattack after he was suspended at work.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Glasgow City Council Warns of Parking Fine Scam πŸ“”

Glasgow City Council is alerting residents to a parking scam which could be linked to a recent cyberincident.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ¦… The Week in Vulnerabilities: Citrix NetScaler Fixes Urged by Cyble πŸ¦…

Cyble The Week in Vulnerabilities Citrix NetScaler Fixes Urged by Cyble " dataimagecaption"Cyble The Week in Vulnerabilities Citrix NetScaler Fixes Urged by Cyble " datamediumfile"httpscyble.comwpcontentuploads202506CybleBlogsVulnerabilitiesCitrix300x150.jpg" datalargefile"httpscyble.comwpcontentuploads202506CybleBlogsVulnerabilitiesCitrix.jpg" title"The Week in Vulnerabilities Citrix NetScaler Fixes Urged by Cyble  1" In addition to highrisk and actively exploited vulnerabilities, Cyble researchers also observed threat actors on cybercrime forums discussing potential exploits and zeroday vulnerabilities, increasing the chances that those flaws could also be exploited.  What follows are some highlights from Cybles weekly Vulnerability Intelligence and Sensor Intelligence reports.  ...

πŸ“– Read more.

πŸ”— Via "CYBLE"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Airoha Chip Vulns Put Sony, Bose Earbuds & Headphones at Risk πŸ•΅οΈβ€β™‚οΈ

The vulnerabilities, which have yet to be published, could allow a threat actor to hijack not only Bluetooth earbuds and headphones but also the devices connected to them.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Chinese Company Hikvision Banned By Canadian Government πŸ•΅οΈβ€β™‚οΈ

Though the company's video surveillance products will be prohibited for government use, individuals and private businesses can still buy the vendor's products.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ•΅οΈβ€β™‚οΈ Hired Hacker Assists Drug Cartel in Finding, Killing FBI Sources πŸ•΅οΈβ€β™‚οΈ

According to a government report, El Chapo's Sinaloa drug cartel used a hacker to spy on people connected to the FBI's 2018 investigation against the kingpin, which led to deadly consequences.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Scattered Spider Hacking Spree Continues With Airline Sector Attacks πŸ•΅οΈβ€β™‚οΈ

Microsoft has called the hacker collective one of the most dangerous current cyberthreats.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion πŸ“”

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion πŸ“”

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion πŸ“”

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” WordPress Plugin Flaw Exposes 600,000 Sites to File Deletion πŸ“”

A severe flaw identified in the Forminator WordPress plugin allows arbitrary file deletion and potential site takeover.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Privilege Escalation Flaw Found in Azure Machine Learning Service πŸ“”

A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Privilege Escalation Flaw Found in Azure Machine Learning Service πŸ“”

A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 AI-Generated Phishing Sites Mimic Okta, Microsoft 365 in New Threat Campaign 🦿

Threat actors are exploiting Vercel's AI tool to generate convincing phishing pages. Read Vercels response and Oktas tips for keeping your organization secure.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Cyber Blueprint Aims to Guide Organizations on AI Journey πŸ•΅οΈβ€β™‚οΈ

Deloitte's new blueprint looks to bridge the gap between the massive push for AI adoption and a lack of preparedness among leaders and employees.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Cyber Blueprint Aims to Guide Organizations on AI Journey πŸ•΅οΈβ€β™‚οΈ

Deloitte's new blueprint looks to bridge the gap between the massive push for AI adoption and a lack of preparedness among leaders and employees.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸš€ How government cyber cuts will affect you and your business πŸš€

Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks.

πŸ“– Read more.

πŸ”— Via "ESET - WeLiveSecurity"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ New Cyber Blueprint Aims to Guide Organizations on AI Journey πŸ•΅οΈβ€β™‚οΈ

Deloitte's new blueprint looks to bridge the gap between the massive push for AI adoption and a lack of preparedness among leaders and employees.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 AI-Generated Phishing Sites Mimic Okta, Microsoft 365 in New Threat Campaign 🦿

Threat actors are exploiting Vercel's AI tool to generate convincing phishing pages. Read Vercels response and Oktas tips for keeping your organization secure.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Privilege Escalation Flaw Found in Azure Machine Learning Service πŸ“”

A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Privilege Escalation Flaw Found in Azure Machine Learning Service πŸ“”

A critical Azure Machine Learning flaw allows privilege escalation, risking subscription compromise.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity